machine memory
Recently Published Documents


TOTAL DOCUMENTS

26
(FIVE YEARS 10)

H-INDEX

3
(FIVE YEARS 1)

Author(s):  
Selin Yılmaz ◽  
Deniz Yengin

Human is a social being, and needs communication to convey feelings, thoughts, beliefs, and ideologies to survive. Despite being man-made, machines do not have any feelings. However, the development of artificial intelligence poses a suggestion that machines can also think, and feel. The development of new communication technologies reveals the importance of the relationship between machines and humans. People can control the machine/robot with voice commands or hand-face-eye scans. The data processed in the machine memory can be interpreted with other algorithms and instantly give the needed information. The machine that processes the reaction of the individual sometimes may be protective for itself and the individual, and sometimes, a shadow. By recognizing the individual, the machine can turn into a dangerous and useful tool. Makine işlediği verileri saklayıp, depolamakta ve kayıt altına almaktadır. The data is protected by a machine-built firewall. However, if these data are captured, internal and external surveillance is inevitable. Nowadays, in terms of the ecology of communication, new media tools ensure the continuity of communication and facilitate the individual's socialization. In addition, the machines add speed to the life of the individual over time and space. In this study, the character structures of the machine are examined and its importance in terms of digital surveillance is revealed. The aim is to evaluate the machine in terms of digital surveillance by revealing that the machine can be protective, shadow, friend, or dangerous for the individual with the concept of artificial intelligence. In this study, the emotional intelligence of the machine and the concept of digital surveillance will be analyzed using the content analysis method and semiotics technique. In the research, randomly picked 5 Hollywood films (Ex Machina, I Robot, Bicentennial Man, Transcendence, Eagle Eye) will be analysed according to the character analysis of Jung, and the different aspects of the human and machine will be determined by making use of the emotional side of the machine and the fundamental oppositions of Barthes. In these films, the forms of the machine are different, and it is noteworthy that they have protective and shadow characters. The machine becomes dangerous by acting with its emotions. As a result, it has been revealed that the machine/robot reacts according to the data and has an important aspect in terms of digital surveillance since the machine is constantly evolving with the power of artificial intelligence, and this development makes it easier to access other tools and facilitate digital surveillance. In the eagle eye film, the machine can make digital surveillance using all the camera systems in the city.


Author(s):  
Xin Lin ◽  
Guoqiang Zhong ◽  
Kang Chen ◽  
Qingyang Li ◽  
Kaizhu Huang
Keyword(s):  

2021 ◽  
Vol 121 ◽  
pp. 02006
Author(s):  
Stepan Gennadievich Chukhin ◽  
Elena Anatolyevna Cherkevich ◽  
Elena Viktorovna Chukhina

Research background: the concept of “identity” is defined as a property of the human psyche to express in a concentrated form how one perceives his/her affiliation to various social, economic, national, professional, linguistic, political, religious, racial and other groups or other communities, or a person’s acceptance of the properties inherent in these groups or communities. The life-purpose identity is a fundamental parameter for defining one’s place in life, one’s value orientations and, above all, for affiliating oneself with the major social values of the modern society. Purpose of the research: theoretical justification, experimental representation and technological support of the process of life-purpose identity formation in adolescent and junior age. Methods: theoretical analysis and study of psychological literature on the problem under discussion, which included generalisation, comparison and systematisation of the obtained data. Empirical data collecting methods (testing). Methods of mathematical statistics (λ-Kolmogorov-Smirnov test, Student t-test, Pearson linear correlation r-coefficient), Leontyev’s life-purpose orientation test, Karpov’s methods for determining the individual measure of reflexivity, Stolin’s and Pantileev’s self-attitude method, Sharov’s ontology of personal myth of life. Results and novelty: the article makes an attempt to delineate the problem-plagued field of one’s life-purpose identity; gives a representation of diagnostic results, substantiates and develops the technological support for the formation of life-purpose identity in adolescent and junior age. The technology of commemorative practices is used as a framework (reading of authentic texts; practice of commemorative speeches; family saga; legendisation of hero’s image; “School is my home”; “Time machine”; “Memory dialogue”; “Planets of childhood”; background commemorative practices; calendar-specific commemorative practices and others).


2020 ◽  
Vol 34 (06) ◽  
pp. 10259-10266
Author(s):  
Sriram Srinivasan ◽  
Eriq Augustine ◽  
Lise Getoor

Statistical relational learning (SRL) frameworks allow users to create large, complex graphical models using a compact, rule-based representation. However, these models can quickly become prohibitively large and not fit into machine memory. In this work we address this issue by introducing a novel technique called tandem inference (ti). The primary idea of ti is to combine grounding and inference such that both processes happen in tandem. ti uses an out-of-core streaming approach to overcome memory limitations. Even when memory is not an issue, we show that our proposed approach is able to do inference faster while using less memory than existing approaches. To show the effectiveness of ti, we use a popular SRL framework called Probabilistic Soft Logic (PSL). We implement ti for PSL by proposing a gradient-based inference engine and a streaming approach to grounding. We show that we are able to run an SRL model with over 1B cliques in under nine hours and using only 10 GB of RAM; previous approaches required more than 800 GB for this model and are infeasible on common hardware. To the best of our knowledge, this is the largest SRL model ever run.


2020 ◽  
Author(s):  
Xiaochen Guo
Keyword(s):  

Author(s):  
Abraham Ayegba Alfa ◽  
Sanjay Misra ◽  
Francisca N. Ogwueleka ◽  
Ravin Ahuja ◽  
Adewole Adewumi ◽  
...  
Keyword(s):  

Author(s):  
Shuhui Zhang ◽  
Lianhai Wang ◽  
Lijuan Xu ◽  
Shujiang Xu ◽  
Xiaohui Han ◽  
...  

2019 ◽  
Author(s):  
Girish L

Cloud computing is a technology which relies onsharing various computing resources instead of having localservers to handle applications. Cloud computing is driven byvirtualization technology. Virtual machines need migration fromone host to anther due to the presence of error or over loading orslowness in the current running host machine. Live Virtualmachine migration is the transfer of running virtual machinefrom one host to another without stopping the current runningtask. During this live virtual machine migration Downtime is oneof the key factors that have to be considered and assessed.Here we present detailed survey on what are the importance oflive virtual machine migration in cloud computing technologyand various techniques to reduce the downtime during livevirtual machine migration. The flow chart showing the steps usedin Pre copy approach for VM migration. And also we presentthe result of the comparison between the two virtual machinemigration environments, VMWare and Xen Server.


Sign in / Sign up

Export Citation Format

Share Document