Results for 'software error'

987 found
Order:
  1.  40
    The uniqueness of software errors and their impact on global policy.Don Gotterbarn - 1998 - Science and Engineering Ethics 4 (3):351-356.
    The types of errors that emerge in the development and maintenance of software are essentially different from the types of errors that emerge in the development and maintenance of engineered hardware products. There is a set of standard responses to actual and potential hardware errors, including: engineering ethics codes, engineering practices, corporate policies and laws. The essential characteristics of software errors require new ethical, policy, and legal approaches to the development of software in the global arena.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  27
    Understanding Error Rates in Software Engineering: Conceptual, Empirical, and Experimental Approaches.Jack K. Horner & John Symons - 2019 - Philosophy and Technology 32 (2):363-378.
    Software-intensive systems are ubiquitous in the industrialized world. The reliability of software has implications for how we understand scientific knowledge produced using software-intensive systems and for our understanding of the ethical and political status of technology. The reliability of a software system is largely determined by the distribution of errors and by the consequences of those errors in the usage of that system. We select a taxonomy of software error types from the literature on (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  3.  10
    Software Bug Detection Causes a Shift From Bottom-Up to Top-Down Effective Connectivity Involving the Insula Within the Error-Monitoring Network.Joao Castelhano, Isabel C. Duarte, Ricardo Couceiro, Julio Medeiros, Joao Duraes, Sónia Afonso, Henrique Madeira & Miguel Castelo-Branco - 2022 - Frontiers in Human Neuroscience 16.
    The neural correlates of software programming skills have been the target of an increasing number of studies in the past few years. Those studies focused on error-monitoring during software code inspection. Others have studied task-related cognitive load as measured by distinct neurophysiological measures. Most studies addressed only syntax errors. However, a recent functional MRI study suggested a pivotal role of the insula during error-monitoring when challenging deep-level analysis of code inspection was required. This raised the hypothesis (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  71
    Software Intensive Science.John Symons & Jack Horner - 2014 - Philosophy and Technology 27 (3):461-477.
    This paper argues that the difference between contemporary software intensive scientific practice and more traditional non-software intensive varieties results from the characteristically high conditionality of software. We explain why the path complexity of programs with high conditionality imposes limits on standard error correction techniques and why this matters. While it is possible, in general, to characterize the error distribution in inquiry that does not involve high conditionality, we cannot characterize the error distribution in inquiry (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   21 citations  
  5.  28
    Open source software and software patents: A constitutional perspective.Bryan Pfaffenberger - 1999 - Knowledge, Technology & Policy 12 (3):94-112.
    Imagine if each square of pavement on the sidewalk had an owner, and pedestrians required a license to step on it. Imagine the negotiations necessary to walk an entire block under this system. That is what writing a program will be like if software patents continue. The sparks of creativity and individualism that have driven the computer revolution will be snuffed out. Imagine if each square of pavement on the sidewalk had an owner, and pedestrians required a license to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  6.  71
    Can we trust Big Data? Applying philosophy of science to software.John Symons & Ramón Alvarado - 2016 - Big Data and Society 3 (2).
    We address some of the epistemological challenges highlighted by the Critical Data Studies literature by reference to some of the key debates in the philosophy of science concerning computational modeling and simulation. We provide a brief overview of these debates focusing particularly on what Paul Humphreys calls epistemic opacity. We argue that debates in Critical Data Studies and philosophy of science have neglected the problem of error management and error detection. This is an especially important feature of the (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  7. Not all codes are created equal: The software engineering code of ethics, a success story. [REVIEW]Don Gotterbarn - 1999 - Journal of Business Ethics 22 (1):81 - 89.
    There has been a transition in the way software developers work. Mistakes in software have been treated as "normal" occurrences. "All software has bugs." However, software engineering is an emerging profession which as a profession has now said that a caviler approach to software errors is unacceptable. They have asserted a very strong ethical position in the Software Engineering Code of Ethics and Professional Practice, a position which mandates concern for all those affected by (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  8.  71
    Investigating Tree Family Machine Learning Techniques for a Predictive System to Unveil Software Defects.Rashid Naseem, Bilal Khan, Arshad Ahmad, Ahmad Almogren, Saima Jabeen, Bashir Hayat & Muhammad Arif Shah - 2020 - Complexity 2020:1-21.
    Software defects prediction at the initial period of the software development life cycle remains a critical and important assignment. Defect prediction and correctness leads to the assurance of the quality of software systems and has remained integral to study in the previous years. The quick forecast of imperfect or defective modules in software development can serve the development squad to use the existing assets competently and effectively to provide remarkable software products in a given short (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9. The Penn lambda calculator: Pedagogical software for natural language semantics.Maribel Romero - manuscript
    This paper describes a novel pedagogical software program that can be seen as an online companion to one of the standard textbooks of formal natural language semantics, Heim and Kratzer (1998). The Penn Lambda Calculator is a multifunctional application designed for use in standard graduate and undergraduate introductions to formal semantics: Teachers can use the application to demonstrate complex semantic derivations in the classroom and modify them interactively, and students can use it to work on problem sets provided by (...)
     
    Export citation  
     
    Bookmark   3 citations  
  10.  25
    Detection, exploitation and mitigation of memory errors.Oscar Llorente-Vazquez, Igor Santos-Grueiro, Iker Pastor-Lopez & Pablo Garcia Bringas - 2024 - Logic Journal of the IGPL 32 (2):281-292.
    Software vulnerabilities are the root cause for a multitude of security problems in computer systems. Owing to their efficiency and tight control over low-level system resources, the C and C++ programming languages are extensively used for a myriad of purposes, from implementing operating system kernels to user-space applications. However, insufficient or improper memory management frequently leads to invalid memory accesses, eventually resulting in memory corruption vulnerabilities. These vulnerabilities are used as a foothold for elaborated attacks that bypass existing defense (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  11.  6
    Analogy-Based Approaches to Improve Software Project Effort Estimation Accuracy.S. Vijayalakshmi & V. Resmi - 2019 - Journal of Intelligent Systems 29 (1):1468-1479.
    In the discipline of software development, effort estimation renders a pivotal role. For the successful development of the project, an unambiguous estimation is necessitated. But there is the inadequacy of standard methods for estimating an effort which is applicable to all projects. Hence, to procure the best way of estimating the effort becomes an indispensable need of the project manager. Mathematical models are only mediocre in performing accurate estimation. On that account, we opt for analogy-based effort estimation by means (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  6
    Failure Analysis of Static Analysis Software Module Based on Big Data Tendency Prediction.Jian Zhu, Qian Li & Shi Ying - 2021 - Complexity 2021:1-12.
    With the continuous development of software, it is inevitable that there will be various unpredictable problems in computer software or programs that will damage the normal operation of the software. In the paper, static analysis software is taken as the research object, the errors or failures caused by the potential defects of the software modules are analyzed, and a software analysis method based on big data tendency prediction is proposed to use the software (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  5
    Cognitive Interaction Technology in Sport—Improving Performance by Individualized Diagnostics and Error Prediction.Benjamin Strenge, Dirk Koester & Thomas Schack - 2020 - Frontiers in Psychology 11.
    The interdisciplinary research area Cognitive Interaction Technology (CIT) aims to understand and support interactions between human users and other elements of socio-technical systems. Important reasons for the new interest in understanding CIT in sport psychology are the impressive development of cognitive robotics and advanced technologies such as virtual or augmented reality systems, cognitive glasses or neurotechnology settings. The present article outlines this area of research, addresses ethical issues, and presents an empirical study in the context of a new measurement and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14. Contemplative Practices: The Cultivation of Discernment in Mind and Heart,”.Cognitive Error - 2009 - Buddhist-Christian Studies 29:59-79.
     
    Export citation  
     
    Bookmark  
  15.  27
    Software engineering code of ethics and professional practice: version 4.Corporate Ieee-cs-acm Joint Task Force On Software Engineering Ethics - 1998 - Acm Sigcas Computers and Society 28 (2):29-32.
  16. E. Narmous, The Analysis and Cognition of Melodic Complexity. Chicago.B. J. Baars, Human Error New, R. A. Finke, V. A. Bradley, N. J. Hillsdale, Leab de Boysson-Bardies, S. de Schonen, P. Jusczyk, P. MacNeilage & J. Morton - 1994 - Cognition 52:159-162.
    No categories
     
    Export citation  
     
    Bookmark  
  17. On the Ontology of the Computing Process and the Epistemology of the Computed.Giuseppe Primiero - 2014 - Philosophy and Technology 27 (3):485-489.
    Software-intensive science challenges in many ways our current scientific methods. This affects significantly our notion of science and scientific interpretation of the world, driving at the same time the philosophical debate. We consider some issues prompted by SIS in the light of the philosophical categories of ontology and epistemology.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  18.  6
    Responsibility Gaps and Black Box Healthcare AI: Shared Responsibilization as a Solution.Benjamin H. Lang, Sven Nyholm & Jennifer Blumenthal-Barby - 2023 - Digital Society 2 (3):52.
    As sophisticated artificial intelligence software becomes more ubiquitously and more intimately integrated within domains of traditionally human endeavor, many are raising questions over how responsibility (be it moral, legal, or causal) can be understood for an AI’s actions or influence on an outcome. So called “responsibility gaps” occur whenever there exists an apparent chasm in the ordinary attribution of moral blame or responsibility when an AI automates physical or cognitive labor otherwise performed by human beings and commits an (...). Healthcare administration is an industry ripe for responsibility gaps produced by these kinds of AI. The moral stakes of healthcare are often life and death, and the demand for reducing clinical uncertainty while standardizing care incentivizes the development and integration of AI diagnosticians and prognosticators. In this paper, we argue that (1) responsibility gaps are generated by “black box” healthcare AI, (2) the presence of responsibility gaps (if unaddressed) creates serious moral problems, (3) a suitable solution is for relevant stakeholders to voluntarily responsibilize the gaps, taking on some moral responsibility for things they are not, strictly speaking, blameworthy for, and (4) should this solution be taken, black box healthcare AI will be permissible in the provision of healthcare. (shrink)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  19. An introduction to cybernetics.William Ross Ashby - 1956 - London: Chapman & Hall.
    2015 Reprint of 1956 Printing. Full facsimile of the original edition. Not reproduced with Optical Recognition Software. Cybernetics is here defined as "the science of control and communication, in the animal and the machine"-in a word, as the art of steersmanship; and this book will interest all who are interested in cybernetics, communication theory and methods for regulation and control. W. Ross Ashby (1903-1972) was an English psychiatrist and a pioneer in cybernetics, the study of complex systems. His two (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   129 citations  
  20.  26
    Formal verification, scientific code, and the epistemological heterogeneity of computational science.Cyrille Imbert & Vincent Ardourel - unknown
    Various errors can affect scientific code and detecting them is a central concern within computational science. Could formal verification methods, which are now available tools, be widely adopted to guarantee the general reliability of scientific code? After discussing their benefits and drawbacks, we claim that, absent significant changes as regards features like their user-friendliness and versatility, these methods are unlikely to be adopted throughout computational science, beyond certain specific contexts for which they are well-suited. This issue exemplifies the epistemological heterogeneity (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  21.  18
    Formal verification, scientific code, and the epistemological heterogeneity of computational science.Cyrille Imbert & Vincent Ardourel - 2022 - Philosophy of Science:1-40.
    Various errors can affect scientific code and detecting them is a central concern within computational science. Could formal verification methods, which are now available tools, be widely adopted to guarantee the general reliability of scientific code? After discussing their benefits and drawbacks, we claim that, absent significant changes as regards features like their user-friendliness and versatility, these methods are unlikely to be adopted throughout computational science, beyond certain specific contexts for which they are well-suited. This issue exemplifies the epistemological heterogeneity (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  22. Economic Cycles, Crises, and the Global Periphery.Leonid Grinin, Arno Tausch & Andrey Korotayev (eds.) - 2016 - Switzerland: Springer International Publishing Switzerland.
    This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifi cally the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfi lms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  23.  8
    Modeling Response Time and Responses in Multidimensional Health Measurement.Chun Wang, David J. Weiss & Shiyang Su - 2019 - Frontiers in Psychology 10.
    This study explored calibrating a large item bank for use in multidimensional health measurement with computerized adaptive testing, using both item responses and response time (RT) information. The Activity Measure for Post-Acute Care is a patient-reported outcomes measure comprised of three correlated scales (Applied Cognition, Daily Activities, and Mobility). All items from each scale are Likert type, so that a respondent chooses a response from an ordered set of four response options. The most appropriate item response theory model for analyzing (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  24.  42
    Catala: Moving towards the future of legal expert systems.Liane Huttner & Denis Merigoux - forthcoming - Artificial Intelligence and Law:1-24.
    Around the world, private and public organizations use software called legal expert systems to compute taxes. This software must comply with the laws they are designed to implement. As such, a bug or an error in a program that leads to tax miscalculations can have heavy legal and democratic consequences. However, increasing evidence suggests that some legal expert systems may not comply with the law. Moreover, traditional software development processes mean that legal expert systems are difficult (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  4
    The Influence of Entrepreneurial Psychological Leadership Style on Organizational Learning Ability and Organizational Performance.Yixu Tong - 2020 - Frontiers in Psychology 11:542819.
    In order to study the influence of different entrepreneurial psychological leadership styles on organizational learning ability and organizational performance, and to provide theoretical basis for the improvement of organizational benefits of entrepreneurial enterprises in the future, 421 general managers, middle managers, and grass-roots managers of 350 small and medium-sized private enterprises in Beijing were surveyed by questionnaire in two forms: online and on site. Then, a hypothesis model of the relationship between different entrepreneurial psychological leadership styles and organizational learning ability (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  26.  22
    A crowdsourcing approach to building a legal ontology from text.Anatoly P. Getman & Volodymyr V. Karasiuk - 2014 - Artificial Intelligence and Law 22 (3):313-335.
    This article focuses on the problems of application of artificial intelligence to represent legal knowledge. The volume of legal knowledge used in practice is unusually large, and therefore the ontological knowledge representation is proposed to be used for semantic analysis, presentation and use of common vocabulary, and knowledge integration of problem domain. At the same time some features of legal knowledge representation in Ukraine have been taken into account. The software package has been developed to work with the ontology. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  27.  18
    セルラ・オートマトン・シミュレータ用インタプリタの開発.遠藤 聡志 赤嶺 有平 - 2002 - Transactions of the Japanese Society for Artificial Intelligence 17:380-389.
    Cellular Automata, which is a method for analyzing phenomena of complex systems, allows us to construct many kinds of simulators such as road traffic simulators. When we design a CA model, we need a CA simulator for verification of its result. However, at the present, we need to develop a software simulator since CA dedicated computers have not been generalized yet. We need to use a trial and error method with the simulator for design of local rules, which (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  12
    Location Optimization Model of a Greenhouse Sensor Based on Multisource Data Fusion.DianJu Qiao, ZhenWei Zhang, FangHao Liu & Bo Sun - 2022 - Complexity 2022:1-9.
    In the traditional case, the uncertainty of the ambient temperature measured by the experiential distributed sensor is considered. In this paper, a model based on the moving least square method in the fusion algorithm is proposed to study the optimal monitoring point of the sensor in the greenhouse and determine the most suitable installation position of the sensor in the greenhouse to improve the control effect of the temperature control device of the system. MATLAB simulation software is used to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  35
    Digital transformation of business model innovation.Wan-Yi Tsai & Chaun-Jun Su - 2022 - Frontiers in Psychology 13.
    Because of the rising labor costs and the trade impact after joining the World Trade Organization, the textile industry in Taiwan has encountered many operational and production problems and obstacles. In addition, the lack of knowledge and resources for the digital transformation required to improve business performance has led to poor production and decision-making efficiency, and stagnant R&D for textile product innovation. In order to improve business operations, enhance customer satisfaction and experience, increase efficiency and reduce manual error, this (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  13
    Consistent pathway analysis: a structured analytic method.Lee Tobin & Pavel Gladyshev - 2019 - Artificial Intelligence and Law 27 (1):1-14.
    Mistakes during criminal investigations are costly, leading to wrongful convictions, so it is helpful to employ rigorous analytic methods to help mitigate errors and biases. This paper introduces a new method to help make sense of a set of information, allowing thought processes to be externalised in a systematic and transparent manner. While this method is presented in a criminal investigation context, it can be applied to any situation where analysis of several hypotheses and evidence is required. Open source (...) was created and used to test the method empirically. A simulated criminal investigation was carried out by seventy-five trainee investigators, the results showed better conclusions were reached when using the method. (shrink)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  16
    Economies of disclosure.Jeff Bollinger - 2004 - Acm Sigcas Computers and Society 34 (3):1-1.
    Imagine this scenario: a bank customer walks up to an ATM to withdraw cash from her account. While entering her PIN, she accidentally presses the '3' key at the same time as the 'Clear' key. Instantly $100 comes out of the cash dispenser! Curious, she checks the receipt and seeing that the money did not from her account, she tries the same operation. Again, $100 comes out of the cash dispenser. At this point she has two options, A: she can (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  32.  33
    Compensating atmospheric turbulence with CNNs for defocused pupil image wavefront sensors.Sergio Luis Suárez Gómez, Carlos González-Gutiérrez, Juan Díaz Suárez, Juan José Fernández Valdivia, José Manuel Rodríguez Ramos, Luis Fernando Rodríguez Ramos & Jesús Daniel Santos Rodríguez - 2021 - Logic Journal of the IGPL 29 (2):180-192.
    Adaptive optics are techniques used for processing the spatial resolution of astronomical images taken from large ground-based telescopes. In this work, computational results are presented for a modified curvature sensor, the tomographic pupil image wavefront sensor, which measures the turbulence of the atmosphere, expressed in terms of an expansion over Zernike polynomials. Convolutional neural networks are presented as an alternative to the TPI-WFS reconstruction. This technique is a machine learning model of the family of artificial neural networks, which are widely (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  33.  16
    Research on the Precession Characteristics of Hemispherical Resonator Gyro.Li-Jun Song, Rui Yang, Wang-Liang Zhao, Xing He, Shaoliang Li & You-Jun Ding - 2021 - Complexity 2021:1-9.
    Hemispherical Resonator Gyro is a new type gyro with high precision, high reliability, shock resistance, no need of preheating, short start time, and long life. It is a kind of vibrating gyro with standing wave rotating along the sensitive base of annular precession, has a unique application prospect in the field of high precision inertial sensors, and is widely used in unmanned aerial vehicle control in complex environments. Based on the theory of the structure characteristics of the hemispherical resonator, the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  20
    Constructing Bayesian Network Models of Gene Expression Networks from Microarray Data.Pater Spirtes, Clark Glymour, Richard Scheines, Stuart Kauffman, Valerio Aimale & Frank Wimberly - unknown
    Through their transcript products genes regulate the rates at which an immense variety of transcripts and subsequent proteins occur. Understanding the mechanisms that determine which genes are expressed, and when they are expressed, is one of the keys to genetic manipulation for many purposes, including the development of new treatments for disease. Viewing each gene in a genome as a distinct variable that is either on or off, or more realistically as a continuous variable, the values of some of these (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35.  16
    The Database of Classical Bibliography (review).Gerald A. Press - 1998 - Journal of the History of Philosophy 36 (4):619-619.
    In lieu of an abstract, here is a brief excerpt of the content:Reviewed by:The Database of Classical Bibliography ed. by Dee. L. ClaymanGerald A. PressDee. L. Clayman, editor. The Database of Classical Bibliography. CD-ROM and manual. Atlanta: Scholars Press, 1997. Pp. xvi + 120. $85 (individual); $340-2400 (institutional).L ’Annee Philologique (APh) has long been one of the most important scholarly resources for students of the history of ancient philosophy. Even though in print form it contains errors and omissions, has become (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  36.  2
    Joint Motion Control for Lower Limb Rehabilitation Based on Iterative Learning Control (ILC) Algorithm.Wei Guan, Lan Zhou & YouShen Cao - 2021 - Complexity 2021:1-9.
    At present, the motion control algorithms of lower limb exoskeleton robots have errors in tracking the desired trajectory of human hip and knee joints, which leads to poor follow-up performance of the human-machine system. Therefore, an iterative learning control algorithm is proposed to track the desired trajectory of human hip and knee joints. In this paper, the experimental platform of lower limb exoskeleton rehabilitation robot is built, and the control system software and hardware design and robot prototype function test (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  37.  11
    Flood Detection and Susceptibility Mapping Using Sentinel-1 Time Series, Alternating Decision Trees, and Bag-ADTree Models.Ayub Mohammadi, Khalil Valizadeh Kamran, Sadra Karimzadeh, Himan Shahabi & Nadhir Al-Ansari - 2020 - Complexity 2020:1-21.
    Flooding is one of the most damaging natural hazards globally. During the past three years, floods have claimed hundreds of lives and millions of dollars of damage in Iran. In this study, we detected flood locations and mapped areas susceptible to floods using time series satellite data analysis as well as a new model of bagging ensemble-based alternating decision trees, namely, bag-ADTree. We used Sentinel-1 data for flood detection and time series analysis. We employed twelve conditioning parameters of elevation, normalized (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38. Transforming large collections of scientific publications to XML.M. Kohlhase, D. Ginev, C. David & B. R. Miller - unknown
    lecting statistics about missing bindings and macros, and other errors. This guides debugging and development efforts, leading to iterative improvements in both the tools and the quality of the converted corpus. The build system thus serves as both a production conversion engine and software test harness. We have now processed the complete arχiv collection through 2006 consisting of more than 400,000 documents (a complete run is a processor-yearsize undertaking), continuously improving our success rate. We are now able to convert (...)
    No categories
     
    Export citation  
     
    Bookmark   1 citation  
  39. Basic Formal Ontology for bioinformatics.Barry Smith, Anand Kumar & Thomas Bittner - 2005 - IFOMIS Reports.
    Two senses of ‘ontology’ can be distinguished in the current literature. First is the sense favored by information scientists, who view ontologies as software implementations designed to capture in some formal way the consensus conceptualization shared by those working on information systems or databases in a given domain. [Gruber 1993] Second is the sense favored by philosophers, who regard ontologies as theories of different types of entities (objects, processes, relations, functions) [Smith 2003]. Where information systems ontologists seek to maximize (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  40.  3
    A hybrid machine learning system to impute and classify a component-based robot.Nuño Basurto, Ángel Arroyo, Carlos Cambra & Álvaro Herrero - 2023 - Logic Journal of the IGPL 31 (2):338-351.
    In the field of cybernetic systems and more specifically in robotics, one of the fundamental objectives is the detection of anomalies in order to minimize loss of time. Following this idea, this paper proposes the implementation of a Hybrid Intelligent System in four steps to impute the missing values, by combining clustering and regression techniques, followed by balancing and classification tasks. This system applies regression models to each one of the clusters built on the instances of data set. Subsequently, a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  41.  9
    Teaching an Applied Critical Thinking Course.Elliot D. Cohen - 1998 - The Paideia Archive: Twentieth World Congress of Philosophy 43:16-22.
    Encouraging students to apply classroom knowledge in their personal, everyday life is a major problem confronting many teachers of critical thinking. For example, while a student might recognize an ad hominem argument in a classroom exercise, it is quite another thing for him or her to avoid the same in interpersonal relations, say with parents, siblings, and peers. One approach to this problem is the creation of interaction software to which students can turn for input on the rationality of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  15
    Digitale Geisteswissenschaften: Offene Fragen - schöne Aussichten.Fotis Jannidis - 2019 - Zeitschrift für Medien- Und Kulturforschung 10 (1):63-70.
    In den letzten zehn Jahren sind die digitalen Geisteswissenschaften von einem Randphänomen zu einem der sichtbareren Felder kultur- und geisteswissenschaftlicher Forschung geworden. Dieser Erfolg ist von Kritik begleitet und Fotis Jannidis identifiziert drei Topoi der Kritik an den Digital Humanities, die oft vorgebracht und wiederholt werden: 1. ›Das wussten wir schon vorher‹ 2. ›Die Themen der Digital Humanities sind veraltet‹ 3. Es handle sich bei den Digital Humanities um eine neue Form des Positivismus, der geisteswissenschaftliche Gegenstände nicht adäquat beschreibt. Diese (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43.  13
    Proof and Consequence: An Introduction to Classical Logic with Simon and Simon Says.Ray Jennings & Nicole A. Friedrich - 2006 - Peterborough, CA: Broadview Press.
    Proof and Consequence is a rigorous, elegant introduction to classical first-order natural deductive logic; it provides an accurate and accessible first course in the study of formal systems. The text covers all the topics necessary for learning logic at the beginner and intermediate levels: this includes propositional and quantificational logic (using Suppes-style proofs) and extensive metatheory, as well as over 800 exercises. Proof and Consequence provides exclusive access to the software application Simon, an easily downloadable program designed to facilitate (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  44.  18
    Hilfe für die digitale Hilfswissenschaft.Markus Krajewski - 2019 - Zeitschrift für Medien- Und Kulturforschung 10 (1):71-81.
    In den letzten zehn Jahren sind die digitalen Geisteswissenschaften von einem Randphänomen zu einem der sichtbareren Felder kultur- und geisteswissenschaftlicher Forschung geworden. Dieser Erfolg ist von Kritik begleitet und Fotis Jannidis identifiziert drei Topoi der Kritik an den Digital Humanities, die oft vorgebracht und wiederholt werden: 1. ›Das wussten wir schon vorher‹ 2. ›Die Themen der Digital Humanities sind veraltet‹ 3. Es handle sich bei den Digital Humanities um eine neue Form des Positivismus, der geisteswissenschaftliche Gegenstände nicht adäquat beschreibt. Diese (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45.  25
    Unsafe nursing documentation: A qualitative content analysis.Ali Tajabadi, Fazlollah Ahmadi, Afsaneh Sadooghi Asl & Mojtaba Vaismoradi - 2020 - Nursing Ethics 27 (5):1213-1224.
    BackgroundNursing documentation as a pivotal part of nursing care has many implications for patient care in terms of safety and ethics.ObjectivesTo explore factors influencing nursing documentation from nurses’ perspectives in the Iranian nursing context.MethodsThis qualitative study was carried out using a qualitative content analysis of data collected from 2018 to 2019 in two urban areas of Iran. Semi-structured interviews (n = 15), observations, and reviews of patients’ medical files were used for data collection.Ethical considerationsThis study was conducted in accordance with (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  5
    Analysis of Feature Extraction and Anti-Interference of Face Image under Deep Reconstruction Network Algorithm.Jin Yang, Yuxuan Zhao, Shihao Yang, Xinxin Kang, Xinyan Cao & Xixin Cao - 2021 - Complexity 2021:1-15.
    In face recognition systems, highly robust facial feature representation and good classification algorithm performance can affect the effect of face recognition under unrestricted conditions. To explore the anti-interference performance of convolutional neural network reconstructed by deep learning framework in face image feature extraction and recognition, in the paper, first, the inception structure in the GoogleNet network and the residual error in the ResNet network structure are combined to construct a new deep reconstruction network algorithm, with the random gradient descent (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  9
    Fuzzy Neural Network-Based Evaluation Algorithm for Ice and Snow Tourism Competitiveness.Ying Zhao, Qinghua Zhu & Jiujun Bai - 2021 - Complexity 2021:1-11.
    This paper researches and analyzes the evaluation of the competitiveness of ice and snow tourism, uses the improved fuzzy neural network algorithm to process the system flow diagram of ice and snow tourism development through the function and characteristics of the power system of ice and snow tourism, and finally selects more than 40 indicators of the three subsystems of resources, economy, and culture. Based on the construction of cloud fuzzy neural network model, the above method is used for experimental (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  7
    The quality enhancement of action research on primary school English instruction in Chinese rural areas: An analysis based on multimodality.Haiyan Zhang, Cunxin Han, Hongyan Ma & Liusheng Wang - 2022 - Frontiers in Psychology 13.
    This study investigates the influences of action research on primary school English instruction from five dimensions in the classroom, viz., types of questions, language errors, gestures, facial expressions, and interpersonal distance. Four English teachers’ 9 real classroom teaching videos before and after action research are collected and annotated by using ELAN software. The results show that primary school English teachers in Chinese rural areas prefer closed questions to open questions; They make some language errors; Deictic gestures are the most (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49. The Logic of Causation: Definition, Induction and Deduction of Deterministic Causality.Avi Sion - 2010 - Geneva, Switzerland: CreateSpace & Kindle; Lulu..
    The Logic of Causation: Definition, Induction and Deduction of Deterministic Causality is a treatise of formal logic and of aetiology. It is an original and wide-ranging investigation of the definition of causation (deterministic causality) in all its forms, and of the deduction and induction of such forms. The work was carried out in three phases over a dozen years (1998-2010), each phase introducing more sophisticated methods than the previous to solve outstanding problems. This study was intended as part of a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  50.  35
    Proportions in time: interactions of quantification and aspect. [REVIEW]Peter Hallman - 2009 - Natural Language Semantics 17 (1):29-61.
    Proportional quantification and progressive aspect interact in English in revealing ways. This paper investigates these interactions and draws conclusions about the semantics of the progressive and telicity. In the scope of the progressive, the proportion named by a proportionality quantifier (e.g. most in The software was detecting most errors) must hold in every subevent of the event so described, indicating that a predicate in the scope of the progressive is interpreted as an internally homogeneous activity. Such an activity interpretation (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
1 — 50 / 987