169,091 research outputs found
A Memento of Complexity: The Rhetorics of Memory, Ambience, and Emergence
Drawing from complexity theory, this dissertation develops a schema of rhetorical memory that exhibits extended characteristics. Scholars traditionally conceptualize memory, the fourth canon in classical rhetoric, as place (loci) or image (phantasm). However, memory rhetoric resists the traditional loci-phantasm framework and instead emerges from enmeshments of interiority, collectivity, and technology. Emergence considers the dynamics of fundamental parts that generate complex systems and offers a methodological lens to theorizing memory. The resulting construct informs everyday life, which includes interfacing with pervasive computing or sensing familiarity. Further, congruently with a neurological turn that contradicts simplification, this dissertation resituates rhetorical memory as generative to imagination or perception
Perception and Cognition Are Largely Independent, but Still Affect Each Other in Systematic Ways: Arguments from Evolution and the Consciousness-Attention Dissociation
The main thesis of this paper is that two prevailing theories about cognitive penetration are too extreme, namely, the view that cognitive penetration is pervasive and the view that there is a sharp and fundamental distinction between cognition and perception, which precludes any type of cognitive penetration. These opposite views have clear merits and empirical support. To eliminate this puzzling situation, we present an alternative theoretical approach that incorporates the merits of these views into a broader and more nuanced explanatory framework. A key argument we present in favor of this framework concerns the evolution of intentionality and perceptual capacities. An implication of this argument is that cases of cognitive penetration must have evolved more recently and that this is compatible with the cognitive impenetrability of early perceptual stages of processing information. A theoretical approach that explains why this should be the case is the consciousness and attention dissociation framework. The paper discusses why concepts, particularly issues concerning concept acquisition, play an important role in the interaction between perception and cognition
Cognitively-inspired Agent-based Service Composition for Mobile & Pervasive Computing
Automatic service composition in mobile and pervasive computing faces many
challenges due to the complex and highly dynamic nature of the environment.
Common approaches consider service composition as a decision problem whose
solution is usually addressed from optimization perspectives which are not
feasible in practice due to the intractability of the problem, limited
computational resources of smart devices, service host's mobility, and time
constraints to tailor composition plans. Thus, our main contribution is the
development of a cognitively-inspired agent-based service composition model
focused on bounded rationality rather than optimality, which allows the system
to compensate for limited resources by selectively filtering out continuous
streams of data. Our approach exhibits features such as distributedness,
modularity, emergent global functionality, and robustness, which endow it with
capabilities to perform decentralized service composition by orchestrating
manifold service providers and conflicting goals from multiple users. The
evaluation of our approach shows promising results when compared against
state-of-the-art service composition models.Comment: This paper will appear on AIMS'19 (International Conference on
Artificial Intelligence and Mobile Services) on June 2
Agri-Food Traceability Management using a RFID System with Privacy Protection
In this paper an agri-food traceability system based on public key cryptography and Radio Frequency Identification (RFID) technology is proposed. In order to guarantee safety in food, an efficient tracking and tracing system is required. RFID devices allow recording all useful information for traceability directly on the commodity. The security issues are discussed and two different methods based on public cryptography are proposed and evaluated. The first algorithm uses a nested RSA based structure to improve security, while the second also provides authenticity of data. An experimental analysis demonstrated that the proposed system is well suitable on PDAs to
Recommended from our members
Neurocognitive profiles in autism spectrum disorder
textThe current research project examines the performance of a group of high functioning young adult males with autism spectrum disorders on standardized measures of neurocognitive functioning to determine whether distinct cognitive profiles of strengths and weaknesses emerge. Neuropsychological test data across various domains: general cognitive ability, visuospatial processing, verbal learning and memory, visual learning and memory, working memory, reasoning, cognitive flexibility, attention, receptive language, expressive language, social and emotional processing, and fine motor skills was examined. Data were analyzed using cluster analysis to assess for the presence and nature of unique clusters/subgroups based on neuropsychological test performance. Three unique clusters were derived from the analyses. This study highlights the well-documented heterogeneity across the spectrum of autism and suggests a method for parsing a heterogeneous sample of ASD subjects into smaller and more meaningful homogeneous groups using standardized neuropsychological assessments.Educational Psycholog
- …