Academic literature on the topic 'INTELLIGENT OWA'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'INTELLIGENT OWA.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "INTELLIGENT OWA"

1

Reformat, Marek Z., Ronald R. Yager, Zhan Li, and Naif Alajlan. "Human-inspired Identification of High-level Concepts using OWA and Linguistic Quantifiers." International Journal of Computers Communications & Control 6, no. 3 (September 10, 2011): 473. http://dx.doi.org/10.15837/ijccc.2011.3.2132.

Full text
Abstract:
Intelligent agent based system can be used to identify high-level concepts matching sets of keywords provided by users. A new human-inspired approach to concept identification in documents is introduced here. The proposed method takes keywords and builds concept structures based on them. These concept structures are represented as hierarchies of concepts (HofC). The ontology is used to enrich HofCs with terms and other concepts (sub-concepts) based on concept definitions, as well as with related concepts. Additionally, the approach uses levels of importance of terms defining the concepts. The levels of importance of terms are continuously updated based on a flow of documents using an Adaptive Assignment of Term Importance (AATI) schema. The levels of activation of concepts identified in a document that match these in the HofC are estimated using ordered weighted averaging (OWA) operators with linguistic quantifiers. A simple case study presented in the paper is designed to illustrate the approach.
APA, Harvard, Vancouver, ISO, and other styles
2

Liang, Shiyuan, Hui Cao, and Henglong Shen. "Intelligent Evaluation Method of Marine Engine Simulator Based on Combination Weighting." Journal of Physics: Conference Series 2173, no. 1 (January 1, 2022): 012003. http://dx.doi.org/10.1088/1742-6596/2173/1/012003.

Full text
Abstract:
Abstract In order to solve the problems of objectivity and inaccuracy in the current evaluation of marine engine simulator, an evaluation model is established based on C-OWA (combination ordered weighted averaging)-the Coefficient of Variation method-minimum discriminant information principle combination weighting method and Vague set. Taking standby of marine generator project as an experiment example, the evaluation index system is established, and the evaluation model is applied to evaluate each evaluation team, and the final operation score of each team is obtained. The results show that (1) the index system is comprehensive and targeted for the operation evaluation of generator standby project; (2) the combination weighting method can improve the rationality of index weighting; (3) Vague set fuzzy decision-making can improve the accuracy of fuzzy evaluation of simulator operation; (4) the model shows rationality and reliability in evaluation results and can provide a reasonable and feasible method for intelligent evaluation of marine simulator.
APA, Harvard, Vancouver, ISO, and other styles
3

P V R N S S V Sai Leela, Bankapalli Jyothi, Pullagura Indira priyadarsini,. "Towards Intelligent Machine Learning Models for Intrusion Detection System." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 5 (April 11, 2021): 643–55. http://dx.doi.org/10.17762/turcomat.v12i5.1062.

Full text
Abstract:
The Internet has become an important resource for mankind. Explicitly information security is an interminable domain to the present world. Hence a more potent Intrusion Detection System (IDS) should be built. Machine Learning techniques are used in developing proficient models for IDS. Imbalanced Learning is a crucial task for many classification processes. Resampling training data towards a more balanced distribution is an effective way to combat this issue. There are most prevalent techniques like under sampling and oversampling.In this paper, the issues of imbalanced data distribution and high dimensionality are addressed using a novel oversampling technique and an innovative feature selection method respectively. Our work suggests a novel hybrid algorithm, HOK-SMOTE which considers an ordered weighted averaging (OWA) approach for choosing the best features from the KDD cup 99 data set and K-Means SMOTE for imbalanced learning. Here an ensemble model is compared against the hybrid algorithm. This ensemble integrates Support Vector Machine (SVM), K Nearest Neighbor (KNN), Gaussian Naïve Bayes (GNB) and Decision Tree (DT). Then weighted average voting is applied for prediction of outputs. In this work, much Experimentationwas conducted on various oversampling techniques and traditional classifiers. The results indicate that the proposed work is the most accurate one among other ML techniques. The precision, recall, F-measure, and ROC curve show notable outcomes. Hence K-Means SMOTE in parallel with ensemble learning has given satisfactory results and a precise solution to the imbalanced learning in IDS. It is ascertained whether ensemble modeling or oversampling techniques are dominating for Intrusion data set.
APA, Harvard, Vancouver, ISO, and other styles
4

Xue, Xingsi, Jianhua Guo, Miao Ye, and Jianhui Lv. "Similarity Feature Construction for Matching Ontologies through Adaptively Aggregating Artificial Neural Networks." Mathematics 11, no. 2 (January 16, 2023): 485. http://dx.doi.org/10.3390/math11020485.

Full text
Abstract:
Ontology is the kernel technique of Semantic Web (SW), which enables the interaction and cooperation among different intelligent applications. However, with the rapid development of ontologies, their heterogeneity issue becomes more and more serious, which hampers communications among those intelligent systems built upon them. Finding the heterogeneous entities between two ontologies, i.e., ontology matching, is an effective method of solving ontology heterogeneity problems. When matching two ontologies, it is critical to construct the entity pair’s similarity feature by comprehensively taking into consideration various similarity features, so that the identical entities can be distinguished. Due to the ability of learning complex calculating model, recently, Artificial Neural Network (ANN) is a popular method of constructing similarity features for matching ontologies. The existing ANNs construct the similarity feature in a single perspective, which could not ensure its effectiveness under diverse heterogeneous contexts. To construct an accurate similarity feature for each entity pair, in this work, we propose an adaptive aggregating method of combining different ANNs. In particular, we first propose a context-based ANN and syntax-based ANN to respectively construct two similarity feature matrices, which are then adaptively integrated to obtain a final similarity feature matrix through the Ordered Weighted Averaging (OWA) and Analytic hierarchy process (AHP). Ontology Alignment Evaluation Initiative (OAEI)’s benchmark and anatomy track are used to verify the effectiveness of our method. The experimental results show that our approach’s results are better than single ANN-based ontology matching techniques and state-of-the-art ontology matching techniques.
APA, Harvard, Vancouver, ISO, and other styles
5

Nabeeh, Nada A., Mohamed Abdel-Basset, Abduallah Gamal, and Victor Chang. "Evaluation of Production of Digital Twins Based on Blockchain Technology." Electronics 11, no. 8 (April 17, 2022): 1268. http://dx.doi.org/10.3390/electronics11081268.

Full text
Abstract:
A blockchain, as a form of distributed ledger technology, represents the unanimity of replication, synchronization, and sharing of data among various geographical sites. Blockchains have demonstrated impressive and effective applications throughout many aspects of the business. Blockchain technology can lead to the advent of the construction of Digital Twins (DTs). DTs involve the real representation of physical devices digitally as a virtual representation of both elements and dynamics prior to the building and deployment of actual devices. DT products can be built using blockchain-based technology in order to achieve sustainability. The technology of DT is one of the emerging novel technologies of Industry 4.0, along with artificial intelligence (AI) and the Internet of Things (IoT). Therefore, the present study adopts intelligent decision-making techniques to conduct a biased analysis of the drivers, barriers, and risks involved in applying blockchain technologies to the sustainable production of DTs. The proposed model illustrates the use of neutrosophic theory to handle the uncertain conditions of real-life situations and the indeterminate cases evolved in decision-makers’ judgments and perspectives. In addition, the model applies the analysis of Multi-criteria Decision Making (MCDM) methods through the use of ordered weighted averaging (OWA) and the Technique of Order Preference Similarity to the Ideal Solution (TOPSIS) to achieve optimal rankings for DT production providers based on consistent weighted decision-maker’s judgments in order to maintain and to assure sustainability. An empirical study is applied to the uncertain environment to aid decision-makers in achieving ideal decisions for DT providers with respect to various DT challenges, promoting sustainability and determining the best service providers. The Monte Carlo simulation method is used to illustrate, predict, and forecast the importance of the weights of decision-makers’ judgments as well as the direct impact on the sustainability of DT production.
APA, Harvard, Vancouver, ISO, and other styles
6

Aló, Richard, and Vladik Kreinovich. "Selected Papers from InTech'04." Journal of Advanced Computational Intelligence and Intelligent Informatics 10, no. 3 (May 20, 2006): 243–44. http://dx.doi.org/10.20965/jaciii.2006.p0243.

Full text
Abstract:
The main objective of the annual International Conference on Intelligent Technologies (InTech) is to bring together researchers and practitioners who implement intelligent and fuzzy technologies in real-world environment. The Fifth International Conference on Intelligent Technologies InTech'04 was held in Houston, Texas, on December 2-4, 2004. Topics of InTech'04 included mathematical foundations of intelligent technologies, traditional Artificial Intelligent techniques, uncertainty processing and methods of soft computing, learning/adaptive systems/data mining, and applications of intelligent technologies. This special issue contains versions of 15 selected papers originally presented at InTech'04. These papers cover most of the topics of the conference. Several papers describe new applications of the existing intelligent techniques. R. Aló{o} et al. show how traditional <I>statistical</I> hypotheses testing techniques – originally designed for processing measurement results – need to be modified when applied to simulated data – e.g., when we compare the quality of two algorithms. Y. Frayman et al. use <I>mathematical morphology</I> and <I>genetic algorithms</I> in the design of a machine vision system for detecting surface defects in aluminum die casting. Y. Murai et al. propose a new faster <I>entropy</I>-based placement algorithm for VLSI circuit design and similar applications. A. P. Salvatore et al. show how <I>expert system</I>-type techniques can help in scheduling botox treatment for voice disorders. H. Tsuji et al. propose a new method, based on <I>partial differential equations</I>, for automatically identifying and extracting objects from a video. N. Ward uses <I>Ordered Weighted Average</I> (OWA) techniques to design a model that predicts admission of computer science students into different graduate schools. An important aspect of intelligence is ability to <I>learn</I>. In A. Mahaweerawat et al., neural-based machine learning is <I>used</I> to identify and predict software faults. J. Han et al. show that we can drastically <I>improve</I> the quality of machine learning if, in addition to discovering traditional (positive) rules, we also search for negative rules. A serious problem with many neural-based machine learning algorithms is that often, the results of their learning are un-intelligible rules and numbers. M. I. Khan et al. show, on the example of robotic arm applications, that if we allow neurons with different input-output dependencies – including linear neurons – then we can <I>extract</I> meaningful <I>knowledge</I> from the resulting network. Several papers analyze the Equivalent Transformation (ET) model, that allows the user to <I>automatically generate code from specifications</I>. A general description of this model is given by K. Akama et al. P. Chippimolchai et al. describe how, within this model, we can transform a user's query into an equivalent more efficient one. H. Koike et al. apply this approach to <I>natural language processing</I>. Y. Shigeta et al. show how the existing <I>constraint</I> techniques can be translated into equivalent transformation rules and thus, combined with other specifications. I. Takarajima et al. extend the ET approach to situations like <I>parallel computations</I>, where the order in which different computations are performed on different processors depends on other processes and is, thus, non-deterministic. Finally, a paper by J. Chandra – based on his invited talk at InTech'04 – describes a <I>general framework</I> for robust and resilient critical infrastructure systems, with potential applications to transportation systems, power grids, communication networks, water resources, health delivery systems, and financial networks. We want to thank all the authors for their outstanding work, the participants of InTech'04 for their helpful suggestions, the anonymous reviewers for their thorough analysis and constructive help, and – last but not the least – to Professor Kaoru Hirota for his kind suggestion to host this issue and to the entire staff of the journal for their tireless work.
APA, Harvard, Vancouver, ISO, and other styles
7

Jetlund, Onstein, and Huang. "Adapted Rules for UML Modelling of Geospatial Information for Model-Driven Implementation as OWL Ontologies." ISPRS International Journal of Geo-Information 8, no. 9 (August 22, 2019): 365. http://dx.doi.org/10.3390/ijgi8090365.

Full text
Abstract:
This study aims to improve the implementation of models of geospatial information in Web Ontology Language (OWL). Large amounts of geospatial information are maintained in Geographic Information Systems (GIS) based on models according to the Unified Modeling Language (UML) and standards from ISO/TC 211 and the Open Geospatial Consortium (OGC). Sharing models and geospatial information in the Semantic Web will increase the usability and value of models and information, as well as enable linking with spatial and non-spatial information from other domains. Methods for conversion from UML to OWL for basic concepts used in models of geospatial information have been studied and evaluated. Primary conversion challenges have been identified with specific attention to whether adapted rules for UML modelling could contribute to improved conversions. Results indicated that restrictions related to abstract classes, unions, compositions and code lists in UML are challenging in the Open World Assumption (OWA) on which OWL is based. Two conversion challenges are addressed by adding more semantics to UML models: global properties and reuse of external concepts. The proposed solution is formalized in a UML profile supported by rules and recommendations and demonstrated with a UML model based on the Intelligent Transport Systems (ITS) standard ISO 14825 Geographic Data Files (GDF). The scope of the resulting ontology will determine to what degree the restrictions shall be maintained in OWL, and different conversion methods are needed for different scopes.
APA, Harvard, Vancouver, ISO, and other styles
8

Yager, Ronald R. "Prioritized OWA aggregation." Fuzzy Optimization and Decision Making 8, no. 3 (June 11, 2009): 245–62. http://dx.doi.org/10.1007/s10700-009-9063-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Emrouznejad, Ali. "MP-OWA: The most preferred OWA operator." Knowledge-Based Systems 21, no. 8 (December 2008): 847–51. http://dx.doi.org/10.1016/j.knosys.2008.03.057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Amarante, Massimiliano. "Mm-OWA: A Generalization of OWA Operators." IEEE Transactions on Fuzzy Systems 26, no. 4 (August 2018): 2099–106. http://dx.doi.org/10.1109/tfuzz.2017.2762637.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "INTELLIGENT OWA"

1

Kell, Yvette. "AN EXPLORATION OF EMOTIONALLY INTELLIGENT LEADERSHIP IN COLLEGIATE RECREATION STUDENT EMPLOYEES AND THEIR OWN PERCEPTIONS OF THEIR EMOTIONAL INTELLIGENCE AND EMOTIONALLY INTELLIGENT LEADERSHIP." UKnowledge, 2018. https://uknowledge.uky.edu/edsc_etds/40.

Full text
Abstract:
Universities are an ideal environment to assist students in the development of their leadership skills in a safe and supportive environment. The development of emotional intelligence (EI) has become an important aspect of student leadership development. The purpose of the study was to examine the emotionally intelligent leadership (EIL) scores of students working in a collegiate recreation setting and to examine their perceptions of their own EI and EIL. An exploratory, sequential, mixed-methods approach was used to explore the EIL scores of students employed in collegiate recreation departments at seven university sites. EIL was the theoretical framework used in this study (Shankman et al., 2015). The findings of this study showed no statistically significant difference in mean scores of EIL between students working in formal and informal leadership positions or between genders. Themes that emerged from the participant’s perceptions of their own EI and EIL were communication, confidence, perceived leadership ability, and teamwork. Understanding how students perceive their own EI and EIL can assist practitioners in the creation and development of intentional training and development programs.
APA, Harvard, Vancouver, ISO, and other styles
2

Mowchenko, Murray Allan. "Intelligent independent features, manufacturing features which ensure their own manufacturability." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq20878.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Huster, Todd. "OWL query answering using machine learning." Wright State University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=wright1446117806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Neilson, David D. "Society at war : eyewitness accounts of sixteenth century Japan /." view abstract or download file of text, 2007. http://proquest.umi.com/pqdweb?did=1421612371&sid=1&Fmt=2&clientId=11238&RQT=309&VName=PQD.

Full text
Abstract:
Thesis (Ph. D.)--University of Oregon, 2007.
Typescript. Includes vita and abstract. Includes bibliographical references (leaves 368-373). Also available for download via the World Wide Web; free to University of Oregon users.
APA, Harvard, Vancouver, ISO, and other styles
5

Stefanoni, Giorgio. "Evaluating conjunctive and graph queries over the EL profile of OWL 2." Thesis, University of Oxford, 2015. https://ora.ox.ac.uk/objects/uuid:232978e9-90a2-41cc-afd5-319518296894.

Full text
Abstract:
OWL 2 EL is a popular ontology language that is based on the EL family of description logics and supports regular role inclusions,axioms that can capture compositional properties of roles such as role transitivity and reflexivity. In this thesis, we present several novel complexity results and algorithms for answering expressive queries over OWL 2 EL knowledge bases (KBs) with regular role inclusions. We first focus on the complexity of conjunctive query (CQ) answering in OWL 2 EL and show that the problem is PSpace-complete in combined complexity, the complexity measured in the total size of the input. All the previously known approaches encode the regular role inclusions using finite automata that can be worst-case exponential in size, and thus are not optimal. In our PSpace procedure, we address this problem by using a novel, succinct encoding of regular role inclusions based on pushdown automata with a bounded stack. Moreover, we strengthen the known PSpace lower complexity bound and show that the problem is PSpace-hard even if we consider only the regular role inclusions as part of the input and the query is acyclic; thus, our algorithm is optimal in knowledge base complexity, the complexity measured in the size of the KB, as well as for acyclic queries. We then study graph queries for OWL 2 EL and show that answering positive, converse- free conjunctive graph queries is PSpace-complete. Thus, from a theoretical perspective, we can add navigational features to CQs over OWL 2 EL without an increase in complexity. Finally, we present a practicable algorithm for answering CQs over OWL 2 EL KBs with only transitive and reflexive composite roles. None of the previously known approaches target transitive and reflexive roles specifically, and so they all run in PSpace and do not provide a tight upper complexity bound. In contrast, our algorithm is optimal: it runs in NP in combined complexity and in PTime in KB complexity. We also show that answering CQs is NP-hard in combined complexity if the query is acyclic and the KB contains one transitive role, one reflexive role, or nominals—concepts containing precisely one individual.
APA, Harvard, Vancouver, ISO, and other styles
6

Darko, Petrušić. "Semantičko modelovanje i ontološka integracija elektronskih servisa Otvorene vlade." Phd thesis, Univerzitet u Novom Sadu, Fakultet tehničkih nauka u Novom Sadu, 2016. https://www.cris.uns.ac.rs/record.jsf?recordId=101134&source=NDLTD&language=en.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bate, Andrew. "Consequence-based reasoning for SRIQ ontologies." Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:6b35e7d0-199c-4db9-ac8a-7f78256e5fb8.

Full text
Abstract:
Description logics (DLs) are knowledge representation formalisms with numerous applications and well-understood model-theoretic semantics and computational properties. SRIQ is a DL that provides the logical underpinning for the semantic web language OWL 2, which is the W3C standard for knowledge representation on the web. A central component of most DL applications is an efficient and scalable reasoner, which provides services such as consistency testing and classification. Despite major advances in DL reasoning algorithms over the last decade, however, ontologies are still encountered in practice that cannot be handled by existing DL reasoners. Consequence-based calculi are a family of reasoning techniques for DLs. Such calculi have proved very effective in practice and enjoy a number of desirable theoretical properties. Up to now, however, they were proposed for either Horn DLs (which do not support disjunctive reasoning), or for DLs without cardinality constraints. In this thesis we present a novel consequence-based algorithm for TBox reasoning in SRIQ - a DL that supports both disjunctions and cardinality constraints. Combining the two features is non-trivial since the intermediate consequences that need to be derived during reasoning cannot be captured using DLs themselves. Furthermore, cardinality constraints require reasoning over equality, which we handle using the framework of ordered paramodulation - a state-of-the-art method for equational theorem proving. We thus obtain a calculus that can handle an expressive DL, while still enjoying all the favourable properties of existing consequence-based algorithms, namely optimal worst-case complexity, one-pass classification, and pay-as-you-go behaviour. To evaluate the practicability of our calculus, we implemented it in Sequoia - a new DL reasoning system. Empirical results show substantial robustness improvements over well-established algorithms and implementations, and performance competitive with closely related work.
APA, Harvard, Vancouver, ISO, and other styles
8

Rees, Carys. "The impact of emotional literacy support assistant training on teaching assistants' own trait-emotional intelligence and self-efficacy and their perceptions in relation to their future role." Thesis, Cardiff University, 2016. http://orca.cf.ac.uk/95293/.

Full text
Abstract:
The role of TAs has changed considerably from that of supporting teachers and children with additional learning needs to that of providing emotional support and personal and social development (Groom, 2006). Consequently, the Emotional Literacy Support Assistant (ELSA) programme was developed (Burton, 2009) as a training programme to develop the skills of teaching assistants (TAs) in schools to provide emotional support for children in their schools. However, their effectiveness in delivering this programme is likely to be governed by levels of self-efficacy, that is, the belief they have about their capabilities (Gibbs, 2002; Tschannen-Moran, Woolfolk-Hoy & Hoy, 1998). Self-efficacy beliefs are predicted by the components of trait-emotional intelligence (Chan, 2004) and there is a need for research exploring the relationship between school staff emotions and efficacy beliefs (Emmer & Hickman, 1991). This research utilises a multi-methods approach exploring the self-efficacy and trait-emotional intelligence of TAs before and after having completed the ELSA training and the perceptions TAs have regarding their future role. Statistical analysis of the quantitative data collected from the questionnaires revealed that the self-efficacy and trait-emotional intelligence scores of the participants increased after having completed the ELSA training. Thematic analysis of the qualitative data collected from the focus group revealed that TAs identified issues that influenced their perceptions of their future roles as ELSA both negatively and positively. The four main themes were identified, with sub themes and subordinate themes. The overarching main theme identified was ‘systemic issues’ as the main concern with the sub themes ‘lack of support from school’ and ‘lack of self-efficacy for the role’. The second occurring main theme was ‘improved knowledge and understanding’ with the sub themes ‘value of the ELSA role & training’ and ‘a better understanding of the ELSA values’. The third occurring main theme was ‘benefits of ELSA for children and TAs’, with the sub themes ‘developing personal skills’ and ‘benefits for children’. The final occurring main theme was and ‘low self-efficacy and confidence’ with the sub themes ‘self-efficacy for the ELSA role’ and ‘fears and loneliness of ELSA role’.
APA, Harvard, Vancouver, ISO, and other styles
9

Kogeyama, Renato. "Who is the cowboy in Washington?: beating google at their own game with neuroscience and cryptography." reponame:Repositório Institucional do FGV, 2014. http://hdl.handle.net/10438/13524.

Full text
Abstract:
Submitted by RENATO Kogeyama (rkogeyama@gmail.com) on 2015-03-06T14:50:01Z No. of bitstreams: 1 Dissertação final.pdf: 1794273 bytes, checksum: b90c57e65dc2272d6edcdbabe5703b90 (MD5)
Approved for entry into archive by Janete de Oliveira Feitosa (janete.feitosa@fgv.br) on 2015-03-10T12:44:03Z (GMT) No. of bitstreams: 1 Dissertação final.pdf: 1794273 bytes, checksum: b90c57e65dc2272d6edcdbabe5703b90 (MD5)
Approved for entry into archive by Marcia Bacha (marcia.bacha@fgv.br) on 2015-03-12T19:58:58Z (GMT) No. of bitstreams: 1 Dissertação final.pdf: 1794273 bytes, checksum: b90c57e65dc2272d6edcdbabe5703b90 (MD5)
Made available in DSpace on 2015-03-12T19:59:13Z (GMT). No. of bitstreams: 1 Dissertação final.pdf: 1794273 bytes, checksum: b90c57e65dc2272d6edcdbabe5703b90 (MD5) Previous issue date: 2014-12-17
Who was the cowboy in Washington? What is the land of sushi? Most people would have answers to these questions readily available,yet, modern search engines, arguably the epitome of technology in finding answers to most questions, are completely unable to do so. It seems that people capture few information items to rapidly converge to a seemingly 'obvious' solution. We will study approaches for this problem, with two additional hard demands that constrain the space of possible theories: the sought model must be both psychologically and neuroscienti cally plausible. Building on top of the mathematical model of memory called Sparse Distributed Memory, we will see how some well-known methods in cryptography can point toward a promising, comprehensive, solution that preserves four crucial properties of human psychology.
APA, Harvard, Vancouver, ISO, and other styles
10

Gunaratna, Kalpa. "Semantics-based Summarization of Entities in Knowledge Graphs." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1496124815009777.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "INTELLIGENT OWA"

1

Brain, C. K. Do we owe our intelligence to a predatory past? New York: American Museum of Natural History, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Oka daḷārī paścāttāpaṃ. Haidarābād: Vīkṣaṇaṃ Pablikēṣans, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Oka daḷārī paśsāttāpaṃ. Haidarābād: Vīkṣaṇaṃ Pablikēṣans, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Oka daḷārī paścāttāpaṃ. Haidarābād: Vīkṣaṇaṃ Pablikēṣans, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pro gospodina Kageaki-Oba: "Dnevnik" ofit︠s︡erov Razvedyvatelʹnogo Otdelenii︠a︡ o prebyvanii v g. Tashkente sotrudnika gazety "Osaka-Maĭnit︠s︡i" i︠a︡pont︠s︡a Kageaki-Oba 15-16 senti︠a︡bri︠a︡ 1910 g. Sankt-Peterburg: Krasnyĭ Matros, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Baffa, Ayrton. Nos porões do SNI: O retrato do monstro de cabeça oca. Rio de Janeiro-RJ: Editora Objetiva, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Baffa, Ayrton. Nos porões do SNI: O retrato do monstro de cabeça oca. Rio de Janeiro-RJ: Editora Objetiva, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Huwŏnhoe, Robŏtʻŭ Kim, ed. Chip ŭro tora oda: Hanʾgugin Robŏtŭ Kim ŭi insaeng iyagi. Kyŏnggi-do Pʻaju-si: Hanʾgilsa, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sloot, Bart, and Aviva Groot, eds. The Handbook of Privacy Studies. NL Amsterdam: Amsterdam University Press, 2018. http://dx.doi.org/10.5117/9789462988095.

Full text
Abstract:
The Handbook of Privacy Studies is the first book in the world that brings together several disciplinary perspectives on privacy, such as the legal, ethical, medical, informatics and anthropological perspective. Privacy is in the news almost every day: mass surveillance by intelligence agencies, the use of social media data for commercial profit and political microtargeting, password hacks and identity theft, new data protection regimes, questionable reuse of medical data, and concerns about how algorithms shape the way we think and decide. This book offers interdisciplinary background information about these developments and explains how to understand and properly evaluate them. The book is set up for use in interdisciplinary educational programmes. Each chapter provides a structured analysis of the role of privacy within that discipline, its characteristics, themes and debates, as well as current challenges. Disciplinary approaches are presented in such a way that students and researchers from every scientific background can follow the argumentation and enrich their own understanding of privacy issues.
APA, Harvard, Vancouver, ISO, and other styles
10

Deved¿ic, Vladan. Model Driven Engineering and Ontology Development. Berlin, Heidelberg: Springer-Verlag Berlin Heidelberg, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "INTELLIGENT OWA"

1

Laengle, Sigifredo, Gino Loyola, and José M. Merigó. "OWA Operators in Portfolio Selection." In Advances in Intelligent Systems and Computing, 53–64. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19704-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Klement, Erich Peter, and Radko Mesiar. "Integral-Based Modifications of OWA-Operators." In Advances in Intelligent and Soft Computing, 325–31. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22833-9_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Palomares, Iván, Jun Liu, Yang Xu, and Luis Martínez. "Using OWA Operators to Integrate Group Attitudes towards Consensus." In Advances in Intelligent and Soft Computing, 273–82. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25661-5_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wazir, Samar, M. M. Sufyan Beg, and Tanvir Ahmad. "Weighted Frequent Itemset Mining Using OWA on Uncertain Transactional Database." In Advances in Intelligent Systems and Computing, 183–93. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0132-6_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jurio, Aranzazu, Mikel Sesma-Sara, Jose Antonio Sanz Delgado, and Humberto Bustince. "The Influence of Induced OWA Operators in a Clustering Method." In Advances in Intelligent Systems and Computing, 22–32. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-21920-8_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Yong, Lili Jiang, Jian Liu, Ronghua Zhu, and Liang Zhao. "The Research of Competitiveness Evaluation Indicators on Chinese OTA Websites Based on OWA and Intuition Fuzzy Theory." In Advances in Intelligent Systems and Computing, 477–86. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-1837-4_41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bustince, H., J. Fernandez, L. De Miguel, E. Barrenechea, M. Pagola, and R. Mesiar. "OWA Operators and Choquet Integrals in the Interval-Valued Setting." In Granular, Soft and Fuzzy Approaches for Intelligent Systems, 65–79. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40314-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bordogna, Gloria, Mario Fedrizzi, and Gabriella Pasi. "Modeling Preference Relations and Consensus in a Linguistic Environment: An Approach Based on OWA Operators." In International Series in Intelligent Technologies, 147–61. Boston, MA: Springer US, 1997. http://dx.doi.org/10.1007/978-1-4615-6333-4_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kacprzyk, Janusz, and Mario Fedrizzi. "Consensus Degrees Under Fuzziness via Ordered Weighted Average (OWA) Operators." In Fuzzy Logic and its Applications to Engineering, Information Sciences, and Intelligent Systems, 447–53. Dordrecht: Springer Netherlands, 1995. http://dx.doi.org/10.1007/978-94-009-0125-4_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Abdellaoui, Zaineb, Mouna Derbel, and Ahmed Ghorbel. "Assessing the Performance of Hospital Waste Management in Tunisia Using a Fuzzy-Based Approach OWA and TOPSIS During COVID-19 Pandemic." In Hybrid Intelligent Systems, 786–803. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-27409-1_72.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "INTELLIGENT OWA"

1

Ulutagay, Gozde, and Efendi Nasibov. "OWA aggregation based CxK-nearest neighbor classification algorithm." In 2012 6th IEEE International Conference Intelligent Systems (IS). IEEE, 2012. http://dx.doi.org/10.1109/is.2012.6335139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Qiansheng Zhang, Shengyi Jiang, Shihua Luo, and Haixiang Yao. "An interval-valued fuzzy reasoning algorithm based on OWA operator." In 2009 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS 2009). IEEE, 2009. http://dx.doi.org/10.1109/icicisys.2009.5357955.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Xiaofeng, and Hailin Zou. "Research of RST Model Based on CWA and OWA." In 2009 International Workshop on Intelligent Systems and Applications. IEEE, 2009. http://dx.doi.org/10.1109/iwisa.2009.5073049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hashemi, Amin, and Mohammad Bagher Dowlatshahi. "An Ensemble Of Feature Selection Algorithms Using OWA Operator." In 2022 9th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS). IEEE, 2022. http://dx.doi.org/10.1109/cfis54774.2022.9756456.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Nedovic, Ljubo, Marija Delic, and Neboja M. Ralevic. "OWA Aggregated Distance Functions and Their Application in Image Segmentation." In 2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY). IEEE, 2018. http://dx.doi.org/10.1109/sisy.2018.8524771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zhang, Qiansheng, Haixiang Yao, Yirong Huang, and Shengyi Jiang. "A Multidimensional Interval-Valued Fuzzy Reasoning Method Based on OWA Operator." In 2010 International Conference on Intelligent Computation Technology and Automation (ICICTA). IEEE, 2010. http://dx.doi.org/10.1109/icicta.2010.741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

MERJGÓ, JOSÉ M., and MONTSERRAT CASANOVAS. "DEALING WITH UNCERTAIN INFORMATION IN THE INDUCED PROBABILISTIC OWA OPERATOR." In Proceedings of the 4th International ISKE Conference on Intelligent Systems and Knowledge Engineering. WORLD SCIENTIFIC, 2009. http://dx.doi.org/10.1142/9789814295062_0094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Palomares, Ivan, Fiona Browne, Hui Wang, and Peadar Davis. "A Collaborative Filtering Recommender System Model Using OWA and Uninorm Aggregation Operators." In 2015 10th International Conference on Intelligent Systems and Knowledge Engineering (ISKE). IEEE, 2015. http://dx.doi.org/10.1109/iske.2015.36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

MERIGÓ, JOSÉ M. "ON THE UNIFICATION BETWEEN THE PROBABILITY, THE WEIGHTED AVERAGE AND THE OWA OPERATOR." In Proceedings of the 4th International ISKE Conference on Intelligent Systems and Knowledge Engineering. WORLD SCIENTIFIC, 2009. http://dx.doi.org/10.1142/9789814295062_0059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Su, Jing, Yuan Liu, Yaqing Si, Liyong Duan, and Yujing Gong. "Research on enterprise credit evaluation model of data transaction based on OWA operator and Fuzzy comprehensive evaluation." In CCRIS 2020: 2020 International Conference on Control, Robotics and Intelligent System. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3437802.3437823.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "INTELLIGENT OWA"

1

Hunt, Will, and Owen Daniels. Sustaining and Growing the U.S. Semiconductor Advantage: A Primer. Center for Security and Emerging Technology, June 2022. http://dx.doi.org/10.51593/20220006.

Full text
Abstract:
As an integral player in advanced semiconductor supply chains, the United States enjoys advantages over China in producing and accessing chips for artificial intelligence and other leading-edge computing technologies. However, a lack of domestic production capacity threatens U.S. semiconductor access. The United States can strengthen its advantages by working with allies and partners to prevent China from producing leading-edge chips and by reshoring its own domestic chipmaking capacity.
APA, Harvard, Vancouver, ISO, and other styles
2

Stanley-Lockman, Zoe. Responsible and Ethical Military AI. Center for Security and Emerging Technology, August 2021. http://dx.doi.org/10.51593/20200091.

Full text
Abstract:
Allies of the United States have begun to develop their own policy approaches to responsible military use of artificial intelligence. This issue brief looks at key allies with articulated, emerging, and nascent views on how to manage ethical risk in adopting military AI. The report compares their convergences and divergences, offering pathways for the United States, its allies, and multilateral institutions to develop common approaches to responsible AI implementation. Download Full Report
APA, Harvard, Vancouver, ISO, and other styles
3

Papenkordt, Jörg, Stefan Gabriel, Kirsten Thommes, and Roman Dumitrescu. Künstliche Intelligenz in der industriellen Arbeitswelt - Studie zum Status Quo in der Region OstWestfalenLippe. Kompetenzzentrum Arbeitswelt.Plus, August 2022. http://dx.doi.org/10.55594/tmao3234.

Full text
Abstract:
Im Rahmen dieser Studie wird der Status Quo des KI-Einsatzes in der industriellen Arbeitswelt in der Region OstWestfalenLippe erfasst und beschrieben. Dadurch wird eine Grundlage geschaffen, um eine zielführende Unterstützung der Gestaltung von durch Künstliche Intelligenz (KI) gestützter Arbeitsprozesse in Unternehmen zu ermöglichen, indem beispielsweise bedarfsbezogene Maßnahmen entwickelt und durchgeführt sowie weiterer Forschungsbedarf aufgezeigt wird. Die Befragung wurde im Jahr 2021 von dem Kompetenzzentrum Arbeitswelt.Plus sowie dem Spitzencluster it’s OWL initiiert. Dabei sind drei Zielgruppen – Unternehmensleitung, Personalabteilung (HR) sowie Arbeitnehmer*innen – adressiert worden. Insgesamt nahmen 317 Personen aus 89 verschiedenen Unternehmen bzw. Organisationen an der Befragung teil – zu 38 % Unternehmer*innen, zu 13 % Personaler*innen und zu 49 % Arbeitnehmer*innen. Die meisten der Teilnehmenden stammten aus der Elektroindustrie, dem Maschinenbau sowie dem Informations- und Kommunikationstechnologie (IKT)-Sektor. Die Befragungsergebnisse zeigen, dass sich die meisten Unternehmen in der Anfangsphase der KI-Nutzung befinden. Zwischen einzelnen Unternehmensbereichen und verschiedenen Branchen zeigen sich gewisse Unterschiede in der Nutzungsphase. Die Befragten stehen aktuell vor der Nutzung von vor allem teilautonomen KI-Systemen, die ausführende und analytische menschliche Tätigkeitenbeispielsweise durch Informationsbereitstellungen unterstützen. Wesentliche Ziele der KI-Nutzung sind die Effizienzsteigerung, Qualitätsverbesserung, Entscheidungsoptimierung sowie Unterstützung der Arbeitnehmer*innen. Allerdings werden in allen Unternehmen die fehlende Expertise sowie insgesamt die Komplexität des Themenfelds als Hinderungsgründe identifiziert. In allen Unternehmen und allen Unternehmensbereichen werden hohe Auswirkungen durch KI erwartet. Auf die Arbeitsgestaltung werden insgesamt eher positive Auswirkungen erwartet. Die Befragten schätzen die Bedeutung von KI, ihre Aufgeschlossenheit sowie ihr Vertrauen gegenüber KI als insgesamt hoch ein, ihr Verständnis von KI dagegen eher als gering. Tendenziell zeigt sich eine große Diskrepanz zwischen Selbst- und Fremdbild mit einer teils deutlich negativeren Wahrnehmung anderer. Die Befragten erwarten außerdem steigende Kompetenzanforderungen sowie einen hohen Weiterbildungsbedarf, insbesondere bezüglich des grundlegenden Verständnisses über KI. In den wenigsten Unternehmen existiert jedoch ein gezieltes Weiterbildungsangebot. Die Erkenntnisse aus der Befragung fließen im Rahmen des Kompetenzzentrums Arbeitswelt.Plus in die gezielte Gestaltung und Einführung KI-gestützter Arbeitsformen sowie bedarfsgerechter Unterstützungsangebote ein. Die hohe Komplexität der KI-Einführung sowie die sowohl technischen als auch mitarbeiterbezogenen Herausforderungen verdeutlichen den Bedarf für eine soziotechnische Perspektive und ein systematisches Vorgehen bei der Gestaltung dieses vielschichtigen Themenfelds.
APA, Harvard, Vancouver, ISO, and other styles
4

Ruff, Grigory, and Tatyana Sidorina. THE DEVELOPMENT MODEL OF ENGINEERING CREATIVITY IN STUDENTS OF MILITARY INSTITUTIONS. Science and Innovation Center Publishing House, December 2020. http://dx.doi.org/10.12731/model_of_engineering_creativity.

Full text
Abstract:
The troops of the national guard of the Russian Federation are equipped with modern models of weapons, special equipment, Informatization tools, engineering weapons that have artificial intelligence in their composition are being developed, " etc., which causes an increase in the requirements for the quality of professional training of future officers. The increasing complexity of military professional activities, the avalanche-like increase in information, the need to develop the ability to quickly and accurately make and implement well-known and own engineering solutions in an unpredictable military environment demonstrates that the most important tasks of modern higher education are not only providing graduates with a system of fundamental and special knowledge and skills, but also developing their professional independence, and this led to the concept of engineering and creative potential in the list of professionally important qualities of an officer. To expedite a special mechanism system compact intense clarity through cognitive visualization of the educational material, thickening of educational knowledge through encoding, consolidation and structuring Principle of cognitive visualization stems from the psychological laws in accordance with which the efficiency of absorption is increased if visibility in training does not only illustrative, but also cognitive function, which leads to active inclusion, along with the left and right hemispheres of the student in the process of assimilation of information, based on the use of logical and semantic modeling, which contributes to the development of engineering and creative potential.
APA, Harvard, Vancouver, ISO, and other styles
5

Yatsymirska, Mariya. SOCIAL EXPRESSION IN MULTIMEDIA TEXTS. Ivan Franko National University of Lviv, February 2021. http://dx.doi.org/10.30970/vjo.2021.49.11072.

Full text
Abstract:
The article investigates functional techniques of extralinguistic expression in multimedia texts; the effectiveness of figurative expressions as a reaction to modern events in Ukraine and their influence on the formation of public opinion is shown. Publications of journalists, broadcasts of media resonators, experts, public figures, politicians, readers are analyzed. The language of the media plays a key role in shaping the worldview of the young political elite in the first place. The essence of each statement is a focused thought that reacts to events in the world or in one’s own country. The most popular platform for mass information and social interaction is, first of all, network journalism, which is characterized by mobility and unlimited time and space. Authors have complete freedom to express their views in direct language, including their own word formation. Phonetic, lexical, phraseological and stylistic means of speech create expression of the text. A figurative word, a good aphorism or proverb, a paraphrased expression, etc. enhance the effectiveness of a multimedia text. This is especially important for headlines that simultaneously inform and influence the views of millions of readers. Given the wide range of issues raised by the Internet as a medium, research in this area is interdisciplinary. The science of information, combining language and social communication, is at the forefront of global interactions. The Internet is an effective source of knowledge and a forum for free thought. Nonlinear texts (hypertexts) – «branching texts or texts that perform actions on request», multimedia texts change the principles of information collection, storage and dissemination, involving billions of readers in the discussion of global issues. Mastering the word is not an easy task if the author of the publication is not well-read, is not deep in the topic, does not know the psychology of the audience for which he writes. Therefore, the study of media broadcasting is an important component of the professional training of future journalists. The functions of the language of the media require the authors to make the right statements and convincing arguments in the text. Journalism education is not only knowledge of imperative and dispositive norms, but also apodictic ones. In practice, this means that there are rules in media creativity that are based on logical necessity. Apodicticity is the first sign of impressive language on the platform of print or electronic media. Social expression is a combination of creative abilities and linguistic competencies that a journalist realizes in his activity. Creative self-expression is realized in a set of many important factors in the media: the choice of topic, convincing arguments, logical presentation of ideas and deep philological education. Linguistic art, in contrast to painting, music, sculpture, accumulates all visual, auditory, tactile and empathic sensations in a universal sign – the word. The choice of the word for the reproduction of sensory and semantic meanings, its competent use in the appropriate context distinguishes the journalist-intellectual from other participants in forums, round tables, analytical or entertainment programs. Expressive speech in the media is a product of the intellect (ability to think) of all those who write on socio-political or economic topics. In the same plane with him – intelligence (awareness, prudence), the first sign of which (according to Ivan Ogienko) is a good knowledge of the language. Intellectual language is an important means of organizing a journalistic text. It, on the one hand, logically conveys the author’s thoughts, and on the other – encourages the reader to reflect and comprehend what is read. The richness of language is accumulated through continuous self-education and interesting communication. Studies of social expression as an important factor influencing the formation of public consciousness should open up new facets of rational and emotional media broadcasting; to trace physical and psychological reactions to communicative mimicry in the media. Speech mimicry as one of the methods of disguise is increasingly becoming a dangerous factor in manipulating the media. Mimicry is an unprincipled adaptation to the surrounding social conditions; one of the most famous examples of an animal characterized by mimicry (change of protective color and shape) is a chameleon. In a figurative sense, chameleons are called adaptive journalists. Observations show that mimicry in politics is to some extent a kind of game that, like every game, is always conditional and artificial.
APA, Harvard, Vancouver, ISO, and other styles
6

Lewis, Dustin. Three Pathways to Secure Greater Respect for International Law concerning War Algorithms. Harvard Law School Program on International Law and Armed Conflict, 2020. http://dx.doi.org/10.54813/wwxn5790.

Full text
Abstract:
Existing and emerging applications of artificial intelligence in armed conflicts and other systems reliant upon war algorithms and data span diverse areas. Natural persons may increasingly depend upon these technologies in decisions and activities related to killing combatants, destroying enemy installations, detaining adversaries, protecting civilians, undertaking missions at sea, conferring legal advice, and configuring logistics. In intergovernmental debates on autonomous weapons, a normative impasse appears to have emerged. Some countries assert that existing law suffices, while several others call for new rules. Meanwhile, the vast majority of efforts by States to address relevant systems focus by and large on weapons, means, and methods of warfare. Partly as a result, the broad spectrum of other far-reaching applications is rarely brought into view. One normatively grounded way to help identify and address relevant issues is to elaborate pathways that States, international organizations, non-state parties to armed conflict, and others may pursue to help secure greater respect for international law. In this commentary, I elaborate on three such pathways: forming and publicly expressing positions on key legal issues, taking measures relative to their own conduct, and taking steps relative to the behavior of others. None of these pathways is sufficient in itself, and there are no doubt many others that ought to be pursued. But each of the identified tracks is arguably necessary to ensure that international law is — or becomes — fit for purpose. By forming and publicly expressing positions on relevant legal issues, international actors may help clarify existing legal parameters, pinpoint salient enduring and emerging issues, and detect areas of convergence and divergence. Elaborating legal views may also help foster greater trust among current and potential adversaries. To be sure, in recent years, States have already fashioned hundreds of statements on autonomous weapons. Yet positions on other application areas are much more difficult to find. Further, forming and publicly expressing views on legal issues that span thematic and functional areas arguably may help States and others overcome the current normative stalemate on autonomous weapons. Doing so may also help identify — and allocate due attention and resources to — additional salient thematic and functional areas. Therefore, I raise a handful of cross-domain issues for consideration. These issues touch on things like exercising human agency, reposing legally mandated evaluative decisions in natural persons, and committing to engage only in scrutable conduct. International actors may also take measures relative to their own conduct. To help illustrate this pathway, I outline several such existing measures. In doing so, I invite readers to inventory and peruse these types of steps in order to assess whether the nature or character of increasingly complex socio-technical systems reliant upon war algorithms and data may warrant revitalized commitments or adjustments to existing measures — or, perhaps, development of new ones. I outline things like enacting legislation necessary to prosecute alleged perpetrators of grave breaches, making legal advisers available to the armed forces, and taking steps to prevent abuses of the emblem. Finally, international actors may take measures relative to the conduct of others. To help illustrate this pathway, I outline some of the existing steps that other States, international organizations, and non-state parties may take to help secure respect for the law by those undertaking the conduct. These measures may include things like addressing matters of legal compliance by exerting diplomatic pressure, resorting to penal sanctions to repress violations, conditioning or refusing arms transfers, and monitoring the fate of transferred detainees. Concerning military partnerships in particular, I highlight steps such as conditioning joint operations on a partner’s compliance with the law, planning operations jointly in order to prevent violations, and opting out of specific operations if there is an expectation that the operations would violate applicable law. Some themes and commitments cut across these three pathways. Arguably, respect for the law turns in no small part on whether natural persons can and will foresee, understand, administer, and trace the components, behaviors, and effects of relevant systems. It may be advisable, moreover, to institute ongoing cross-disciplinary education and training as well as the provision of sufficient technical facilities for all relevant actors, from commanders to legal advisers to prosecutors to judges. Further, it may be prudent to establish ongoing monitoring of others’ technical capabilities. Finally, it may be warranted for relevant international actors to pledge to engage, and to call upon others to engage, only in armed-conflict-related conduct that is sufficiently attributable, discernable, and scrutable.
APA, Harvard, Vancouver, ISO, and other styles
7

Chornodon, Myroslava. FEAUTURES OF GENDER IN MODERN MASS MEDIA. Ivan Franko National University of Lviv, February 2021. http://dx.doi.org/10.30970/vjo.2021.49.11064.

Full text
Abstract:
The article clarifies of gender identity stereotypes in modern media. The main gender stereotypes covered in modern mass media are analyzed and refuted. The model of gender relations in the media is reflected mainly in the stereotypical images of men and woman. The features of the use of gender concepts in modern periodicals for women and men were determined. The most frequently used derivatives of these macroconcepts were identified and analyzed in detail. It has been found that publications for women and men are full of various gender concepts that are used in different contexts. Ingeneral, theanalysisofthe concept-maximums and concept-minimum gender and their characteristics is carried out in the context of gender stereotypes that have been forme dand function in the society, system atizing the a ctual presentations. The study of the gender concept is relevant because it reveals new trends and features of modern gender images. Taking into account the special features of gender-labeled periodicals in general and the practical absence of comprehensive scientific studies of the gender concept in particular, there is a need to supplement Ukrainian science with this topic. Gender psychology, which is served by methods of various sciences, primarily sociological, pedagogical, linguistic, psychological, socio-psychological. Let us pay attention to linguistic and psycholinguistic methods in gender studies. Linguistic methods complement intelligence research tasks, associated with speech, word and text. Psycholinguistic methods used in gender psychology (semantic differential, semantic integral, semantic analysis of words and texts), aimed at studying speech messages, specific mechanisms of origin and perception, functions of speech activity in society, studying the relationship between speech messages and gender properties participants in the communication, to analyze the linguistic development in connection with the general development of the individual. Nowhere in gender practice there is the whole arsenal of psychological methods that allow you to explore psychological peculiarities of a person like observation, experiments, questionnaires, interviews, testing, modeling, etc. The methods of psychological self-diagnostics include: the gender aspect of the own socio-psychological portrait, a gender biography as a variant of the biographical method, aimed at the reconstruction of individual social experience. In the process of writing a gender autobiography, a person can understand the characteristics of his gender identity, as well as ways and means of their formation. Socio-psychological methods of studying gender include the study of socially constructed women’s and men’s roles, relationships and identities, sexual characteristics, psychological characteristics, etc. The use of gender indicators and gender approaches as a means of socio-psychological and sociological analysis broadens the subject boundaries of these disciplines and makes them the subject of study within these disciplines. And also, in the article a combination of concrete-historical, structural-typological, system-functional methods is implemented. Descriptive and comparative methods, method of typology, modeling are used. Also used is a method of content analysis for the study of gender content of modern gender-stamped journals. It was he who allowed quantitatively to identify and explore the features of the gender concept in the pages of periodicals for women and men. A combination of historical, structural-typological, system-functional methods is also implemented in the article. Descriptive and comparative methods, method of typology, modeling are used. A method of content analysis for the study of gender content of modern gender-labeled journals is also used. It allowed to identify and explore the features of the gender concept quantitatively in the periodicals for women and men. The conceptual perception and interpretation of the gender concept «woman», which is highlighted in the modern gender-labeled press in Ukraine, requires the elaboration of the polyfunctionality of gender interpretations, the comprehension of the metaphorical perception of this image and its role and purpose in society. A gendered approach to researching the gender content of contemporary periodicals for women and men. Conceptual analysis of contemporary gender-stamped publications within the gender conceptual sphere allows to identify and correlate the meta-gender and gender concepts that appear in society.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography