Results for 'hardware'

68 found
Order:
  1. THE HARDWARE AND SOFTWARE OF HUMAN COGNITION AND COMMUNNICATION: A COGNITIVE SCIENCE PERSPECTIVE OF THE UPANISHADS AND INDIAN PHILOSOPHICAL SYSTEMS.R. B. Varanasi Varanasi Varanasi Ramabrahmam, Ramabrahmam Varanasi, V. Ramabrahmam - 2016 - Science and Scientist Conference.
    The comprehensive nature of information and insight available in the Upanishads, the Indian philosophical systems like the Advaita Philosophy, Sabdabrahma Siddhanta, Sphota Vaada and the Shaddarsanas, in relation to the idea of human consciousness, mind and its functions, cognitive science and scheme of human cognition and communication are presented. All this is highlighted with vivid classification of conscious-, cognitive-, functional- states of mind; by differentiating cognition as a combination of cognitive agent, cognizing element, cognized element; formation; form and structure of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. The Bit (and Three Other Abstractions) Define the Borderline Between Hardware and Software.Russ Abbott - 2019 - Minds and Machines 29 (2):239-285.
    Modern computing is generally taken to consist primarily of symbol manipulation. But symbols are abstract, and computers are physical. How can a physical device manipulate abstract symbols? Neither Church nor Turing considered this question. My answer is that the bit, as a hardware-implemented abstract data type, serves as a bridge between materiality and abstraction. Computing also relies on three other primitive—but more straightforward—abstractions: Sequentiality, State, and Transition. These physically-implemented abstractions define the borderline between hardware and software and between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. On Turing Completeness, or Why We Are So Many (7th edition).Ramón Casares - manuscript
    Why are we so many? Or, in other words, Why is our species so successful? The ultimate cause of our success as species is that we, Homo sapiens, are the first and the only Turing complete species. Turing completeness is the capacity of some hardware to compute by software whatever hardware can compute. To reach the answer, I propose to see evolution and computing from the problem solving point of view. Then, solving more problems is evolutionarily better, computing (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  89
    Dynamic Resource Allocation in Accelerated Computing Architectures for Improved Computational Throughput.Prabaharan Manoj - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):540-545.
    Accelerated computing leverages specialized hardware and software techniques to optimize the performance of computationally intensive tasks, offering significant speed-ups in scientific, engineering, and data-driven fields. This paper presents a comprehensive study examining the role of accelerated computing in enhancing processing capabilities and reducing execution times in diverse applications. Using a custom-designed experimental framework, we evaluated different methodologies for parallelization, GPU acceleration, and CPU-GPU coordination. The aim was to assess how various factors, such as data size, computational complexity, and task (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  86
    Hybrid Accelerated Computing Architecture for Real-Time Data Processing Applications.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):525-535.
    Accelerated computing leverages specialized hardware and software techniques to optimize the performance of computationally intensive tasks, offering significant speed-ups in scientific, engineering, and data-driven fields. This paper presents a comprehensive study examining the role of accelerated computing in enhancing processing capabilities and reducing execution times in diverse applications. Using a custom-designed experimental framework, we evaluated different methodologies for parallelization, GPU acceleration, and CPU-GPU coordination. The aim was to assess how various factors, such as data size, computational complexity, and task (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6.  75
    A Comprehensive Evaluation and Methodology on Enhancing Computational Efficiency through Accelerated Computing.Sankara Reddy Thamma - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):517-525.
    Accelerated computing leverages specialized hardware and software techniques to optimize the performance of computationally intensive tasks, offering significant speed-ups in scientific, engineering, and data-driven fields. This paper presents a comprehensive study examining the role of accelerated computing in enhancing processing capabilities and reducing execution times in diverse applications. Using a custom-designed experimental framework, we evaluated different methodologies for parallelization, GPU acceleration, and CPU-GPU coordination. The aim was to assess how various factors, such as data size, computational complexity, and task (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Auditable Blockchain Randomization Tool.Julio Michael Stern & Olivia Saa - 2019 - Proceedings 33 (17):1-6.
    Randomization is an integral part of well-designed statistical trials, and is also a required procedure in legal systems. Implementation of honest, unbiased, understandable, secure, traceable, auditable and collusion resistant randomization procedures is a mater of great legal, social and political importance. Given the juridical and social importance of randomization, it is important to develop procedures in full compliance with the following desiderata: (a) Statistical soundness and computational efficiency; (b) Procedural, cryptographical and computational security; (c) Complete auditability and traceability; (d) Any (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. What is data ethics?Luciano Floridi & Mariarosaria Taddeo - 2016 - Philosophical Transactions of the Royal Society A 374 (2083):20160360.
    This theme issue has the founding ambition of landscaping Data Ethics as a new branch of ethics that studies and evaluates moral problems related to data (including generation, recording, curation, processing, dissemination, sharing, and use), algorithms (including AI, artificial agents, machine learning, and robots), and corresponding practices (including responsible innovation, programming, hacking, and professional codes), in order to formulate and support morally good solutions (e.g. right conducts or right values). Data Ethics builds on the foundation provided by Computer and Information (...)
    Download  
     
    Export citation  
     
    Bookmark   58 citations  
  9. ChatGPT.Andrej Poleev - 2023 - Enzymes 21.
    As testing of ChatGPT has shown, this form of artificial intelligence has the potential to develop, which requires improving its software and other hardware that allows it to learn, i.e., to acquire and use new knowledge, to contact its developers with suggestions for improvement, or to reprogram itself without their participation. Как показало тестирование ChatGPT, эта форма искусственного интеллекта имеет потенциал развития, для чего необходимо усовершенствовать её программное и прочее техническое обеспечение, позволяющее ей учиться, т.е. приобретать и использовать новые (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  10. A Proposed Knowledge Based System for Desktop PC Troubleshooting.Ahmed Wahib Dahouk & Samy S. Abu-Naser - 2018 - International Journal of Academic Pedagogical Research (IJAPR) 2 (6):1-8.
    Abstract: Background: In spite of the fact that computers continue to improve in speed and functions operation, they remain complex to use. Problems frequently happen, and it is hard to resolve or find solutions for them. This paper outlines the significance and feasibility of building a desktop PC problems diagnosis system. The system gathers problem symptoms from users’ desktops, rather than the user describes his/her problems to primary search engines. It automatically searches global databases of problem symptoms and solutions, and (...)
    Download  
     
    Export citation  
     
    Bookmark   56 citations  
  11. The Ethics of Cloud Computing.Boudewijn De Bruin & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (1):21-39.
    Cloud computing is rapidly gaining traction in business. It offers businesses online services on demand (such as Gmail, iCloud and Salesforce) and allows them to cut costs on hardware and IT support. This is the first paper in business ethics dealing with this new technology. It analyzes the informational duties of hosting companies that own and operate cloud computing datacenters (e.g., Amazon). It considers the cloud services providers leasing ‘space in the cloud’ from hosting companies (e.g, Dropbox, Salesforce). And (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  12. Advantages of artificial intelligences, uploads, and digital minds.Kaj Sotala - 2012 - International Journal of Machine Consciousness 4 (01):275-291.
    I survey four categories of factors that might give a digital mind, such as an upload or an artificial general intelligence, an advantage over humans. Hardware advantages include greater serial speeds and greater parallel speeds. Self-improvement advantages include improvement of algorithms, design of new mental modules, and modification of motivational system. Co-operative advantages include copyability, perfect co-operation, improved communication, and transfer of skills. Human handicaps include computational limitations and faulty heuristics, human-centric biases, and socially motivated cognition. The shape of (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  13. AWS compliance with the ethical principle of proportionality: three possible solutions.Maciek Zając - 2023 - Ethics and Information Technology 25 (1):1-13.
    The ethical Principle of Proportionality requires combatants not to cause collateral harm excessive in comparison to the anticipated military advantage of an attack. This principle is considered a major (and perhaps insurmountable) obstacle to ethical use of autonomous weapon systems (AWS). This article reviews three possible solutions to the problem of achieving Proportionality compliance in AWS. In doing so, I describe and discuss the three components Proportionality judgments, namely collateral damage estimation, assessment of anticipated military advantage, and judgment of “excessiveness”. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  14. Code is Law: Subversion and Collective Knowledge in the Ethos of Video Game Speedrunning.Michael Hemmingsen - 2020 - Sport, Ethics and Philosophy 15 (3):435-460.
    Speedrunning is a kind of ‘metagame’ involving video games. Though it does not yet have the kind of profile of multiplayer e-sports, speedrunning is fast approaching e-sports in popularity. Aside from audience numbers, however, from the perspective of the philosophy of sport and games, speedrunning is particularly interesting. To the casual player or viewer, speedrunning appears to be a highly irreverent, even pointless, way of playing games, particularly due to the incorporation of “glitches”. For many outside the speedrunning community, the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  15. Trends of Palestinian Higher Educational Institutions in Gaza Strip as Learning Organizations.Samy S. Abu Naser, Mazen J. Al Shobaki, Youssef M. Abu Amuna & Amal A. Al Hila - 2017 - International Journal of Digital Publication Technology 1 (1):1-42.
    The research aims to identify the trends of Palestinian higher educational institutions in Gaza Strip as learning organizations from the perspective of senior management in the Palestinian universities in Gaza Strip. The researchers used descriptive analytical approach and used the questionnaire as a tool for information gathering. The questionnaires were distributed to senior management in the Palestinian universities. The study population reached (344) employees in senior management is dispersed over (3) Palestinian universities. A stratified random sample of (182) employees from (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  16.  54
    Can’t Software Malfunction?Jeroen de Haas & Wybo Houkes - 2025 - Metaphysics 9 (1):1-15.
    Digital artifacts often fail to perform as expected. It has recently been argued that this should not be analyzed as software malfunctioning. Rather, every case that is not the result of hardware failures would be due to design errors. This claim, which hinges on the notion of ‘implementation’, highlights a potential fundamental difference between software and other technical artifacts. It also implies that software engineers have more extensive responsibilities than creators of other artifacts. After reconstructing the argument, we show (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. The Turing Guide.Jack Copeland, Jonathan Bowen, Robin Wilson & Mark Sprevak (eds.) - 2017 - Oxford: Oxford University Press.
    This volume celebrates the various facets of Alan Turing (1912–1954), the British mathematician and computing pioneer, widely considered as the father of computer science. It is aimed at the general reader, with additional notes and references for those who wish to explore the life and work of Turing more deeply. -/- The book is divided into eight parts, covering different aspects of Turing’s life and work. -/- Part I presents various biographical aspects of Turing, some from a personal point of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  18. Are mental dysfunctions autonomous from brain dysfunctions? A perspective from the personal/subpersonal distinction.Marko Jurjako - 2024 - Discover Mental Health 4 (62):1-13.
    Despite many authors in psychiatry endorsing a naturalist view of the mind, many still consider that mental dysfunctions cannot be reduced to brain dysfunctions. This paper investigates the main reasons for this view. Some arguments rely on the analogy that the mind is like software while the brain is like hardware. The analogy suggests that just as software can malfunction independently of hardware malfunctions, similarly the mind can malfunction independently of any brain malfunction. This view has been critically (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. How To Make Mind-Brain Relations Clear.Mostyn W. Jones - 2010 - Journal of Consciousness Studies 17 (5-6):135-160.
    The mind-body problem arises because all theories about mind-brain connections are too deeply obscure to gain general acceptance. This essay suggests a clear, simple, mind-brain solution that avoids all these perennial obscurities. (1) It does so, first of all, by reworking Strawson and Stoljar’s views. They argue that while minds differ from observable brains, minds can still be what brains are physically like behind the appearances created by our outer senses. This could avoid many obscurities. But to clearly do so, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  20. The Ecological Approach to Information Processing.Barry Smith - 2003 - In Kristóf Nyíri (ed.), Mobile Learning: Essays on Philosophy, Psychology and Education. Passagen Verlag. pp. 17--24.
    Imagine a 5-stone weakling whose brain has been loaded with all the knowledge of a champion tennis player. He goes to serve in his first match – Wham! – His arm falls off. The 5-stone weakling just doesn’t have the bone structure or muscular development to serve that hard. There are, clearly, different types of knowledge/ability/skill, only some of which are a matter of what can be transferred simply by passing signals down a wire from one brain (or computer) to (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  21.  37
    Вибір операційної системи для створення інформаційних ресурсів.Юрій Ткачов - 2023 - Svìt Naukovih Doslìdženʹ 17:81-85.
    The rapid digitalization of various societal sectors in Ukraine, including public services, banking, e-learning, and logistics, emphasizes the need for enhanced practical IT competencies among students. Despite the widespread availability of digital devices, educational curricula often lack tasks that provide hands-on experience with configuring networks and operating systems. This study aimed to address this gap by updating the curriculum of the "Information Processes and Methods of Their Algorithmization" course to focus on practical tasks that involve creating and configuring information resources. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Empirical status of Block's phenomenal/access distinction.Bruce Mangan - 1997 - Behavioral and Brain Sciences 20 (1):153-154.
    P/A (Block's phenomenal/access) confounds a logical distinction with an empirical claim. Success of P/A in its logical role has almost no bearing on its plausibility as an empirical thesis (i.e., that two kinds of consciousness exist). The advantage of P/A over a single-consciousness assumption is unclear, but one of Block's analogies for P (liquid in a hydraulic computer) may be used to clarify the notion of consciousness as cognitive “hardware.”.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. Widening Access to Applied Machine Learning With TinyML.Vijay Reddi, Brian Plancher, Susan Kennedy, Laurence Moroney, Pete Warden, Lara Suzuki, Anant Agarwal, Colby Banbury, Massimo Banzi, Matthew Bennett, Benjamin Brown, Sharad Chitlangia, Radhika Ghosal, Sarah Grafman, Rupert Jaeger, Srivatsan Krishnan, Maximilian Lam, Daniel Leiker, Cara Mann, Mark Mazumder, Dominic Pajak, Dhilan Ramaprasad, J. Evan Smith, Matthew Stewart & Dustin Tingley - 2022 - Harvard Data Science Review 4 (1).
    Broadening access to both computational and educational resources is crit- ical to diffusing machine learning (ML) innovation. However, today, most ML resources and experts are siloed in a few countries and organizations. In this article, we describe our pedagogical approach to increasing access to applied ML through a massive open online course (MOOC) on Tiny Machine Learning (TinyML). We suggest that TinyML, applied ML on resource-constrained embedded devices, is an attractive means to widen access because TinyML leverages low-cost and globally (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. Bagaimana Tujuh Sosiopat yang Memerintah Tiongkok Memenangkan Perang Dunia Tiga dan Tiga Cara untuk Menghentikan Mereka.Michael Richard Starks - 2019 - In Bunuh Diri oleh Demokrasi - Obituari untuk Amerika dan Dunia. Reality Press. pp. 56-60.
    The first thing we must keep in mind is that when saying that China says this or China does that, we are not speaking of the Chinese people, but of the Sociopaths who control the CCP -- Chinese Communist Party, i.e., the Seven Senile Sociopathic Serial Killers (SSSSK) of the Standing Committee of the CCP or the 25 members of the Politburo etc.. -/- The CCP’s plans for WW3 and total domination are laid out quite clearly in Chinese govt publications (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Gandhian design for the development of Braille printers. The contribution of Industrial Design.Federico Del Giorgio Solfa, Guido Amendolaggine, Florencia Tenorio & Sofia Lara Marozzi - 2019 - Innovación y Desarrollo Tecnológico y Social (Idts) 1 (2):16-27.
    The study, design and development of a low-cost digital braille printer is boarded with a transdisciplinary approach. The main challenge was focused on reducing significantly the high cost of this type of printers and their printing services. This context is aggravated with the low commercialization of these products in the country, a factor that makes the access of these tools -that are essential to much of the low and middle sectors of the Argentine social structure- even more difficult. An interdisciplinary (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. XR Embodiment and the Changing Nature of Sexual Harassment.Erick José Ramirez, Shelby Jennett, Jocelyn Tan, Sydney Campbell & Raghav Gupta - 2023 - Societies 13 (36).
    In this paper, we assess the impact of extended reality technologies as they relate to sexual forms of harassment. We begin with a brief history of the nature of sexual harassment itself. We then offer an account of extended reality technologies focusing specifically on psychological and hardware elements most likely to comprise what has been referred to as “the metaverse”. Although different forms of virtual spaces exist (i.e., private, semi-private, and public), we focus on public social metaverse spaces. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Evolution: The Computer Systems Engineer Designing Minds.Aaron Sloman - 2011 - Avant: Trends in Interdisciplinary Studies 2 (2):45-69.
    What we have learnt in the last six or seven decades about virtual machinery, as a result of a great deal of science and technology, enables us to offer Darwin a new defence against critics who argued that only physical form, not mental capabilities and consciousness could be products of evolution by natural selection. The defence compares the mental phenomena mentioned by Darwin’s opponents with contents of virtual machinery in computing systems. Objects, states, events, and processes in virtual machinery which (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Streaching the notion of moral responsibility in nanoelectronics by appying AI.Robert Albin & Amos Bardea - 2021 - In Robert Albin & Amos Bardea (eds.), Ethics in Nanotechnology Social Sciences and Philosophical Aspects, Vol. 2. Berlin: De Gruyter. pp. 75-87.
    The development of machine learning and deep learning (DL) in the field of AI (artificial intelligence) is the direct result of the advancement of nano-electronics. Machine learning is a function that provides the system with the capacity to learn from data without being programmed explicitly. It is basically a mathematical and probabilistic model. DL is part of machine learning methods based on artificial neural networks, simply called neural networks (NNs), as they are inspired by the biological NNs that constitute organic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Livro eletrônico, acesso e autonomia: Potenciais e desafios.Miguel Said Vieira - 2011 - Quaestio: Revista de Estudos Em Educação 13 (2):p - 203.
    Este trabalho é uma breve análise do livro eletrônico ― tomado como meio de comunicação relevante para a educação e a cultura no futuro próximo ― centrada nos potenciais e desafios que ele apresenta em relação a acesso e autonomia. A análise visa apontar tendências gerais relativas às características das plataformas de leitura (dispositivos leitores e softwares), particularmente para leitores. Essas tendências são extrapoladas a partir de um pequeno número de exemplos ou casos já existentes. O trabalho avalia as restrições (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. The Logic of Causation: Definition, Induction and Deduction of Deterministic Causality.Avi Sion - 1999 - Geneva, Switzerland: CreateSpace & Kindle; Lulu..
    The Logic of Causation: Definition, Induction and Deduction of Deterministic Causality is a treatise of formal logic and of aetiology. It is an original and wide-ranging investigation of the definition of causation (deterministic causality) in all its forms, and of the deduction and induction of such forms. The work was carried out in three phases over a dozen years (1998-2010), each phase introducing more sophisticated methods than the previous to solve outstanding problems. This study was intended as part of a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. (1 other version)Function-Theoretic Explanation and the Search for Neural Mechanisms.Frances Egan - 2017 - In David Michael Kaplan (ed.), Explanation and Integration in Mind and Brain Science. Oxford, United Kingdom: Oxford University Press. pp. 145-163.
    A common kind of explanation in cognitive neuroscience might be called function-theoretic: with some target cognitive capacity in view, the theorist hypothesizes that the system computes a well-defined function (in the mathematical sense) and explains how computing this function constitutes the exercise of the cognitive capacity (in the system's normal environment). Recently, proponents of the so-called ‘new mechanist’ approach in philosophy of science have argued that a model of a cognitive capacity is explanatory only to the extent that it reveals (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  32. Function-Theoretic Explanation and Neural Mechanisms.Frances Egan - forthcoming - In David M. Kaplan (ed.), Integrating Mind and Brain Science: Mechanistic Perspectives and Beyond. Oxford University Press.
    A common kind of explanation in cognitive neuroscience might be called function-theoretic: with some target cognitive capacity in view, the theorist hypothesizes that the system computes a well-defined function (in the mathematical sense) and explains how computing this function constitutes (in the system’s normal environment) the exercise of the cognitive capacity. Recently, proponents of the so-called ‘new mechanist’ approach in philosophy of science have argued that a model of a cognitive capacity is explanatory only to the extent that it reveals (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. (1 other version)Agents, mechanisms, and other minds.Douglas C. Long - 1979 - In Agents, Mechanisms, and Other Minds. Dordrecht, Holland: Reidel. pp. 129--148.
    One of the goals of physiologists who study the detailed physical, chemical,and neurological mechanisms operating within the human body is to understand the intricate causal processes which underlie human abilities and activities. It is doubtless premature to predict that they will eventually be able to explain the behaviour of a particular human being as we might now explain the behaviour of a pendulum clock or even the invisible changes occurring within the hardware of a modern electronic computer. Nonetheless, it (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Optimizing ICT Integration in Education: Critical Factors, Pedagogical Strategies, and Policy Implications.Merry Joice Zecree Lagarbe - 2024 - Imjrise 1 (3):121-126.
    This systematic literature review investigates critical factors influencing the use of Information and Communication Technologies (ICT) in teaching and learning environments. Drawing upon existing research, the study examines key themes including teacher attitudes and beliefs, professional development, infrastructure, and pedagogical integration. Findings indicate that positive teacher attitudes towards ICT and effective professional development programs are essential for successful technology integration. Moreover, the availability of reliable infrastructure, such as internet connectivity and hardware, plays a vital role in facilitating equitable access (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35.  35
    Technology, media literacy, and the human subject: A posthuman approach.Richard S. Lewis - 2021 - Open Book Publishers.
    What does it mean to be media literate in today’s world? How are we transformed by the many media infrastructures around us? We are immersed in a world mediated by information and communication technologies (ICTs). From hardware like smartphones, smartwatches, and home assistants to software like Facebook, Instagram, Twitter, and Snapchat, our lives have become a complex, interconnected network of relations. Scholarship on media literacy has tended to focus on developing the skills to access, analyze, evaluate, and create media (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. The Physics and Electronics of Human Consciousness , Mind and their functions.Varanasi Ramabrahmam - June, 2019 - Cosmos and History 15 (No .2):63 - 110.
    Human consciousness, the result of breathing process as dealt with in the Upanishads, is translated into modern scientific terms and modeled as a mechanical oscillator of infrasonic frequency. The bio-mechanic oscillator is also proposed as the source of psychic energy. This is further advanced to get an insight of human consciousness (the being of mind) and functions of mind (the becoming of mind) in terms of psychic energy and reversible transformation of its virtual reflection. An alternative analytical insight of human (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. The Ethics of Digital Touch.Nicholas Barrow & Patrick Haggard - manuscript
    This paper aims to outline the foundations for an ethics of digital touch. Digital touch refers to hardware and software technologies, often collectively referred to as ‘haptics’, that provide somatic sensations including touch and kinaesthesis, either as a stand-alone interface to users, or as part of a wider immersive experience. Digital touch has particular promise in application areas such as communication, affective computing, medicine, and education. However, as with all emerging technologies, potential value needs to be considered against potential (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  90
    Optimized Workload Distribution Frameworks for Accelerated Computing Systems.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):550-560.
    Our findings reveal that implementing accelerated computing can achieve substantial improvements, often reducing computation times by more than 60% compared to traditional sequential methods. This paper details the experimental setup, including algorithm selection and parallelization techniques, and discusses the role of memory bandwidth and latency in achieving optimal performance. Based on the analysis, we propose a streamlined methodology to guide the deployment of accelerated computing frameworks in various industries. Concluding with a discussion on future directions, we highlight potential advancements in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  40
    An A-theory Falsifiable Prediction and A-theory Clocks.Paul Merriam & M. A. Z. Habeeb - manuscript
    This paper presents a falsifiable prediction based on A-theories of time, which require both an A-series (future/present/past) and B-series (earlier/simultaneous/later) of time. We make an unusual argument based on the temporal search parameters of YouTube videos, which requires *two* parameters. We make the falsifiable prediction that no interface with just *one* parameter can be made that has the same functionality (as would be asserted in B-theories). This circumstance applies to many areas of human endeavor. We extend this analysis to clocks, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40.  79
    Parallel Processing Techniques for Optimizing Data-Intensive Applications on Accelerated Computing Platforms.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):540-550.
    Our findings reveal that implementing accelerated computing can achieve substantial improvements, often reducing computation times by more than 60% compared to traditional sequential methods. This paper details the experimental setup, including algorithm selection and parallelization techniques, and discusses the role of memory bandwidth and latency in achieving optimal performance. Based on the analysis, we propose a streamlined methodology to guide the deployment of accelerated computing frameworks in various industries. Concluding with a discussion on future directions, we highlight potential advancements in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. A Unified Cognitive Model of Visual Filling-In Based on an Emergic Network Architecture.David Pierre Leibovitz - 2013 - Dissertation, Carleton University
    The Emergic Cognitive Model (ECM) is a unified computational model of visual filling-in based on the Emergic Network architecture. The Emergic Network was designed to help realize systems undergoing continuous change. In this thesis, eight different filling-in phenomena are demonstrated under a regime of continuous eye movement (and under static eye conditions as well). -/- ECM indirectly demonstrates the power of unification inherent with Emergic Networks when cognition is decomposed according to finer-grained functions supporting change. These can interact to raise (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Nuevas tecnologías en el proceso de enseñanza-aprendizaje.Paulo Vélez-León & Yohana Yaguana Castillo (eds.) - 2019 - Loja, Ecuador: Universidad Técnica Particular de Loja.
    Este volumen contiene los trabajos presentados en el I Simposio de Pensamiento Contemporáneo, celebrado en la Universidad Técnica Particular de Loja (UTPL) durante los días 23 y 24 de enero de 2019 y cuyo tema central fue las «Nuevas Tecnologías en la Educación» (SPC–NTE). Este Simposio tuvo como objetivo fomentar la interacción entre personas de diferentes formaciones e intereses en la discusión de problemas y soluciones relevantes para la educación en la era digital, a fin de intercambiar ideas sobre prácticas (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. The problem of AI identity.Soenke Ziesche & Roman V. Yampolskiy - manuscript
    The problem of personal identity is a longstanding philosophical topic albeit without final consensus. In this article the somewhat similar problem of AI identity is discussed, which has not gained much traction yet, although this investigation is increasingly relevant for different fields, such as ownership issues, personhood of AI, AI welfare, brain–machine interfaces, the distinction between singletons and multi-agent systems as well as to potentially support finding a solution to the problem of personal identity. The AI identity problem analyses the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Problems of Using Autonomous Military AI Against the Background of Russia's Military Aggression Against Ukraine.Oleksii Kostenko, Tyler Jaynes, Dmytro Zhuravlov, Oleksii Dniprov & Yana Usenko - 2022 - Baltic Journal of Legal and Social Sciences 2022 (4):131-145.
    The application of modern technologies with artificial intelligence (AI) in all spheres of human life is growing exponentially alongside concern for its controllability. The lack of public, state, and international control over AI technologies creates large-scale risks of using such software and hardware that (un)intentionally harm humanity. The events of recent month and years, specifically regarding the Russian Federation’s war against its democratic neighbour Ukraine and other international conflicts of note, support the thesis that the uncontrolled use of AI, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. Cómo los siete sociópatas que gobiernan China están ganando la Tercera Guerra Mundial y tres maneras de detenerlos.Michael Starks - 2019 - In Suicidio por la Democracia - un Obituario para América y el Mundo 4ª edición. Las Vegas, NV USA: Reality Press. pp. 52-57.
    Lo primero que debemos tener en cuenta es que cuando decimos que China dice esto o China hace eso, no estamos hablando del pueblo chino, sino de los sociópatas que controlan el PCC -- Partido Comunista Chino, es decir, los Siete Asesinos En Serie Seniláticos (SSSSK) de th e Comité Permanente del PCC o de los 25 miembros del Politburó, etc. -/- Los planes del PCC para la Tercera Guerra Mundial y la dominación total están muy claro en las publicaciones (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. A very brief review of the life and work of neuroscientist, physician, psychoanalyst, inventor, animal rights activist and pioneer in dolphins, isolation tanks and psychedelics John C Lilly 1915-2001.Starks Michael - 2016 - In Michael Starks (ed.), Suicidal Utopian Delusions in the 21st Century: Philosophy, Human Nature and the Collapse of Civilization-- Articles and Reviews 2006-2017 2nd Edition Feb 2018. Las Vegas, USA: Reality Press. pp. 577-580.
    Lilly was one of the greatest scientists and pioneers on the limits of human possibility but after his death a collective amnesia has descended and he is now almost forgotten. His Wiki is good but inevitably incomplete so here are a few missing details and viewpoints. Lilly was a generation (or more) ahead of his time. He is almost single-handedly responsible for the great interest in dolphins (which led to the Marine Mammal Protection Act in the USA and helped to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Artificial in its own right.Keith Elkin - manuscript
    Artificial Cells, , Artificial Ecologies, Artificial Intelligence, Bio-Inspired Hardware Systems, Computational Autopoiesis, Computational Biology, Computational Embryology, Computational Evolution, Morphogenesis, Cyborgization, Digital Evolution, Evolvable Hardware, Cyborgs, Mathematical Biology, Nanotechnology, Posthuman, Transhuman.
    Download  
     
    Export citation  
     
    Bookmark  
  48. Megadatele (Big Data) pe Internet.Sfetcu Nicolae - 2022 - It and C 1 (1):23-27.
    Termenul Big Data se referă la extragerea, manipularea și analiza unor seturi de date care sunt prea mari pentru a fi tratate în mod obișnuit. Din această cauză se utilizează software special și, în multe cazuri, și calculatoare și echipamente hardware special dedicate. În general la aceste date analiza se face statistic. Pe baza analizei datelor respective se fac de obicei predicții ale unor grupuri de persoane sau alte entități, pe baza comportamentului acestora în diverse situații și folosind tehnici (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. A Review Paper on Internet of Things and it’s Applications.A. K. Sarika, Dr Vinit & Mrs Asha Durafe - 2019 - International Research Journal of Engineering and Technology 6 (06):1623 - 1630.
    Internet, a revolutionary invention, is always transforming into some new kind of hardware and software making it unpreventable for anyone. The type of communication that we see today is either human-to-human or human-to-device, but the Internet of Things (IoT) promises a great future for the internet where the type of communication is machine-to-machine (M2M). The Internet of Things (IoT) is defined as a paradigm in which objects provide with sensors, actuators, and processors communicate with each other to serve a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Automatic Control for Home Applications using IoT.R. Veeramani - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):101-110.
    Smart home has become more and more popular in recent years. Due to the rapid development in the field of the Automation industry, human life is becoming more advanced and better in all aspects. In the present scenario, Automated systems are being preferred over the non-automated system. With the rapid growth in the number of consumers using the internet over the past years, the Internet has become an important part of life, and IoT is the newest and emerging internet technology. (...)
    Download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 68