130,967 research outputs found
Intelligent Computing: The Latest Advances, Challenges and Future
Computing is a critical driving force in the development of human
civilization. In recent years, we have witnessed the emergence of intelligent
computing, a new computing paradigm that is reshaping traditional computing and
promoting digital revolution in the era of big data, artificial intelligence
and internet-of-things with new computing theories, architectures, methods,
systems, and applications. Intelligent computing has greatly broadened the
scope of computing, extending it from traditional computing on data to
increasingly diverse computing paradigms such as perceptual intelligence,
cognitive intelligence, autonomous intelligence, and human-computer fusion
intelligence. Intelligence and computing have undergone paths of different
evolution and development for a long time but have become increasingly
intertwined in recent years: intelligent computing is not only
intelligence-oriented but also intelligence-driven. Such cross-fertilization
has prompted the emergence and rapid advancement of intelligent computing.
Intelligent computing is still in its infancy and an abundance of innovations
in the theories, systems, and applications of intelligent computing are
expected to occur soon. We present the first comprehensive survey of literature
on intelligent computing, covering its theory fundamentals, the technological
fusion of intelligence and computing, important applications, challenges, and
future perspectives. We believe that this survey is highly timely and will
provide a comprehensive reference and cast valuable insights into intelligent
computing for academic and industrial researchers and practitioners
Natural Computational Architectures for Cognitive Info-Communication
Recent comprehensive overview of 40 years of research in cognitive architectures, (Kotseruba and Tsotsos 2020), evaluates modelling of the core cognitive abilities in humans, but only marginally addresses biologically plausible approaches based on natural computation. This mini review presentsa set of perspectives and approaches which have shaped the development of biologically inspired computational models in the recent past that can lead to the development of biologically more realistic cognitive architectures. For describing continuum of natural cognitive architectures, from basal cellular to human-level cognition, we use evolutionary info-computational framework, where natural/ physical/ morphological computation leads to evolution of increasingly complex cognitive systems. Forty years ago, when the first cognitive architectures have been proposed, understanding of cognition, embodiment and evolution was different. So was the state of the art of information physics, bioinformatics, information chemistry, computational neuroscience, complexity theory, selforganization, theory of evolution, information and computation. Novel developments support a constructive interdisciplinary framework for cognitive architectures in the context of computing nature, where interactions between constituents at different levels of organization lead to complexification of agency and increased cognitive capacities. We identify several important research questions for further investigation that can increase understanding of cognition in nature and inspire new developments of cognitive technologies. Recently, basal cell cognition attracted a lot of interest for its possible applications in medicine, new computing technologies, as well as micro- and nanorobotics. Bio-cognition of cells connected into tissues/organs, and organisms with the group (social) levels of information processing provides insights into cognition mechanisms that can support the development of new AI platforms and cognitive robotics
Integrating Social and Economic Models of Responding to Privacy Messages in Mobile Computing: A Research Agenda
Mobile computing has provided technology to an unprecedented user base and has created a market for applications that is expected to reach $77 billion by 2017, involving over 268 billion downloads. Nearly every download involves privacy messages that request permissions to access information such as contact, calendar, and location information. Recent cases have revealed that users are often surprised when they discover the permissions they have granted, which implies that not everyone reads them carefully. In this paper we propose a research agenda focusing on the decisions that users make about those permissions requests. Several theories provide promising antecedents to explain acceptance of privacy permissions. Nine propositions are presented, with three from each research bases from social, economic, and cognitive perspectives. The research agenda thus is a combination hybrid social/economic/cognitive approach. The agenda complements extant research that has focused on privacy calculus theory
Recommended from our members
Determinants of Cloud Computing Intentions to Use: Role of Firm’s Size, Managerial Structure and Industrial Sector
Currently many companies are adopting cloud computing to accomplish their diverse purposes and to create an elastic and responsive environment that can rapidly respond to new business requirements. This paper attempts to investigate the factors influencing cloud computing adoption from the managerial perspective with inclusion of size of firm, organizational structure and type of industry as control variables. The model is developed with various technological, economic and cognitive factors that affect the behavioral intention to use cloud computing using technology acceptance model (TAM).Questionnaires were randomly distributed to around 1000 senior managers of various firms in India. Hierarchical multiple regression (HMR) was performed to test the impact of control variables on the factors that influence managerial intention to adopt cloud computing. The result showed that all the independent variables (perceived usefulness, perceived ease of use, perceived risks, perceived benefits, perceived ubiquity, perceived costs and job relevance) explain additional 32.3% of variance in intention to use cloud computing. Based on standardized beta coefficients (β) values, the result showed that the impact of firm size is found highest among other control variables in explaining the amount of variability in behavioral intention to use cloud computing. The result of this study will enable the firms to focus on managerial perspectives of cloud-based applications and their attitude towards adoption
Memristive and neuromorphic behavior in a Li x CoO 2 nanobattery
International audienceThe phenomenon of resistive switching (RS), which was initially linked to non-volatile resistive memory applications, has recently also been associated with the concept of memristors, whose adjustable multilevel resistance characteristics open up unforeseen perspectives in cognitive computing. Herein, we demonstrate that the resistance states of Li(x)CoO2 thin film-based metal-insulator-metal (MIM) solid-state cells can be tuned by sequential programming voltage pulses, and that these resistance states are dramatically dependent on the pulses input rate, hence emulating biological synapse plasticity. In addition, we identify the underlying electrochemical processes of RS in our MIM cells, which also reveal a nanobattery-like behavior, leading to the generation of electrical signals that bring an unprecedented new dimension to the connection between memristors and neuromorphic systems. Therefore, these LixCoO2-based MIM devices allow for a combination of possibilities, offering new perspectives of usage in nanoelectronics and bio-inspired neuromorphic circuits
Recommended from our members
Neurons and symbols: a manifesto
We discuss the purpose of neural-symbolic integration including its principles, mechanisms and applications. We outline a cognitive computational model for neural-symbolic integration, position the model in the broader context of multi-agent systems, machine learning and automated reasoning, and list some of the challenges for the area of
neural-symbolic computation to achieve the promise of effective integration of robust learning and expressive reasoning under uncertainty
Considering Human Aspects on Strategies for Designing and Managing Distributed Human Computation
A human computation system can be viewed as a distributed system in which the
processors are humans, called workers. Such systems harness the cognitive power
of a group of workers connected to the Internet to execute relatively simple
tasks, whose solutions, once grouped, solve a problem that systems equipped
with only machines could not solve satisfactorily. Examples of such systems are
Amazon Mechanical Turk and the Zooniverse platform. A human computation
application comprises a group of tasks, each of them can be performed by one
worker. Tasks might have dependencies among each other. In this study, we
propose a theoretical framework to analyze such type of application from a
distributed systems point of view. Our framework is established on three
dimensions that represent different perspectives in which human computation
applications can be approached: quality-of-service requirements, design and
management strategies, and human aspects. By using this framework, we review
human computation in the perspective of programmers seeking to improve the
design of human computation applications and managers seeking to increase the
effectiveness of human computation infrastructures in running such
applications. In doing so, besides integrating and organizing what has been
done in this direction, we also put into perspective the fact that the human
aspects of the workers in such systems introduce new challenges in terms of,
for example, task assignment, dependency management, and fault prevention and
tolerance. We discuss how they are related to distributed systems and other
areas of knowledge.Comment: 3 figures, 1 tabl
Towards trusted volunteer grid environments
Intensive experiences show and confirm that grid environments can be
considered as the most promising way to solve several kinds of problems
relating either to cooperative work especially where involved collaborators are
dispersed geographically or to some very greedy applications which require
enough power of computing or/and storage. Such environments can be classified
into two categories; first, dedicated grids where the federated computers are
solely devoted to a specific work through its end. Second, Volunteer grids
where federated computers are not completely devoted to a specific work but
instead they can be randomly and intermittently used, at the same time, for any
other purpose or they can be connected or disconnected at will by their owners
without any prior notification. Each category of grids includes surely several
advantages and disadvantages; nevertheless, we think that volunteer grids are
very promising and more convenient especially to build a general multipurpose
distributed scalable environment. Unfortunately, the big challenge of such
environments is, however, security and trust. Indeed, owing to the fact that
every federated computer in such an environment can randomly be used at the
same time by several users or can be disconnected suddenly, several security
problems will automatically arise. In this paper, we propose a novel solution
based on identity federation, agent technology and the dynamic enforcement of
access control policies that lead to the design and implementation of trusted
volunteer grid environments.Comment: 9 Pages, IJCNC Journal 201
- …