Results for 'Software components'

993 found
Order:
  1. Minisymposia-VIII Advanced Algorithms and Software Components for Scientific Computing-Software Architecture Issues in Scientific Component Development.Boyana Norris - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 3732--629.
     
    Export citation  
     
    Bookmark  
  2. International Workshop on Web-Based Internet Computing for Science and Engineering (ICSE 2006)-Component Composition Based on Web Service and Software Architecture.Xin Wang, Changsong Sun, Xiaojian Liu & Bo Xu - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 987-990.
     
    Export citation  
     
    Bookmark  
  3.  37
    Computer‐aided disease prediction system: development of application software with SAS component language.Chi-Ming Chang, Hsu-Sung Kuo, Shu-Hui Chang, Hong-Jen Chang, Der-Ming Liou, Tabar Laszlo & Tony Hsiu-Hsi Chen - 2005 - Journal of Evaluation in Clinical Practice 11 (2):139-159.
  4.  13
    Software Engineering Ethics.Daniela Marcu, Dan Laurenţiu Milici & Mirela Danubianu - 2020 - Postmodern Openings 11 (4):248-261.
    Over the past 30 years, computer engineering has developed a lot. Currently, computer and software applications have a central role in business, medicine, security, communications, industry, education, and everyday life. Software developers, peoples who manage computer networks, data security analysts can do well, but they also have the potential to cause suffering and harm to the clients or ordinary peoples, willingly or not. For this reason, IT activities must be regulated by specific laws. From the beginning, we argue (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  99
    Fighting Software Piracy: Which Governance Tools Matter in Africa?Antonio R. Andrés & Simplice A. Asongu - 2013 - Journal of Business Ethics 118 (3):667-682.
    This article integrates previously missing components of government quality into the governance-piracy nexus in exploring governance mechanisms by which global obligations for the treatment of IPRs are effectively transmitted from international to the national level in the battle against piracy. It assesses the best governance tools in the fight against piracy and upholding of intellectual property rights (IPRs). The instrumentality of IPR laws (treaties) in tackling piracy through good governance mechanisms is also examined. Findings demonstrate that: (1) while all (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  6.  24
    Software Tool for Seismic Data Recorder and Analyser.Satish Kumar, Raman K. Attri, B. K. Sharma & M. A. Shamshi - 2000 - Iete Journal of Education 41 (1-2):23-30.
    Design and Development of software controlled stand-alone instruments have been identified as the most vital component of national and international programs on earthquake hazard and risk management. For in depth investigation and studies, the development of precise instruments designed around computer is emerging very fast. Interfacing of personal computer with seismic instrument is an important design task. A design technique based on minimum hardware has been worked out around the parallel printer interface of computer. Hardware and Software for (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  84
    Predicting the Use of Pirated Software: A Contingency Model Integrating Perceived Risk with the Theory of Planned Behavior.Chechen Liao, Hong-Nan Lin & Yu-Ping Liu - 2010 - Journal of Business Ethics 91 (2):237-252.
    As software piracy continues to be a threat to the growth of national and global economies, understanding why people continue to use pirated software and learning how to discourage the use of pirated software are urgent and important issues. In addition to applying the theory of planned behavior (TPB) perspective to capture behavioral intention to use pirated software, this paper considers perceived risk as a salient belief influencing attitude and intention toward using pirated software. Four (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  8.  2
    A comparative study of neural network architectures for software vulnerability forecasting.Ovidiu Cosma, Petrică C. Pop & Laura Cosma - forthcoming - Logic Journal of the IGPL.
    The frequency of cyberattacks has been rapidly increasing in recent times, which is a significant concern. These attacks exploit vulnerabilities present in the software components that constitute the targeted system. Consequently, the number of vulnerabilities within these software components serves as an indicator of the system’s level of security and trustworthiness. This paper compares the accuracy, trainability and stability to configuration parameters of several neural network architectures, namely Long Short-Term Memory, Multilayer Perceptron and Convolutional Neural Network. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9. Ethics in information technology and software use.Vincent J. Calluzzo & Charles J. Cante - 2004 - Journal of Business Ethics 51 (3):301-312.
    The emerging concern about software piracy and illegal or unauthorized use of information technology and software has been evident in the media and open literature for the last few years. In the course of conducting their academic assignments, the authors began to compare observations from classroom experiences related to ethics in the use of software and information technology and systems. Qualitatively and anecdotally, it appeared that many if not most, students had misconceptions about what represented ethical and (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   9 citations  
  10.  53
    Machine Code and Metaphysics: A Perspective on Software Engineering.Lindsay Smith, Vito Veneziano & Paul Wernick - 2015 - Philosophies 1 (1):28--39.
    A major, but too-little-considered problem for Software Engineering is a lack of consensus concerning Computer Science and how this relates to developing unpredictable computing technology. We consider some implications for SE of computer systems differing scientific basis, exemplified with the International Standard Organisations Open Systems Interconnection layered architectural model. An architectural view allows comparison of computing technology components facilitating a view of computing as a continuum. For example, at one layer of computer architecture, components written in Turing-complete (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11.  12
    The material consequences of “chipification”: The case of software-embedded cars.M. C. Forelle - 2022 - Big Data and Society 9 (1).
    Today's modern car is an assemblage of mechanical and digital components, of metal panels that comprise its structure and silicon chips that run its functions. Communication and information studies scholars have interrogated the problematic aspects of the programs that run those functions, revealing serious issues surrounding privacy and security, worker surveillance, and racial, gendered, and class-based bias. This article contributes to that work by taking a step back and asking about the issues inherent not in the software running (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  12.  33
    Predicting Accounting Students’ Intentions to Engage in Software and Music Piracy.Philmore Alleyne, Sherlexis Soleyn & Terry Harris - 2015 - Journal of Academic Ethics 13 (4):291-309.
    The purpose of this study is to investigate the salient factors that influence accounting students to engage in software and music piracy. This study uses the theory of reasoned action and the theory of planned behavior, and extends these models to incorporate other variables to predict individuals’ behavioral intentions. Specifically, we hypothesize that attitudes toward the behavior, subjective norms, perceived behavioral control, moral obligation and perceived prosecution risk influence intentions to engage in software and music piracy. Data were (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  13.  58
    TheEvolve project: Component-based tailorability for CSCW applications. [REVIEW]Oliver Stiemerling & Armin B. Cremers - 2000 - AI and Society 14 (1):120-141.
    platform, whose design concepts are described. Furthermore, a concrete example for the application of the approach to the design of a tailorable distributed coordination tool is given. We discuss related work, summarise the current state of the component-based tailorability approach and propose venues of further research.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  14. A user profiling component with the aid of user ontologies.Nébel István-Tibor, Barry Smith & Paschke Ralf - 2003 - In Nébel István-Tibor, Barry Smith & Paschke Ralf (eds.), Learning – Teaching – Knowledge – Adaptivity (LLWA), University of Karlsruhe (2003). Karlsruhe, Germany:
    Abstract: What follows is a contribution to the field of user modeling for adaptive teaching and learning programs especially in the medical field. The paper outlines existing approaches to the problem of extracting user information in a form that can be exploited by adaptive software. We focus initially on the so-called stereotyping method, which allocates users into classes adaptively, reflecting characteristics such as physical data, social background, and computer experience. The user classifications of the stereotyping method are however ad (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  15.  6
    Matching Subsequence Music Retrieval in a Software Integration Environment.Zhencong Li, Qin Yao & Wanzhi Ma - 2021 - Complexity 2021:1-12.
    This paper firstly introduces the basic knowledge of music, proposes the detailed design of a music retrieval system based on the knowledge of music, and analyzes the feature extraction algorithm and matching algorithm by using the features of music. Feature extraction of audio data is the important research of this paper. In this paper, the main melody features, MFCC features, GFCC features, and rhythm features, are extracted from audio data and a feature fusion algorithm is proposed to achieve the fusion (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  16.  97
    Mind as hardware and matter as software.Jan-Markus Schwindt - 2008 - Journal of Consciousness Studies 15 (4):5-27.
    We present an argument against physicalism in two steps: 1) Physics reduces the world to a mathematical structure; 2) The notion of 'structure' only makes sense when carried by something and interpreted by something else. Physicalism does not allow such a carrier and interpreter at a fundamental level, hence it must be wrong. An extended notion of Mind is presented as the fundamental 'hardware' which is necessary by the argument. In particular, qualia correspond to the 'monitor component' of mind. Some (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  17.  3
    A hybrid machine learning system to impute and classify a component-based robot.Nuño Basurto, Ángel Arroyo, Carlos Cambra & Álvaro Herrero - 2023 - Logic Journal of the IGPL 31 (2):338-351.
    In the field of cybernetic systems and more specifically in robotics, one of the fundamental objectives is the detection of anomalies in order to minimize loss of time. Following this idea, this paper proposes the implementation of a Hybrid Intelligent System in four steps to impute the missing values, by combining clustering and regression techniques, followed by balancing and classification tasks. This system applies regression models to each one of the clusters built on the instances of data set. Subsequently, a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  18.  13
    Percentiles and Principal Component Analysis of Physical Fitness From a Big Sample of Children and Adolescents Aged 6-18 Years: The DAFIS Project. [REVIEW]Eliseo Iglesias-Soler, María Rúa-Alonso, Jessica Rial-Vázquez, Jose Ramón Lete-Lasa, Iván Clavel, Manuel A. Giráldez-García, Javier Rico-Díaz, Miguel Rodríguez-Del Corral, Eduardo Carballeira-Fernández & Xurxo Dopico-Calvo - 2021 - Frontiers in Psychology 12.
    Assessing physical fitness has emerged as a proxy of the health status of children and adolescents and therefore as relevant from a public health point of view. DAFIS is a project included in Plan Galicia Saudable of the regional government of Galicia. DAFIS consists of an on-line software devoted to record the results of a standard physical fitness protocol carried out as a part of the physical education curriculum. The aims of this study were: to obtain normative values of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  28
    Software engineering code of ethics and professional practice: version 4.Corporate Ieee-cs-acm Joint Task Force On Software Engineering Ethics - 1998 - Acm Sigcas Computers and Society 28 (2):29-32.
  20.  9
    Optimization of Cross-Border e-Commerce Logistics Supervision System Based on Internet of Things Technology.Pingping Sun & Lingang Gu - 2021 - Complexity 2021:1-11.
    Based on the Internet of Things technology, this paper proposes building a cross-border e-commerce logistics supervision system and determines the evaluation index system from the overall framework design of the system, supply chain supervision process optimization, risk supervision optimization, and system order degree optimization. First of all, the framework adopts the national certification center to supervise the logistics service platform and logistics service platform to supervise the logistics participants of the secondary supervision system. Then, functions such as swarm intelligence contract, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  33
    The Java Virtual Machine Specification: Java SE 17 Edition.Tim Lindholm, Frank Yellin, Gilad Bracha, Alex Buckley & Daniel Smith - 1999 - Prentice-Hall.
    The Java® programming language is a general-purpose, concurrent, object-oriented language. Its syntax is similar to C and C++, but it omits many of the features that make C and C++ complex, confusing, and unsafe. The Java platform was initially developed to address the problems of building software for networked consumer devices. It was designed to support multiple host architectures and to allow secure delivery of software components. To meet these requirements, compiled code had to survive transport across (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  22.  12
    Technology for determining the speed of cars using a smartphone.Sabelnikov P. Y. & Sabelnikov Y. A. - 2020 - Artificial Intelligence Scientific Journal 25 (2):31-40.
    In the article the possibility of using a smartphone with an integrated set of necessary technical means for implementing the technology of video recording of vehicle speed is investigated and established. The main algorithmic and software components of a smartphone are proposed, which allow to identify and to accompany a vehicle, as well as to determine its speed. Installation and initial setup of the device is simple. It is only necessary to measure and enter in the device height (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  31
    Tripping through runtime.Valentina Vuksic - 2012 - AI and Society 27 (2):325-327.
    “ Tripping through ” is an invitation to plunge into the invisible relationships of hard and soft computer matter through sensuous mediation. The projects outlined are designed to provoke and capture the specific behavior of individual computer components through the use of appropriate software fragments. If one approaches a digital apparatus with a transducer that transforms electromagnetic fields into acoustic waves, the analytical sphere is changed into concrete acoustical phenomena and enters the world of sensation (electromagnetic emissions can (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  24. Ontological theory for ontological engineering: Biomedical systems information integration.James M. Fielding, Jonathan Simon, Werner Ceusters & Barry Smith - 2004 - In Fielding James M., Simon Jonathan, Ceusters Werner & Smith Barry (eds.), Proceedings of the Ninth International Conference on the Principles of Knowledge Representation and Reasoning (KR2004), Whistler, BC, 2-5 June 2004. pp. 114–120.
    Software application ontologies have the potential to become the keystone in state-of-the-art information management techniques. It is expected that these ontologies will support the sort of reasoning power required to navigate large and complex terminologies correctly and efficiently. Yet, there is one problem in particular that continues to stand in our way. As these terminological structures increase in size and complexity, and the drive to integrate them inevitably swells, it is clear that the level of consistency required for such (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  25.  36
    From Monitors to Monitors: A Primitive History.Troy K. Astarte - 2024 - Minds and Machines 34 (1):51-71.
    As computers became multi-component systems in the 1950s, handling the speed differentials efficiently was identified as a major challenge. The desire for better understanding and control of ‘concurrency’ spread into hardware, software, and formalism. This paper examines the way in which the problem emerged and was handled across various computing cultures from 1955 to 1985. In the machinic culture of the late 1950s, system programs called ‘monitors’ were used for directly managing synchronisation. Attempts to reframe synchronisation in the subsequent (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26.  61
    Artificial institutions: A model of institutional reality for open multiagent systems. [REVIEW]Nicoletta Fornara, Francesco Viganò, Mario Verdicchio & Marco Colombetti - 2008 - Artificial Intelligence and Law 16 (1):89-105.
    Software agents’ ability to interact within different open systems, designed by different groups, presupposes an agreement on an unambiguous definition of a set of concepts, used to describe the context of the interaction and the communication language the agents can use. Agents’ interactions ought to allow for reliable expectations on the possible evolution of the system; however, in open systems interacting agents may not conform to predefined specifications. A possible solution is to define interaction environments including a normative component, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  27.  9
    Judging 2003's Ideas: The Most Overrated and Underrated.Jaron Lanier - unknown
    An essential component of beauty is being undermined and will soon be practically eliminated, and that is scarcity. Botox is to cosmetics what cut-and-paste software is to music production. Whatever was precious five minutes ago becomes overbearingly omnipresent five minutes from now. The quest for beauty coupled with technological proficiency undermines the relative value of each beautiful invention. Find beauty in nature, but when it comes to culture, it's time to forget beauty. It will soon be nothing more than (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  28. On the morality of artificial agents.Luciano Floridi & J. W. Sanders - 2004 - Minds and Machines 14 (3):349-379.
    Artificial agents (AAs), particularly but not only those in Cyberspace, extend the class of entities that can be involved in moral situations. For they can be conceived of as moral patients (as entities that can be acted upon for good or evil) and also as moral agents (as entities that can perform actions, again for good or evil). In this paper, we clarify the concept of agent and go on to separate the concerns of morality and responsibility of agents (most (...)
    Direct download (17 more)  
     
    Export citation  
     
    Bookmark   292 citations  
  29.  5
    Децентрація Автентичного Авторитетного Автора.Георгій Храбров - 2023 - Вісник Харківського Національного Університету Імені В. Н. Каразіна. Серія «Філософія. Філософські Перипетії» 68:52-59.
    The article manifests and analyzes the process of decentration of the Author, which corresponds to a number of trends, such as: decentration of the subject, dividualization, decentralization of information systems, etc., which determine contemporary transformations of the Lifeworld of a human, who appears precisely as a decentralized, multilayered, split, multiple being. It is noted that the model of authorship, which was constituted according to the concept of a centered/holistic subject/individual, which, in particular, is embodied in copyright, needs to be reconsidered. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  30. The mismeasure of machine: Synthetic biology and the trouble with engineering metaphors.Maarten Boudry & Massimo Pigliucci - 2013 - Studies in History and Philosophy of Science Part C: Studies in History and Philosophy of Biological and Biomedical Sciences (4):660-668.
    The scientific study of living organisms is permeated by machine and design metaphors. Genes are thought of as the ‘‘blueprint’’ of an organism, organisms are ‘‘reverse engineered’’ to discover their func- tionality, and living cells are compared to biochemical factories, complete with assembly lines, transport systems, messenger circuits, etc. Although the notion of design is indispensable to think about adapta- tions, and engineering analogies have considerable heuristic value (e.g., optimality assumptions), we argue they are limited in several important respects. In (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   19 citations  
  31.  67
    Regulation of genomic and biobanking research in Africa: a content analysis of ethics guidelines, policies and procedures from 22 African countries.Jantina de Vries, Syntia Nchangwi Munung, Alice Matimba, Sheryl McCurdy, Odile Ouwe Missi Oukem-Boyer, Ciara Staunton, Aminu Yakubu & Paulina Tindana - 2017 - BMC Medical Ethics 18 (1):1-9.
    The introduction of genomics and biobanking methodologies to the African research context has also introduced novel ways of doing science, based on values of sharing and reuse of data and samples. This shift raises ethical challenges that need to be considered when research is reviewed by ethics committees, relating for instance to broad consent, the feedback of individual genetic findings, and regulation of secondary sample access and use. Yet existing ethics guidelines and regulations in Africa do not successfully regulate research (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  32. The Impact of Management Requirements and Operations of Computerized MIS to Improve Performance.Samy S. Abu Naser & Mazen J. Al Shobaki - 2016 - Al-Azhar University of Gaza, Palestine 1:1-28.
    The research aims to identify the impact of the management requirements on operating of computerized management information systems to improve performance, and discuss the perceptions of respondents to develop the performance of employees in the Gaza Electricity Distribution Company, the researchers used the stratified sample method, (360) questionnaires were distributed on the study sample, (306) questionnaires were recovered with a percentage of (85%). The most important findings of the study: computerized MI have a positive impact on the development of performance (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  22
    What Happens After a Neural Implant Study? Neuroethics Expert Workshop on Post-Trial Obligations.Ishan Dasgupta, Eran Klein, Laura Y. Cabrera, Winston Chiong, Ashley Feinsinger, Joseph J. Fins, Tobias Haeusermann, Saskia Hendriks, Gabriel Lázaro-Muñoz, Cynthia Kubu, Helen Mayberg, Khara Ramos, Adina Roskies, Lauren Sankary, Ashley Walton, Alik S. Widge & Sara Goering - 2024 - Neuroethics 17 (2):1-14.
    What happens at the end of a clinical trial for an investigational neural implant? It may be surprising to learn how difficult it is to answer this question. While new trials are initiated with increasing regularity, relatively little consensus exists on how best to conduct them, and even less on how to ethically end them. The landscape of recent neural implant trials demonstrates wide variability of what happens to research participants after an neural implant trial ends. Some former research participants (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  34. The mismeasure of machine: Synthetic biology and the trouble with engineering metaphors.Maarten Boudry & Massimo Pigliucci - 2013 - Studies in History and Philosophy of Science Part C: Studies in History and Philosophy of Biological and Biomedical Sciences 44 (4):660-668.
    The scientific study of living organisms is permeated by machine and design metaphors. Genes are thought of as the ‘‘blueprint’’ of an organism, organisms are ‘‘reverse engineered’’ to discover their functionality, and living cells are compared to biochemical factories, complete with assembly lines, transport systems, messenger circuits, etc. Although the notion of design is indispensable to think about adaptations, and engineering analogies have considerable heuristic value (e.g., optimality assumptions), we argue they are limited in several important respects. In particular, the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   18 citations  
  35. The Impact of Management Requirements and Operations of Computerized Management Information Systems to Improve Performance (Practical Study on the employees of the company of Gaza Electricity Distribution).Samy S. Abu Naser & Mazen J. Al Shobaki - 2016 - Al-Azhar University, Gaza 1 (1):1-28.
    The research aims to identify the impact of the management requirements on operating of computerized management information systems to improve performance, and discuss the perceptions of respondents to develop the performance of employees in the Gaza Electricity Distribution Company, the researchers used the stratified sample method, (360) questionnaires were distributed on the study sample, (306) questionnaires were recoved with a percentage of (85%). The most important findings of the study: computerized MI have a positive impact on the development of performance (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  36.  83
    Must we remain blind to undergraduate medical ethics education in Africa? A cross-sectional study of Nigerian medical students.Onochie Okoye, Daniel Nwachukwu & Ferdinand C. Maduka-Okafor - 2017 - BMC Medical Ethics 18 (1):1-8.
    As the practice of medicine inevitably raises both ethical and legal issues, it had been recommended since 1999 that medical ethics and human rights be taught at every medical school. Most Nigerian medical schools still lack a formal undergraduate medical ethics curriculum. Medical education remains largely focused on traditional medical science components, leaving the medical students to develop medical ethical decision-making skills and moral attitudes passively within institutions noted for relatively strong paternalistic traditions. In conducting a needs assessment for (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  37.  7
    Культурні маркери світоглядного потенціалу гуманітарної освіти в умовах мовленнєвої глобалізації ххі століття.Тетяна Миколаївна Черниш - 2016 - Гуманітарний Вісник Запорізької Державної Інженерної Академії 65:153-163.
    The article analyzes the cultural markers of potential ideological liberal education, providing treatment to identify the "code" of cultural development. Studied liberal arts education, which aims to give a holistic worldview determined cultural markers of the information society, globalization. Humanitarian education designed to justify a new dialogue with nature as the noosphere. The place and role of speech globalization as a process of active interpenetration of languages in the context of globalization, characterized by the dominance of the English language. Thanks (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  8
    Investigation of Kurdish students’ L2 motivational self-system and their motivational beliefs in high school.Kameran Noori Abdullah & Özge Razi - 2022 - Frontiers in Psychology 13.
    This study aims to examine and compare female and male Kurdish EFL students’ level and type of motivation based on L2 motivational self-system components and to identify their dominant type of motivation. The participants of this study were 118 students were randomly selected as the participants of this study from different cities of Erbil governorate in Kurdistan region of Iraq. A Learners questionnaire used following the application of semi-structured interview sessions with learners who participated in the study. The data (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  15
    日常言語コンピューティング (第2報)―日常言語に基づく計算機資源の管理・実行環境を目指して―.小林 一郎 岩爪 道昭 - 2003 - Transactions of the Japanese Society for Artificial Intelligence 18:45-56.
    The a Everyday language computing is a new computational paradigm that all people, from small children to aged persons, can access and use computing systems with his/her own everyday language. As a way to realize ELC, we proposed a framework of language-based operating system, and we are now working intensively to develop the fundamental part of it. In this paper, we report our status of research on LOS. One of the main components of LOS is the semiotic base, which (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40.  8
    Design and Realization of Animation Composition and Tone Space Conversion Algorithm.Liang Jing - 2021 - Complexity 2021:1-11.
    In recent years, with the development of society and the rapid development of the animation industry, people are paying more and more attention to and requirements for animation production. As an indispensable part of animation production, picture composition plays a major role in animation production. It can give full play to the application of color matching and light and shadow design and enhance the depth and space of the animation screen. Tone space conversion refers to the conversion or representation of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41. Social Machinery and Intelligence.Nello Cristianini, James Ladyman & Teresa Scantamburlo - manuscript
    Social machines are systems formed by technical and human elements interacting in a structured manner. The use of digital platforms as mediators allows large numbers of human participants to join such mechanisms, creating systems where interconnected digital and human components operate as a single machine capable of highly sophisticated behaviour. Under certain conditions, such systems can be described as autonomous and goal-driven agents. Many examples of modern Artificial Intelligence (AI) can be regarded as instances of this class of mechanisms. (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  42.  47
    Biophilia and Biophobia as Emotional Attribution to Nature in Children of 5 Years Old.Pablo Olivos-Jara, Raquel Segura-Fernández, Cristina Rubio-Pérez & Beatriz Felipe-García - 2020 - Frontiers in Psychology 11.
    Introduction: Connectedness to nature is a concept that reflects the emotional relationship between the self and the natural environment, based on the theory of biophilia, the innate predisposition to the natural environment. However, the biophobic component has largely been ignored, despite, given its adaptive functional role, being an essential part of the construct. If there is a phylogenetic component underlying nature connectedness, biophilic and/or biophobic, there should be evidence of this record from early childhood. The main aim of this study (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  43. Massive redeployment, exaptation, and the functional integration of cognitive operations.Michael L. Anderson - 2007 - Synthese 159 (3):329 - 345.
    Abstract: The massive redeployment hypothesis (MRH) is a theory about the functional topography of the human brain, offering a middle course between strict localization on the one hand, and holism on the other. Central to MRH is the claim that cognitive evolution proceeded in a way analogous to component reuse in software engineering, whereby existing components-originally developed to serve some specific purpose-were used for new purposes and combined to support new capacities, without disrupting their participation in existing programs. (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   24 citations  
  44.  50
    Gandhian design for the development of Braille printers. The contribution of Industrial Design.Federico Del Giorgio Solfa, Guido Amendolaggine, Florencia Tenorio & Sofia Lara Marozzi - 2019 - Innovación y Desarrollo Tecnológico y Social (Idts) 1 (2):16-27.
    The study, design and development of a low-cost digital braille printer is boarded with a transdisciplinary approach. The main challenge was focused on reducing significantly the high cost of this type of printers and their printing services. This context is aggravated with the low commercialization of these products in the country, a factor that makes the access of these tools -that are essential to much of the low and middle sectors of the Argentine social structure- even more difficult. An interdisciplinary (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  45.  20
    Iranian nurses and hospitalized teenagers' views of dignity.Nahid Dehghan Nayeri, Rogheyeh Karimi & Tabandeh Sadeghee - 2011 - Nursing Ethics 18 (4):474-484.
    Respect for human dignity is a basic and crucial component of nursing care. Illness with restricted physical ability and being confined to bed can compromise the dignity of patients. The views of adolescents regarding dignity in care have not previously been researched. This article details a descriptive-analytic study in which survey data was collected from all nurses and compared with a convenience sample of 180 hospitalized adolescents in two hospitals in Iran. The data was analyzed with SPSS software. A (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  46.  7
    The role of religious commitment in Islamic teachings in social responsibility of Iraqi Muslims.Rohmad Rohmad, Saad Ghazi Talib, Nur Aisyah, Dhameer A. Mutlak, Ngakan Ketut Acwin Dwijendra & Ali Thaeer Hammid - 2022 - HTS Theological Studies 78 (1):7.
    Considering the changing face of today’s business environment and the importance of corporate social performance evaluation along with adherence to religious teachings, studies on how social organisations affect societies, mainly Islamic ones, have received much attention in recent years. Corporate social responsibility (CSR) here represents the wide variety of activities, volunteered by business owners and investors as the effective members of societies. In fact, it refers to the duties and responsibilities undertaken by organisations in order to maintain and help their (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  47. Cyborg Life: The In-Between of Humans and Machines.Glen A. Mazis - 2008 - PhaenEx 3 (2):14-36.
    Cyborgs are ongoing becomings of a doubly “in-between” temporality of humans and machines. Materially made from components of both sorts of beings, cyborgs gain increasing function through an interweaving in which each alters the other, from the level of “neural plasticity” to software updates to emotional breakthroughs of which both are a part. One sort of temporal in-between is of the progressive unfolding of a deepening becoming as “not-one-not-two” and the other is a “doubling back” of time into (...)
    Direct download (16 more)  
     
    Export citation  
     
    Bookmark  
  48.  49
    Intelligent agents and contracts: Is a conceptual rethink imperative? [REVIEW]Emad Abdel Rahim Dahiyat - 2007 - Artificial Intelligence and Law 15 (4):375-390.
    The emergence of intelligent software agents that operate autonomously with little or no human intervention has generated many doctrinal questions at a conceptual level and has challenged the traditional rules of contract especially those relating to the intention as an essential requirement of any contract conclusion. In this paper, we will try to explore some of these challenges, and shed light on the conflict between the traditional contract theory and the transactional practice in the case of using intelligent (...) agents. We will try further to examine how intelligent software agents differ from other software applications, and consider then how such differences are legally relevant. This paper, however, is not intended to provide the final answer to all questions and challenges in this regard, but to identify the main components, and provide perspectives on how to deal with such issue. (shrink)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  49. Code {poems}.Ishac Bertran - 2012 - Continent 2 (2):148-151.
    continent. 2.2 (2012): 148–151 When things get complex, as they may indeed be getting, the distinction between tools and the things that can be made with them begins to dissolve. The medium is not only also a message, it is an essential counter-valence to our own impulses towards the creation of meaning, beauty and knowledge. The tools we think we are using also use us: They push us around, make us think new things, do new things, even be new things. (...)
    No categories
     
    Export citation  
     
    Bookmark  
  50.  4
    Conceptual model of design in the context of semiotic-interactive methodology.Tigran Olegovich Gabrielyan - forthcoming - Philosophy and Culture (Russian Journal).
    The subject of the research is a modern graphic and communicative design, in the context of changing existing and forming new roles of communicators, transforming the communication model, forming a semiotic communication format. The object of the research is modern graphic and communicative design, as well as their traditional, digital and generative subdirections. Design beginning to have digital, semiotic-interactive and artificially intelligent characteristics. The author examines in detail such aspects of the topic as: dialogical, semiotic-interactive qualities of design solutions; digital, (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 993