Results for 'Networking and Internet Architecture'

1000+ found
Order:
  1. Network Management of Predictive Mobile Networks.Stephen Bush, Frost F., S. Victor, Joseph Evans & B. - 1999 - Journal of Network and Systems Management 7 (2).
    There is a trend toward the use of predictive systems in communications networks. At the systems and network management level predictive capabilities are focused on anticipating network faults and performance degradation. Simultaneously, mobile communication networks are being developed with predictive location and tracking mechanisms. The interactions and synergies between these systems present a new set of problems. A new predictive network management framework is developed and examined. The interaction between a predictive mobile network and the proposed network management system is (...)
     
    Export citation  
     
    Bookmark  
  2. The Design and Analysis of Virtual Network Configuration for a Wireless Mobile Atm Network.Stephen F. Bush - 1999 - Dissertation,
    This research concentrates on the design and analysis of an algorithm referred to as Virtual Network Configuration (VNC) which uses predicted future states of a system for faster network configuration and management. VNC is applied to the configuration of a wireless mobile ATM network. VNC is built on techniques from parallel discrete event simulation merged with constraints from real-time systems and applied to mobile ATM configuration and handoff. Configuration in a mobile network is a dynamic and continuous process. Factors such (...)
     
    Export citation  
     
    Bookmark  
  3.  24
    The Limits of Motion Prediction Support for Ad hoc Wireless Network Performance.Stephen F. Bush & Nathan Smith - forthcoming - Arxiv Preprint Cs/0512092:27--30.
    A fundamental understanding of gain provided by motion prediction in wireless ad hoc routing is currently lacking. This paper examines benefits in routing obtainable via prediction. A theoretical best-case non-predictive routing model is quantified in terms of both message overhead and update time for non-predictive routing. This best- case model of existing routing performance is compared with predictive routing. Several specific instances of predictive improvements in routing are examined. The primary contribution of this paper is quantification of predictive gain for (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  19
    The Internet of Futures Past: Values Trajectories of Networking Protocol Projects.Britt Paris - 2021 - Science, Technology, and Human Values 46 (5):1021-1047.
    The Internet was conceptualized as a technology that would be capable of bringing about a better future, but recent literature in science and technology studies and adjacent fields provides numerous examples of how this pervasive sociotechnical system has been shaped and used to dystopic ends. This article examines different future imaginaries present in Future Internet Architecture projects funded by the National Science Foundation from 2006 to 2016, whose goal was to incorporate social values while building new protocols (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  73
    Anticipatory Ethics for a Future Internet: Analyzing Values During the Design of an Internet Infrastructure.Katie Shilton - 2015 - Science and Engineering Ethics 21 (1):1-18.
    The technical details of Internet architecture affect social debates about privacy and autonomy, intellectual property, cybersecurity, and the basic performance and reliability of Internet services. This paper explores one method for practicing anticipatory ethics in order to understand how a new infrastructure for the Internet might impact these social debates. This paper systematically examines values expressed by an Internet architecture engineering team—the Named Data Networking project—based on data gathered from publications and internal documents. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  6.  46
    Power and the internet.Vittorio Bertola - 2010 - Journal of Information, Communication and Ethics in Society 8 (4):323-337.
    PurposeStarting from the end‐to‐end principle, a founding element of the internet's technical architecture, the paper aims to discuss its extension and effects at the social level. It shows how the internet moves power from governments and private entities to individual citizens, restructuring our societies and creating a new global stakeholder class – individual users of the internet. It connects the advent of this stakeholder class with a traditional principle of internet governance, “rough consensus”. It discusses (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  7.  8
    Next generation knowledge machines: design and architecture.Syed V. Ahamed - 2014 - Amsterdam: Elsevier.
    Deals with topics and insight into the design and architecture of next-generation computing systems that deal with human and social problems. Processor and Internet technologies form the subject matter and focal point, while information and knowledge on the Internet delivered by next-generation mobile networks form the technical core presented.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  8.  3
    Designing a ‘concept of operations’ architecture for next-generation multi-organisational service networks.Tomás Seosamh Harrington & Jagjit Singh Srai - 2023 - AI and Society 38 (6):2533-2545.
    Networked service organisations are increasingly adopting a ‘smarter networking’ philosophy in their design of more agile and customer-focused supply models. Changing consumer behaviours and the emergence of transformative technologies—industry 4.0, artificial intelligence, big data analytics, the Internet of Things—are driving a series of innovations, in terms of ‘products’ and business models, with major implications for the industrial enterprise, in their design of more ‘digitalised’ supply chains. For B2B systems, emerging ‘product-service’ offerings are requiring greater visibility, alignment and integration (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  16
    efficient IoT forensic approach for the evidence acquisition and analysis based on network link.Saad Khalid Alabdulsalam, Trung Q. Duong, Kim-Kwang Raymond Choo & Nhien-An Le-Khac - 2022 - Logic Journal of the IGPL 30 (6):1041-1055.
    In an Internet of Things (IoT) environment, IoT devices are typically connected through different network media types such as mobile, wireless and wired networks. Due to the pervasive nature of such devices, they are a potential evidence source in both civil litigation and criminal investigations. It is, however, challenging to identify and acquire forensic artefacts from a broad range of devices, which have varying storage and communication capabilities. Hence, in this paper, we first propose an IoT network architecture (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10.  16
    Perception Analysis and Early Warning of Home-Based Care Health Information Based on the Internet of Things.Yi Mao, Lei Zhang & Xin Wu - 2021 - Complexity 2021:1-10.
    Aiming at the problem of insufficient health monitoring of the elderly in the existing home care system, this paper designs a health information analysis and early warning system based on the Internet of Things technology, which can monitor the physiological data of the elderly in real time. It also can be based on the elderly real-time monitoring data, physical examination data, and other types of health data, which can be used to predict diseases, so as to achieve “early detection (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  11.  12
    Application of embedded Linux in the design of Internet of Things gateway.Rajeev Kumar, Poonam Rani, Renu Popli, Pengfei Yan, Li Wang & Tao Wang - 2022 - Journal of Intelligent Systems 31 (1):1014-1023.
    To study the development trend of embedded platforms in home appliances Internet of Things, an application of embedded Linux in the design of IoT gateway is designed. ARM microprocessor S3C2410, EM310 radio frequency module, and Ethernet DM9000A module are used to realize the home network information-processing platform. The platform utilizes existing network facilities, RF modules, and network interface modules to realize the interconnection of the home perception network through wireless or wired links. For experimental analysis, Ping the central server (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  23
    Brittle System Analysis.Stephen F. Bush, John Hershey & Kirby Vosburgh - forthcoming - Arxiv Preprint Cs/9904016.
    The goal of this paper is to define and analyze systems which exhibit brittle behavior. This behavior is characterized by a sudden and steep decline in performance as the system approaches the limits of tolerance. This can be due to input parameters which exceed a specified input, or environmental conditions which exceed specified operating boundaries. An analogy is made between brittle commmunication systems in particular and materials science.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  39
    Internet Use, Social Networks, and Loneliness Among the Older Population in China.Dan Tang, Yongai Jin, Kun Zhang & Dahua Wang - 2022 - Frontiers in Psychology 13.
    While the rate of Internet use among the older population in China is rapidly increasing, the outcomes associated with Internet use remain largely unexplored. Currently, there are contradictory findings indicating that Internet use is sometimes positively and sometimes negatively associated with older adults’ subjective well-being. Therefore, we examined the associations between different types of Internet use, social networks, and loneliness among Chinese older adults using data from the Chinese Longitudinal Ageing Society Survey. Internet use was (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  14.  9
    Optimization of the Marketing Management System Based on Cloud Computing and Big Data.Lin Zhang - 2021 - Complexity 2021:1-10.
    With the rapid development of the Internet information age, social networks, mobile Internet, and e-commerce have expanded the scope of Internet applications. The “big data” era is a challenge and chance for companies and has a great impact on social economy, politics, culture, and people’s lives. An accurate marketing system is developed based on J2EE, and the architecture is selected from the user layer, business logic layer, and data layer and the B/S3 layer application, including three (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  24
    Securing NEMO Using a Bilinear Pairing-Based 3-Party Key Exchange (3PKE-NEMO) in Heterogeneous Networks.Vikram Raju Reddicherla, Umashankar Rawat & Kumkum Garg - 2020 - Foundations of Science 25 (4):1125-1146.
    NEMO means Network Mobility which is the extension of Mipv6 and it is invented for accessing internet for the group of people when they are travelling in Vehicle as Network group. During handoff while exchanging Binding Updates between the Mobile Network Node, Correspondent Node and Home Agent, many security threats are present during those messages exchange. It may prone to several standard malicious attacks on the BU and Binding Acknowledgement. An efficient end-to-end security method is required to protect the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  5
    Intelligent Coordination Distribution of the Whole Supply Chain Based on the Internet of Things.Hongxiu Cui - 2021 - Complexity 2021:1-12.
    In this paper, through the intelligent research of the whole process of logistics and distribution with the Internet of Things supply chain, we study how to improve the development of the cold chain, reduce the loss in circulation, improve the social and economic benefits, and carry out intelligent information collection, monitoring, management, and information tracing of the whole cold chain. This paper analyzes and empirically studies the impact of key technologies of the Internet of Things in cold chain (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17. Community networks and the evolution of civic intelligence.Douglas Schuler - 2010 - AI and Society 25 (3):291-307.
    Although the intrinsic physicality of human beings has not changed in millennia, the species has managed to profoundly reconstitute the physical and social world it inhabits. Although the word “profound” is insufficient to describe the vast changes our world has undergone, it is sufficiently neutral to encompass both the opportunities—and the challenges—that our age provides. It is a premise of my work that technology, particularly information and communication technology (ICT), offers spectacular opportunities for humankind to address its collective problems. The (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  18.  26
    Deep-learning networks and the functional architecture of executive control.Richard P. Cooper - 2017 - Behavioral and Brain Sciences 40.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19. International Workshop on Web-Based Internet Computing for Science and Engineering (ICSE 2006)-Component Composition Based on Web Service and Software Architecture.Xin Wang, Changsong Sun, Xiaojian Liu & Bo Xu - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 987-990.
     
    Export citation  
     
    Bookmark  
  20.  14
    Designing of a Simulation Tool for the Performance Analysis of Hybrid Data Center Networks.Muhib Ahmad, Farrukh Zeeshan Khan, Zeshan Iqbal, Muneer Ahmad, Ihsan Ali, Sultan S. Alshamrani, Muhammad Talha & Muhammad Ahsan Raza - 2021 - Complexity 2021:1-13.
    Data center technology changes the mode of computing. Traditional DCs consist of a single layer and only have Ethernet connections among switches. Those old-fashioned DCs cannot fulfill the high resource demand compared with today’s DCs. The architectural design of the DCs is getting substantial importance and acting as the backbone of the network because of its essential feature of supporting and maintaining the rapidly increasing Internet-based applications which include search engines and social networking applications. Every application has its (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  20
    New Perspectives on Spontaneous Brain Activity: Dynamic Networks and Energy Matter.Arturo Tozzi, Marzieh Zare & April A. Benasich - 2016 - Frontiers in Human Neuroscience 10:147690.
    Spontaneous brain activity has received increasing attention as demonstrated by the exponential rise in the number of published papers on this topic over the last thirty years. Such “intrinsic” brain activity, generated in the absence of an explicit task, is frequently associated with resting-state or default-mode networks. The focus on characterizing spontaneous brain activity promises to shed new light on questions concerning the structural and functional architecture of the brain and how they are related to “mind”. However, many critical (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  22.  8
    Active Networks and Active Network Management: A Proactive Management Framework.Stephen F. Bush & Amit B. Kulkarni - 2001 - Springer.
    Active networking is an exciting new paradigm in digital networking that has the potential to revolutionize the manner in which communication takes place. It is an emerging technology, one in which new ideas are constantly being formulated and new topics of research are springing up even as this book is being written. This technology is very likely to appeal to a broad spectrum of users from academia and industry. Therefore, this book was written in a way that enables (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  19
    Active Networks and Active Network Management a Proactive Management Framework: Solution Manual.Stephen F. Bush & Amit B. Kulkarni - 2001 - Kluwer Academic/Plenum Publishers.
    Active networking is an exciting new paradigm in digital networking that has the potential to revolutionize the manner in which communication takes place. It is an emerging technology, one in which new ideas are constantly being formulated and new topics of research are springing up even as this book is being written. This technology is very likely to appeal to a broad spectrum of users from academia and industry. Therefore, this book was written in a way that enables (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  10
    Community Networks and Public Participation: A Forum for Civic Engagement or a Platform for Ranting Irate Malcontents?Rudy Pugliese, Franz Foltz & Paul Ferber - 2006 - Bulletin of Science, Technology and Society 26 (5):388-397.
    Forums of public discussion on Internet Web sites have been promoted by some as having the potential to improve democracy through large increases in civic engagement. Such claims are scoffed at by others. To date, such forums tend to be found more on community networks and commercial Web sites than on sites owned by governments. We thus turn to an examination of forums hosted by a private New Jersey organization, to seek to understand the types and character of discussion (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  4
    Optimization of an Intelligent Music-Playing System Based on Network Communication.Liaoyan Zhang - 2021 - Complexity 2021:1-11.
    Streaming media server is the core system of audio and video application in the Internet; it has a wide range of applications in music recommendation. As song libraries and users of music websites and APPs continue to increase, user interaction data are generated at an increasingly fast rate, making the shortcomings of the original offline recommendation system and the advantages of the real-time streaming recommendation system more and more obvious. This paper describes in detail the working methods and contents (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  14
    Digital Networks and the State.Saskia Sassen - 2000 - Theory, Culture and Society 17 (4):19-33.
    This article examines the architecture of public access and of private digital networks in order to establish in what ways they might be subject to regulation, alter the authority of the national state, and have positive or negative impacts on liberal democracy and on the political potential of civil society. Two of the key issues explored in this context are the meaning of regulation, which is likely to be quite different from our historically grounded understandings of state regulation, and, (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  27. Sinʼgisul ŭi sahoe yullijŏk nonjaeng e kwanhan chŏngchʻaek netʻŭwŏkʻŭ punsŏk: saengmyŏng yulli wa intʻŏnet naeyong kyuje ŭi ippŏp kwajŏng ŭl chungsim ŭro = Policy network analysis of social and ethical debates on new technologies: focusing on the legislation process of bio-ethics and internet contents regulation.Sŏng-su Song (ed.) - 2003 - Sŏul Tʻŭkpyŏlsi: Kwahak Kisul Chŏngchʻaek Yŏnʼguwŏn.
     
    Export citation  
     
    Bookmark  
  28.  82
    Neural Correlates of Non-clinical Internet Use in the Motivation Network and Its Modulation by Subclinical Autistic Traits.Hironobu Fujiwara, Sayaka Yoshimura, Kei Kobayashi, Tsukasa Ueno, Naoya Oishi & Toshiya Murai - 2018 - Frontiers in Human Neuroscience 12.
  29.  5
    Book Reviews of "The Old Reading Room"," Information Policy in the Electronic Age", '–œOnly Connect: Shaping Networks And Knowledge For The New Millennium'–, and "Internet Today!".Martin White, Jane Dorner, Andrew Wale & John Cox - 2000 - Logos 11 (1):50-54.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30. Levels of explanation and cognitive architectures.Robert N. McCauley - 2017 - In William Bechtel & George Graham (eds.), A Companion to Cognitive Science. Oxford, UK: Blackwell. pp. 611–624.
    Some controversies in cognitive science, such as arguments about whether classical or distributed connectionist architectures best model the human cognitive system, reenact long‐standing debates in the philosophy of science. For millennia, philosophers have pondered whether mentality can submit to scientific explanation generally and to physical explanation particularly. Recently, positive answers have gained popularity. The question remains, though, as to the analytical level at which mentality is best explained. Is there a level of analysis that is peculiarly appropriate to the explanation (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  31. The design of the internet’s architecture by the Internet Engineering Task Force (IETF) and human rights.Corinne Cath & Luciano Floridi - 2017 - Science and Engineering Ethics 23 (2):449–468.
    The debate on whether and how the Internet can protect and foster human rights has become a defining issue of our time. This debate often focuses on Internet governance from a regulatory perspective, underestimating the influence and power of the governance of the Internet’s architecture. The technical decisions made by Internet Standard Developing Organisations that build and maintain the technical infrastructure of the Internet influences how information flows. They rearrange the shape of the technically (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  32. The Network and the Demos: Big Data & the Epistemic Justifications of Democracy.Dave Kinkead & David M. Douglas - 2020 - In Kevin Macnish & Jai Galliott (eds.), Big Data and Democracy. Edinburgh University Press.
    A stable democracy requires a shared identity and political culture. Its citizens need to identify as one common demos lest it fracture and balkanise into separate political communities. This in turn necessitates some common communication network for political messages to be transmitted, understood and evaluated by citizens. Hence, what demarcates one demos from another are the means of communication connecting the citizens of those demoi, allowing them to debate and persuade each other on the proper conduct of government and on (...)
     
    Export citation  
     
    Bookmark  
  33.  24
    Understanding the social impact of ICN: between myth and reality.G. Piro, S. Signorello, M. R. Palattella, L. A. Grieco, G. Boggia & T. Engel - 2017 - AI and Society 32 (3):401-419.
    The information-centric networking paradigm is attracting more and more interest from the research community due to its peculiarities that make it one of the best candidates for constructing the future Internet. For this reason, there are many papers in literature that study how to transform ICN principles in reality in order to magnify its relevance for the society. In order to provide a solid summary of the state of the art, the present contribution tries to summarize the main (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  34.  40
    Presenting a hybrid model in social networks recommendation system architecture development.Abolfazl Zare, Mohammad Reza Motadel & Aliakbar Jalali - 2020 - AI and Society 35 (2):469-483.
    There are many studies conducted on recommendation systems, most of which are focused on recommending items to users and vice versa. Nowadays, social networks are complicated due to carrying vast arrays of data about individuals and organizations. In today’s competitive environment, companies face two significant problems: supplying resources and attracting new customers. Even the concept of supply-chain management in a virtual environment is changed. In this article, we propose a new and innovative combination approach to recommend organizational people in social (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  35.  16
    Analyses of Social Networks and their Social or Antisocial Impact.Majlinda Fetaji - 2019 - Seeu Review 14 (1):226-249.
    The research focus is set in the investigation of positive and negative aspects of use of social networks using a ‘bifocal approach’ to social networks analysis. Our bifocal approach uses qualitative approach reviewing published literature primarely blogs, forums, web sites, etc and interchangeably compares and conveys the results with focus groups. The objective of the research study is to show that social networks can runs both ways, it can be helpful while at the same time can be very dangerous and (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  36.  40
    Research 2.0: Social Networking and Direct-To-Consumer (DTC) Genomics.Sandra Soo-Jin Lee & LaVera Crawley - 2009 - American Journal of Bioethics 9 (6-7):35-44.
    The convergence of increasingly efficient high throughput sequencing technology and ubiquitous Internet use by the public has fueled the proliferation of companies that provide personal genetic information (PGI) direct-to-consumers. Companies such as 23andme (Mountain View, CA) and Navigenics (Foster City, CA) are emblematic of a growing market for PGI that some argue represents a paradigm shift in how the public values this information and incorporates it into how they behave and plan for their futures. This new class of social (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  37.  11
    Network Pseudohealth Information Recognition Model: An Integrated Architecture of Latent Dirichlet Allocation and Data Block Update.Jie Zhang, Pingping Sun, Feng Zhao, Qianru Guo & Yue Zou - 2020 - Complexity 2020:1-12.
    The wanton dissemination of network pseudohealth information has brought great harm to people’s health, life, and property. It is important to detect and identify network pseudohealth information. Based on this, this paper defines the concepts of pseudohealth information, data block, and data block integration, designs an architecture that combines the latent Dirichlet allocation algorithm and data block update integration, and proposes the combination algorithm model. In addition, crawler technology is used to crawl the pseudohealth information transmitted on the Sina (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  38.  83
    Ontology, neural networks, and the social sciences.David Strohmaier - 2020 - Synthese 199 (1-2):4775-4794.
    The ontology of social objects and facts remains a field of continued controversy. This situation complicates the life of social scientists who seek to make predictive models of social phenomena. For the purposes of modelling a social phenomenon, we would like to avoid having to make any controversial ontological commitments. The overwhelming majority of models in the social sciences, including statistical models, are built upon ontological assumptions that can be questioned. Recently, however, artificial neural networks have made their way into (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  39. Between Network and Story : Analyzing Hyperlinks and Narratives on Websites about Tibet.Laura Osburn - 2015 - In Gregory Price Grieve & Daniel M. Veidlinger (eds.), Buddhism, the internet, and digital media: the pixel in the lotus. New York: Routledge, Taylor & Francis Group.
     
    Export citation  
     
    Bookmark  
  40.  13
    Internet-enabled access to alternative food networks: A comparison of online and offline food shoppers and their differing interpretations of quality.Benjamin Wills & Anthony Arundel - 2017 - Agriculture and Human Values 34 (3):701-712.
    Online food retail has the potential to broaden access to systems of food provision which promote social and environmental quality attributes. This possibility is explored using data from a survey of 365 consumers who purchased food either via internet retailers of local and organic food, or via farmers’ markets, in Vancouver, Canada and Melbourne, Australia. Survey results are analyzed using principal component and regression techniques and interpreted via the theoretical framework of conventions theory. Key findings show that while online (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41.  26
    Relationship Between Loneliness and Depression Among Chinese Junior High School Students: The Serial Mediating Roles of Internet Gaming Disorder, Social Network Use, and Generalized Pathological Internet Use.Peng Wang, Jun Wang, Yun Yan, Yingdong Si, Xiangping Zhan & Yu Tian - 2021 - Frontiers in Psychology 11.
    This study aimed to explore the mediating effects of internet gaming disorder, social network use, and generalized pathological internet use on the association between loneliness and depression. A total of 2211 junior high school students completed questionnaires regarding loneliness, internet gaming disorder, social network use, GPIU, and depression. The results of a structural equation model revealed that the path coefficient of loneliness to depression was significantly positive, loneliness could not predict depression through GPIU directly, but loneliness could (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  87
    P2p networks and the verizon V. RIAA case: Implications for personal privacy and intellectual property. [REVIEW]Frances S. Grodzinsky & Herman T. Tavani - 2005 - Ethics and Information Technology 7 (4):243-250.
    In this paper, we examine some ethical implications of a controversial court decision in the United States involving Verizon (an Internet Service Provider or ISP) and the Recording Industry Association of America (RIAA). In particular, we analyze the impacts this decision has for personal privacy and intellectual property. We begin with a brief description of the controversies and rulings in this case. This is followed by a look at some of the challenges that peer-to-peer (P2P) systems, used to share (...)
    Direct download (9 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  43.  59
    Corporate Responsibilities in Internet-Enabled Social Networks.Stephen Chen - 2009 - Journal of Business Ethics 90 (S4):523 - 536.
    As demonstrated by the popularity of social networking sites such as Facebook and Twitter, Internet-based social networks have become an important part of daily life, and many businesses are now involved in such networks either as service providers or as participants. Furthermore, inter-organizational networks are becoming an increasingly common feature of many industries, not only on the Internet. However, despite the growing importance of networks for businesses, there is little theoretical study on the social responsibilities of businesses (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  44.  38
    Cognitive Architecture, Holistic Inference and Bayesian Networks.Timothy J. Fuller - 2019 - Minds and Machines 29 (3):373-395.
    Two long-standing arguments in cognitive science invoke the assumption that holistic inference is computationally infeasible. The first is Fodor’s skeptical argument toward computational modeling of ordinary inductive reasoning. The second advocates modular computational mechanisms of the kind posited by Cosmides, Tooby and Sperber. Based on advances in machine learning related to Bayes nets, as well as investigations into the structure of scientific and ordinary information, I maintain neither argument establishes its architectural conclusion. Similar considerations also undermine Fodor’s decades-long diagnosis of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  45. The Architecture of Mind as a Network of Networks of Natural Computational Processes.Gordana Dodig-Crnkovic - 2015 - Philosophies 1 (1):111--125.
    In discussions regarding models of cognition, the very mention of “computationalism” often incites reactions against the insufficiency of the Turing machine model, its abstractness, determinism, the lack of naturalist foundations, triviality and the absence of clarity. None of those objections, however, concerns models based on natural computation or computing nature, where the model of computation is broader than symbol manipulation or conventional models of computation. Computing nature consists of physical structures that form layered computational architecture, with computation processes ranging (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  46.  12
    Network architecture and sex chromosome turnovers.Wenjing Tao, Matthew A. Conte, Deshou Wang & Thomas D. Kocher - 2021 - Bioessays 43 (3):2000161.
    Recent studies have revealed an astonishing diversity of sex chromosomes in many vertebrate lineages, prompting questions about the mechanisms of sex chromosome turnover. While there is considerable population genetic theory about the evolutionary forces promoting sex chromosome replacement, this theory has not yet been integrated with our understanding of the molecular and developmental genetics of sex determination. Here, we review recent data to examine four questions about how the structure of gene networks influences the evolution of sex determination. We argue (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  30
    General strain theory of Internet addiction and deviant behaviour in social networking sites.A. R. Mubarak & Steve Quinn - 2019 - Journal of Information, Communication and Ethics in Society 17 (1):61-71.
    Purpose This study aims to explore the association between internet addiction and problem behaviours on social networking sites using the general strain theory. Design/methodology/approach Using the purposive sampling method, a survey was conducted, which collected data from 414 college students studying in two public universities in South Australia. The Delphi method was used to develop the questionnaire used for the survey. Findings 'Results of this research indicated a significant association between internet addiction and problem behaviours on SNS. (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  48.  8
    Pellet Roasting Management System Based on Deep Learning and Internet of Things.Weixing Liu, Liyan Zhang, Jiahao Wang, Yiming Yang, Jie Li & Zhijie Zhang - 2021 - Complexity 2021:1-10.
    Pellet is widely used in blast furnace ironmaking. Pellet quality affects the effect of ironmaking, the existing control system of grating-rotary kiln mainly adopts manual control mode, and the quality of pellet production largely depends on the experience, fatigue, and sense of responsibility of the site operators. The use of the Internet of things technology in the integration and improvement of enterprise information level, to achieve fine, intelligent production management, at the same time, is conducive to promoting steel enterprises (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49. Networks of relations on the Internet: a research object for information technology and social sciences.Dominique Cardon & Christophe Prieur - 2010 - In Bernard Reber & Claire Brossaud (eds.), Digital cognitive technologies: epistemology and the knowledge economy. Hoboken, NJ: Wiley.
  50.  20
    Architecture of Consciousness. Part One: Logic and Morphology of Neural Network.Wiesław Galus - 2015 - Roczniki Filozoficzne 63 (1):139-171.
    Celem pracy jest wskazanie na podstawowe procesy neurologiczne i biofizyczne konstytuuj ące kompleksowy model umysłu świadomego. Przedstawiono zarówno model obliczeniowy działania neuronowych pól tworzących mentalne reprezentacje rzeczywistości, jak i biologiczne koncepcje realizacji tych funkcji mózgu. Wyjaśniono motywacje ludzkiego i zwierzęcego działania. Przedstawiono koncepcje, jak powstaje świadomość oraz jak rozpoznajemy, że jesteśmy świadomi, co objaśnia także problem samoświadomości. Wskazano, że zrozumienie fenomenu świadomości usuwa antynomię teleologicznego i przyczynowego charakteru natury ludzkiej, co niweluje dualizm cielesnego i duchowego charakteru substancji tworzącej nasze umysły. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000