Results for 'IEEE'

160 found
Order:
  1.  44
    Software engineering code of ethics and professional practice: version 4.Corporate Ieee-cs-acm Joint Task Force On Software Engineering Ethics - 1998 - Acm Sigcas Computers and Society 28 (2):29-32.
  2.  58
    (1 other version)IEEE Vision for Smart Grid Communications: 2030 and Beyond Reference Model.Stephen Bush, Goel F., Simard Sanjay & Georges - forthcoming - Philosophical Explorations.
    IEEE Vision for Smart Grid Communications: 2030 and Beyond Reference Model, directly overlays events in the power grid with communication performance on the same spacetime model, it ensures a perspective that verifies that any of the myriad of communication technologies chosen will provide the required support for the Smart Grid. For Corporate or Institutional Access, request a custom quote for your organization at www.ieee.org/smartgridresearch.
    Direct download  
     
    Export citation  
     
    Bookmark  
  3. Ieee vision for Smart grid communications: 2030 and beyond.Sanjay Goel, Stephen Bush, Bakken F. & David - forthcoming - Standard-Download.Org.
    This document provides a vision of the communications-related aspects of the Smart Grid in the year 2030, and lays out the technology roadmap that will lead us to the vision. This document starts with some basic knowledge of the power grid and follows up with fundamental building blocks for the communication infrastructure that will accompany the Smart Grid. Subsequently, network architectures, including overlays, are discussed at length. Also discussed, are important issues such as standards, regulations, security, and disruptive technologies. The (...)
     
    Export citation  
     
    Bookmark  
  4.  12
    IEEE-SSIT Distinguished Service Award.R. A. Cyberethics - 1985 - Metaphilosophy 16 (4).
    Direct download  
     
    Export citation  
     
    Bookmark  
  5. 13th IEEE International Conference on Cognitive Informatics and Cognitive Computing, (ICCI*CC’14) at LSBU, London, UK.S. Patel, Y. Wang, W. Kinsner, D. Patel, G. Fariello & L. A. Zadeh (eds.) - 2014 - IEEE Computer Society Press.
  6. IEEE SpringSim Proceedings 2019.A. Del Barrio, C. J. Lynch, F. J. Barros & X. Hu (eds.) - 2019 - IEEE.
    No categories
     
    Export citation  
     
    Bookmark  
  7. 2019 IEEE International Symposium on Technology and Society (ISTAS).Ning Wang (ed.) - 2019
    No categories
     
    Export citation  
     
    Bookmark  
  8. 2020 IEEE International Symposium on Circuits and Systems (ISCAS).Hao Zhan, Dan Wan & Zhiwei Huang (eds.) - 2020 - Seville, Spain: IEEE.
  9.  38
    Baseband processor for IEEE 802.11 a standard with embedded BIST.Milos Krstic, Koushik Maharatna, Alfonso Troya, Eckhard Grass & Ulrich Jagdhold - 2004 - Facta Universitatis, Series: Linguistics and Literature 17:231-239.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10. 18th IEEE International Conference on Image Processing.Charles R. Twardy (ed.) - 2011 - IEEE.
    No categories
     
    Export citation  
     
    Bookmark  
  11. IEEE International Conference on Bioinformatics and Biomedicine (IEEE BIBM 2015),.Jingshan Huang, Fernando Gutierrez, Dejing Dou, Judith A. Blake, Karen Eilbeck, Darren A. Natale, Barry Smith, Yu Lin, Xiaowei Wang & Zixing Liu (eds.) - 2015
     
    Export citation  
     
    Bookmark  
  12.  38
    Adaptive Traffic-Aware PSM Mechanism for IEEE 802.11 WLANs.Xijian Chen, Pengfei Yuan, Xilong Sun & Yi Xie - 2014 - Journal of Intelligent Systems 23 (4):437-450.
    Wireless devices consume large amounts of energy during wireless communication. As the energy storage of battery is limited, improving energy efficiency has become an important approach to prolong the lifetime of devices. The IEEE 802.11 protocol supports the power save mode in wireless local area networks. However, the standard PSM cannot adapt to the changes of traffic load or channel conditions. Therefore, this article proposes an adaptive traffic-aware PSM mechanism that improves energy efficiency of wireless devices in a WLAN (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  13.  28
    A bibliometric analysis of privacy and ethics in IEEE Security and Privacy.Jonathan Tse, Dawn E. Schrader, Dipayan Ghosh, Tony Liao & David Lundie - 2015 - Ethics and Information Technology 17 (2):153-163.
    The increasingly ubiquitous use of technology has led to the concomitant rise of intensified data collection and the ethical issues associated with the privacy and security of that data. In order to address the question of how these ethical concerns are discussed in the literature surrounding the subject, we examined articles published in IEEE Security and Privacy, a magazine targeted towards a general, technically-oriented readership spanning both academia and industry. Our investigation of the intersection between the ethical and technological (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14. Proceedings of the 2020 IEEE International Symposium on Technology in Society (ISTAS).Ning Wang (ed.) - 2021
    No categories
     
    Export citation  
     
    Bookmark  
  15. Link quality based association mechanism in IEEE 802.11 h compliant wireless LANs.Thanasis Korakis, O. Ercetin, S. Krishnamurthy, Leandros Tassiulas & Satish Tripathi - 2005 - In Alan F. Blackwell & David MacKay, Power. New York: Cambridge University Press. pp. 5.
     
    Export citation  
     
    Bookmark  
  16.  54
    C. S. Lorens. Invertible Boolean functions. IEEE transactions on electronic computers, vol. EC–13 , pp. 529–541.Harold S. Stone - 1971 - Journal of Symbolic Logic 36 (2):347-348.
  17.  35
    Karl S. Menger. Characterization and cardinality of universal functions. IEEE transactions on electronic computers, vol. EC-14 , pp. 720–721. [REVIEW]Edgar N. Gilbert - 1971 - Journal of Symbolic Logic 36 (3):548-549.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  18.  23
    Tison Pierre. Generalization of consensus theory and application to the minimization of Boolean functions. IEEE transactions on electronic computers, vol. EC-16 , pp. 446–456. [REVIEW]James F. Gimpel - 1968 - Journal of Symbolic Logic 33 (3):468-468.
  19. Companion of the 2021 ACM/IEEE International Conference on Human-Robot Interaction (HRI’21 Companion).Markus Kneer & Michael T. Stuart (eds.) - 2021 - New York, NY, USA:
    No categories
     
    Export citation  
     
    Bookmark  
  20. KM99] GP Kogan and JA Makowsky. Computing Schur functions for Borchardt matrices. in preparation, 1999. Kog96] GP Kogan. Computing the permanent over elds of characteristic 3: Where and why it becomes dificult. In FOCS'96, pages 108 {114. IEEE, 1996. [REVIEW]S. Abramsky, D. Gabbay & T. Maibaum - 1996 - Annals of Pure and Applied Logic 78 (2):189-202.
  21.  46
    Choudhury A. K. and Basu M. S.. On detection of group invariance or total symmetry of a Boolean function. Indian journal of physics, vol. 36 , pp. 31–42; also Proceedings of the Indian Association for the Cultivation of Science, vol. 45 , pp. 31–42.Sheng C. L.. Detection of totally symmetric Boolean functions. IEEE transactions on electronic computers, vol. EC-14 , pp. 924–926.Choudhury A. K. and Das S. R.. Comment on “Detection of totally symmetric Boolean functions.” IEEE transactions on electronic computers, vol. EC-15 , p. 813.Sheno C. L.. Author's reply. IEEE transactions on electronic computers, vol. EC-15 , p. 813. [REVIEW]M. A. Harrison - 1971 - Journal of Symbolic Logic 36 (4):694-695.
  22.  36
    Kudielka V. and Oliva P.. Complete sets of functions of two and three binary variables. IEEE transactions on electronic computers, vol. EC-15 , pp. 930–931. [REVIEW]William Wernick - 1972 - Journal of Symbolic Logic 37 (2):417-417.
  23.  80
    Michael A. Harrison. The number of transitivity sets of Boolean functions. Journal of the Society for Industrial and Applied Mathematics, t. 11 , p. 806–828. - Michael A. Harrison. The number of equivalence classes of Boolean functions under groups containing negation. IEEE transactions on electronic computers, t. EC-12 , p. 559–561. - Michael A. Harrison. On the number of classes of switching networks. Journal of the Franklin Institute, t. 276 , p. 313–327. - Michael A. Harrison. The number of classes of invertible Boolean functions. Journal of the Association for Computing Machinery, t. 10 , p. 25–28. [REVIEW]J. Kuntzmann - 1970 - Journal of Symbolic Logic 35 (1):160-161.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  24.  30
    Meo Angelo R.. On the determination of the ps maximal implicants of a switching function. IEEE transactions on electronic computers, vol. EC-14 , pp. 830–840. [REVIEW]A. K. Choudhury - 1968 - Journal of Symbolic Logic 33 (2):303-303.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25.  77
    H. H. LoomsJr., and R. H. WymanJr., On complete sets of logic primitives. IEEE transactions on electronic computers, vol. EC-14 , pp. 173–174. [REVIEW]H. B. Enderton - 1970 - Journal of Symbolic Logic 35 (1):160.
  26.  53
    (1 other version)Lin Shen and Rado Tibor. Computer studies of Turing machine problems. Journal of the Association for Computing Machinery, vol. 12 , pp. 196–212.Brady Allen H.. The conjectured highest scoring machines for Rado's Σ for the value k = 4. IEEE transactions on electronic computers, vol. EC-15 , pp. 802–803.Green Milton W.. A lower bound on Rado's sigma function for binary Turing machines. Switching circuit theory and logical design, Proceedings of the Fifth Annual Symposium, Princeton University, Princeton, N.J., November 11-13, 1964, The Institute of Electrical and Electronics Engineers, Inc., New York 1964, pp. 91–94. [REVIEW]H. B. Enderton - 1975 - Journal of Symbolic Logic 40 (4):617-617.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  27. Examples of real world engineering ethics problems.Stephen H. Unger - 2000 - Science and Engineering Ethics 6 (3):423-430.
    Nine examples are presented illustrating the kinds of problems encountered in actual practice by conscientious engineers. These cases are drawn fom the records of the IEEE Ethics Committee, and from the experience of the ethics help-line initiated recently by the Online Ethics Center for Engineering and Science. They range from situations in which companies try to cheat one another to those in which human health and safety are jeopardized. In one case, an engineer learned that even a quiet resignation (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  20
    A Study on the Ethics Certification Program Based on the Morality Types of AI Robots. 변순용 - 2019 - Journal of Ethics: The Korean Association of Ethics 1 (126):73-90.
    최근 전기전자공학자협회(IEEE)에서 제안하고 있는 자율 지능 시스템의 윤리인증 프로그램(Ethics Certification Program for Autonomous and Intelligent System, ECPAIS)의 목표는 자율 지능 시스템의 투명성, 책임성 그리고 알고리즘 편향성의 축소를 증진시키는 인증 및 검토 과정에 필요한 것들을 만드는 것이다. 여기에서도 스마트 홈, 반려 로봇, 자율 주행차 혹은 이와 관련된 수많은 생산품과 서비스들의 형식으로 이러한 시스템이 확산되면서 이것들이 전문가들에 의해 “안전”하거나 “신뢰할 만한다”라고 평가되는지에 대해 시민이나 소비자들에게 알려야 할 필요성을 부정할 수는 없다. 이러한 필요성이 바로 윤리에 대한 ‘인증’이라는 개념이 도출되고 있는 이유일 것이다. (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  6
    Evolución de la cultura de defensa en la última década.Fernando Moréu Munáiz - 2014 - Arbor 190 (765):a095.
    El IEEE (Instituto Español de Estudios Estratégicos) impulsa, desde 1997 por medio del CIS (Centro de Investigaciones Sociológicas), la encuesta “La Defensa Nacional y las Fuerzas Armadas”. En ella se recoge, entre otras cuestiones, la opinión de los españoles en asuntos relacionados con el sentimiento y compromiso de sentirse español, la percepción de vivir en un mundo inseguro o el grado de reconocimiento de la sociedad española hacia sus Fuerzas Armadas. El estudio de la serie temporal de sus datos (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  30. Responsible AI: Two Frameworks for Ethical Design and Practice.Dorian Peters, Karina Vold, Diana Robinson & Rafael Calvo - 2020 - IEEE Transactions on Technology and Society 1 (1).
    In 2019, the IEEE launched the P7000 standards projects intended to address ethical issues in the design of autonomous and intelligent systems. This move came amidst a growing public concern over the unintended consequences of artificial intelligence (AI), compounded by the lack of an anticipatory process for attending to ethical impact within professional practice. However, the difficulty in moving from principles to practice presents a significant challenge to the implementation of ethical guidelines. Herein, we describe two complementary frameworks for (...)
    Direct download  
     
    Export citation  
     
    Bookmark   10 citations  
  31.  28
    Ethical issues related to the use of gerontechnology in older people care: A scoping review.Suvi Sundgren, Minna Stolt & Riitta Suhonen - 2020 - Nursing Ethics 27 (1):88-103.
    Background: Demographic trends indicate growth of population aged 65 and older in Western countries. One of the greatest challenges is to provide high-quality care for all. Technological solutions designed for older people, gerontechnology, can somewhat balance the gap between resources and the increasing demand of healthcare services. However, there are also ethical issues in the use of gerontechnology that need to be pointed out. Purpose: To describe what ethical issues are related to the use of gerontechnology in the care of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  32. Regular updating.Alain Chateauneuf, Thibault Gajdos & Jean-Yves Jaffray - 2011 - Theory and Decision 71 (1):111-128.
    We study the Full Bayesian Updating rule for convex capacities. Following a route suggested by Jaffray (IEEE Transactions on Systems, Man and Cybernetics 22(5):1144–1152, 1992), we define some properties one may want to impose on the updating process, and identify the classes of (convex and strictly positive) capacities that satisfy these properties for the Full Bayesian Updating rule. This allows us to characterize two parametric families of convex capacities: ${(\varepsilon,\delta)}$ -contaminations (which were introduced, in a slightly different form, by (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  33.  81
    Exploring the Influence of Organizational Ethical Climate on Knowledge Management.Fan-Chuan Tseng & Yen-Jung Fan - 2011 - Journal of Business Ethics 101 (2):325 - 342.
    In recent years, knowledge management has been utilized as an essential strategy to foster the creation of organizational intellectual capital. Organizational intellectual capital can be derived both individually and collectively in the process to create, store, share, acquire, and apply personal and organizational knowledge. However, some organizations only focus on the development of public good, despite the concerns arising from individuals' self-interest or possible risks. The different concern of individual and collective perspectives toward knowledge management inevitably leads to ethical conflicts (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  34. News from CyberSpace: VR and Hypertext.John G. Cramer - unknown
    I live in Seattle, the city which last Fall was host to two major international conferences of interest to science fiction readers: The Annual International IEEE Symposium on Virtual Reality (VRAIS- 93) and The 5th ACM Conference on Hypertext (Hypertext-93). I was able to attend both conferences, and I'll use this column to provide an overview of what I learned there.
    Direct download  
     
    Export citation  
     
    Bookmark  
  35. Embedding Values in Artificial Intelligence (AI) Systems.Ibo van de Poel - 2020 - Minds and Machines 30 (3):385-409.
    Organizations such as the EU High-Level Expert Group on AI and the IEEE have recently formulated ethical principles and (moral) values that should be adhered to in the design and deployment of artificial intelligence (AI). These include respect for autonomy, non-maleficence, fairness, transparency, explainability, and accountability. But how can we ensure and verify that an AI system actually respects these values? To help answer this question, I propose an account for determining when an AI system can be said to (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   55 citations  
  36.  27
    Desempeño en métodos de navegación autónoma para robots móviles.Gabriela Alvarez & Omar Flor - 2020 - Minerva 1 (2):19-29.
    En este trabajo se presenta una comparación de los tiempos de respuesta, optimización de la ruta y complejidad del grafo en métodos de planificación de trayectoria para robots móviles autónomos. Se contrastan los desarrollos de Voronoi, Campos potenciales, Roadmap probabilístico y Descomposición en celdas para la navegación en un mismo entorno y validándolos para un número variable de obstáculos. Las evaluaciones demuestran que el método de generación de trayectoria por Campos Potenciales, mejora la navegación respecto de la menor ruta obtenida, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  37. Simulation of biological evolution under attack, but not really: a response to Meester.Stefaan Blancke, Maarten Boudry & Johan Braeckman - 2011 - Biology and Philosophy 26 (1):113-118.
    The leading Intelligent Design theorist William Dembski (Rowman & Littlefield, Lanham MD, 2002) argued that the first No Free Lunch theorem, first formulated by Wolpert and Macready (IEEE Trans Evol Comput 1: 67–82, 1997), renders Darwinian evolution impossible. In response, Dembski’s critics pointed out that the theorem is irrelevant to biological evolution. Meester (Biol Phil 24: 461–472, 2009) agrees with this conclusion, but still thinks that the theorem does apply to simulations of evolutionary processes. According to Meester, the theorem (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  38.  14
    (2 other versions)Young Researchers in HRI Workshop 2006.Jenny Burke, Robin R. Murphy & Cory Kidd - 2007 - Interaction Studies. Social Behaviour and Communication in Biological and Artificial Systemsinteraction Studies / Social Behaviour and Communication in Biological and Artificial Systemsinteraction Studies 8 (2):343-358.
    The first Young Researchers in Human–Robot Interaction Workshop, held on March 1, 2006 in Salt Lake City, Utah, provides insight into how to facilitate the establishment of the HRI community. Organized in conjunction with the first annual ACM/IEEE Human Robot Interaction Conference, the NSF-sponsored workshop assembled 15 graduate students from 5 different countries in computer science, psychology, engineering, and the arts to build the HRI community. This report highlights recommendations from discussion sessions, a synopsis of the plenary address, and (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  39.  24
    Coste de la publicación en abierto de artículos de autoría española en cinco áreas de las ciencias sociales.Antonia Ferrer-Sapena, Christian Vidal-Cabo, Rafael Aleixandre-Benavent & Juan Carlos Valderrama-Zurián - 2021 - Arbor 197 (799):a590.
    La publicación en abierto de los artículos conlleva unos gastos conocidos como cargos por procesamiento de artículos. El objetivo de este trabajo es determinar el coste de los artículos publicados en abierto mediante APC de autoría española en cinco categorías temáticas de las ciencias sociales: Humanities, Sociology, Information Science & Library Science, Education & Educational Research y Communication de la Colección Principal de la Web of Science durante el periodo 2012-2019. Se han identificado las revistas, las instituciones financiadoras y los (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  40. Sparrow's 2012 argument that robotic weapons are desastrous for peace.Michael H. G. Hoffmann - forthcoming - .
    This argument map represents the argumentation of Sparrow, R. . "Just say No" to Drones. IEEE Technology and Society Magazine, M 1932-4529/12, 56-63. doi: 10.1109/MTS.2012.2185275. The argument map is open for debate in AGORA-net, search for map ID 9712.
     
    Export citation  
     
    Bookmark  
  41.  84
    Quantum Mutual Entropy Defined by Liftings.Satoshi Iriyama & Masanori Ohya - 2011 - Foundations of Physics 41 (3):406-413.
    A lifting is a map from the state of a system to that of a compound system, which was introduced in Accardi and Ohya (Appl. Math. Optim. 39:33–59, 1999). The lifting can be applied to various physical processes.In this paper, we defined a quantum mutual entropy by the lifting. The usual quantum mutual entropy satisfies the Shannon inequality (Ohya in IEEE Trans. Inf. Theory 29(5):770–774, 1983), but the mutual entropy defined through the lifting does not satisfy this inequality unless (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  42.  10
    4th National Cyber Security Workshop, 11-12 Nov 2016, Mumbai.Anthony Lobo - 2016 - International Review of Information Ethics 25.
    The 4th National Cyber Security Workshop organised by IEEE India Council was held in Mumbai at the sprawling Yantra Park, Thane Campus of Tata Consultancy Services on 11 & 12 November, 2016. This event follows two successful editions of the workshop in Ahmedabad and Bangalore.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  19
    A Multiswarm Intelligence Algorithm for Expensive Bound Constrained Optimization Problems.Wali Khan Mashwani, Ruqayya Haider & Samir Brahim Belhaouari - 2021 - Complexity 2021:1-18.
    Constrained optimization plays an important role in many decision-making problems and various real-world applications. In the last two decades, various evolutionary algorithms were developed and still are developing under the umbrella of evolutionary computation. In general, EAs are mainly categorized into nature-inspired and swarm-intelligence- based paradigms. All these developed algorithms have some merits and also demerits. Particle swarm optimization, firefly algorithm, ant colony optimization, and bat algorithm have gained much popularity and they have successfully tackled various test suites of benchmark (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  44. The Role of Artificial Intelligence in Nursing Care: An Umbrella Review.Moustaq Karim Khan Rony, Alok Das, Md Ibrahim Khalil, Umme Rabeya Peu, Bishwajit Mondal, Md Shafiul Alam, Abu Zafor Md Shaleah, Mst Rina Parvin, Daifallah M. Alrazeeni & Fazila Akter - 2025 - Nursing Inquiry 32 (2).
    Artificial intelligence (AI) is revolutionizing nursing by enhancing decision‐making, patient monitoring, and efficiency. Machine learning, natural language processing (NLP), and predictive analytics claim to improve safety and automate tasks. However, a structured analysis of AI applications is necessary to ensure their effective implementation in nursing practice. This umbrella review aimed to synthesize existing systematic reviews on AI applications in nursing care, providing a comprehensive analysis of its benefits, challenges, and ethical implications. By consolidating findings from multiple sources, this review seeks (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  45.  11
    Injusticias Epistémicas: Análisis y Contextos.Cristián Santibáñez & Leandro De Brasi (eds.) - 2022 - Lima, Peru: Palestra Editores.
    Injusticia epistémica es una etiqueta conceptual que ha tenido, al menos, un doble rendimiento. Por una parte, el concepto que ha propuesto Miranda Fricker en Injusticia Epistémica ha permitido profundizar en el diálogo filosófico respecto de cómo se generan y justifican las creencias y las pretensiones de conocimiento y, por otra parte, ha permitido en el dominio social nombrar distintas prácticas culturales de abuso, invisibilización, o asimetrías de poder que benefician algunos y deterioran a otros. Ya han pasado quince años (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  13
    Finding Clusters and Outliers for Data Sets with Constraints.Yong Shi - 2011 - Journal of Intelligent Systems 20 (1):3-14.
    In this paper, we present our research on data mining approaches with the existence of obstacles. Although there are a lot of algorithms designed to detect clusters with obstacles, few algorithms can detect clusters and outliers simultaneously and interactively. We here extend our original research [Shi, Zhang, Towards Exploring Interactive Relationship between Clusters and Outliers in Multi-Dimensional Data Analysis, 518–519: IEEE Computer Society, 2005] on iterative cluster and outlier detection to study the problem of detecting cluster and outliers iteratively (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  47.  35
    Seeming autonomy, technology and the uncanny valley.Rasmus Gahrn-Andersen - 2022 - AI and Society 37 (2):595-603.
    This paper extends Mori’s (IEEE Robot Autom Mag 19:98–100, 2012) uncanny valley-hypothesis to include technologies that fail its basic criterion that uncanniness arises when the subject experiences a discrepancy in a machine’s human likeness. In so doing, the paper considers Mori’s hypothesis about the uncanny valley as an instance of what Heidegger calls the ‘challenging revealing’ nature of modern technology. It introduces seeming autonomy and heteronomy as phenomenological categories that ground human being-in-the-world including our experience of things and people. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  48.  38
    Optimal Dispatch of Reactive Power Using Modified Stochastic Fractal Search Algorithm.Thang Trung Nguyen, Dieu Ngoc Vo, Hai Van Tran & Le Van Dai - 2019 - Complexity 2019 (1):4670820.
    This paper applies a proposed modified stochastic fractal search algorithm (MSFS) for dealing with all constraints of optimal reactive power dispatch (ORPD) and finding optimal solutions for three different cases including power loss optimization, voltage deviation optimization, and L-index optimization. The proposed MSFS method is newly constructed in the paper by modifying three new solution update mechanisms on standard stochastic fractal search algorithm (SSFS). The first modification is to keep only one formula and abandon one formula in the diffusion process (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  49.  42
    Immersive Interactive Technologies for Positive Change: A Scoping Review and Design Considerations.Alexandra Kitson, Mirjana Prpa & Bernhard E. Riecke - 2018 - Frontiers in Psychology 9:370199.
    Practices such as mindfulness, introspection, and self-reflection are known to have positive short and long-term effects on health and well-being. However, in today's modern, fast-paced, technological world tempted by distractions these practices are often hard to access and relate to a broader audience. Consequently, technologies have emerged that mediate personal experiences, which is reflected in the high number of available applications designed to elicit positive changes. These technologies elicit positive changes by bringing users' attention to the self—from technologies that show (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  50.  48
    Views on the NAS/NAE/IM convocation on scientific conduct.J. A. Casazza & Seymour J. Garte - 1995 - Science and Engineering Ethics 1 (2):111-112.
    The author is the recipient of the Herman Halperin Electric Transmission and Distribution Award, IEEE; United States Activities Board Professional Leadership Award, IEEE; United States Activities Board Citation of Honor, IEEE; Philip Sporn Award, Cigré; Atwood Associate, Cigré. J.A. Casazza has established the Peter Cooper Fund for Advancing Government Technical Competitions at Cooper Union.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 160