首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
This article first introduced the current technology of the privacy protection model, and analyzed their characteristics and deficiencies. Afterwards, from the point of view of revenue, the shortcomings of the traditional privacy protection model have analyzed through the group intelligent computing method. Based on this, this paper proposes a research and application of virtual user information of security strategy based on group intelligent computing, through the collection of visitor's private information historical access data, intelligent calculation of the strategy group between the visitor and the interviewee. The setting of the threshold of the visited person can protect the privacy information of the user more effectively. In this paper, the implementation flow, algorithm implementation process, and specific architecture design of the proposed virtual user of privacy protection model based on group intelligent computing are introduced respectively. The specific algorithms include PCA, BP neural network, and genetic algorithm. Finally, the proposed privacy has verified through experiments. Protection model can protect user privacy more effectively than traditional privacy protection model. In the future, we will further expand and improve the privacy protection model of virtual users based on group intelligent computing, including considering the dynamic and inconsistency of access to the privacy information, that is, accessing different private information will produce different overlay effects and parallelism. We will also study how to apply this model to actual systems such as shopping websites and social platforms, and use commercial data to evaluate the performance of the model and further improve it.  相似文献   

2.
心理咨询和治疗离不开对自我的关注, 精神分析、行为疗法和认知疗法对自我的关注局限于认知或行为层面, 而新兴的正念疗法填补了对自我身体和感受层面关注的空白。具身认知和具身自我实验, 以及认知神经科学研究也证明了身体、感知觉和认知情绪的密切关系, 及其与自我的息息相关。本文在整合已有心理疗法和实验研究的基础上, 提出一种整体观的自我结构, 即自我是理性(符号机能、认知情绪)、感性(非符号机能、感知觉)、身体(生理机能)的综合体, 缺一不可。  相似文献   

3.
The computational theory of cognition, or computationalism, holds that cognition is a form of computation. Two issues related to this view are comprised by the goal of this paper: A) Computing systems are traditionally seen as representational systems, but functional and enactive approaches support non-representational theories; B) Recently, a sociocultural theory against computationalism was proposed with the aim of ontologically reducing computing to cognition. We defend, however, that cognition and computation are in action, thus cognition is just a form of computing and that cognition is the explanatory basis for computation. We state that: 1. Representational theories of computing recurring to intentional content run into metaphysical problems. 2. Functional non-representational theories do not incur this metaphysical problem when describing computing in terms of the abstract machine. 3. Functional theories are consistent with enactive in describing computing machines not in a strictly functional way, but especially in terms of their organization. 4. Enactive cognition is consistent with the computationalism in describing Turing machines as functionally and organizationally closed systems. 5. The cognitive explanatory basis for computing improves the computational theory of cognition. When developed in the human linguistic domain, computer science is seen as a product of human socionatural normative practices, however, cognition is just an explanatory, not ontological, basis for computing. The paper concludes by supporting that computation is in action, that cognition is just one form of computing in the world and the explanatory basis for computation.  相似文献   

4.
杨贤  何汉武 《心理科学》2017,40(5):1248-1252
--用户认知具有主观性、模糊性、进化性及多维性等不确定性特点,难以编码与度量。提出以概念外延表达的集合论方法与模糊数学把研究用户认知转换成研究代表它的因素集合;提出用数据驱动的互联网文本挖掘获取因素集,采用TF-IDF与模糊统计求解因素的隶属度,完成用户认知的数学表达,为进一步研究提供数学基础;最后以海信智能冰箱项目进行论证。由于用户认知属于典型的不确定性复杂对象,论文所用方法适用于所有复杂对象的建模与求解。  相似文献   

5.
语言功能异常是孤独症谱系障碍(ASD)的典型症状之一。1957年,斯金纳从行为学角度提出"言语行为",认为人们获得表达和理解语言的能力与学会走路、跳舞等行为的原理相同。2001年,海斯等人在斯金纳的基础上提出关于人类语言和认知的新视角——关系框架理论(Relational Frame Theory,RFT),澄清了语言的推衍性实质,认为言语行为是将一个刺激与其他刺激建立关系框架的过程。研究表明基于RFT的多范例训练可以提升ASD患者的推衍关系反应水平,且推衍关系反应与语言和认知功能的发展高相关。未来RFT的研究可以探索如何通过推衍关系反应训练修复ASD患者的语言和认知功能缺陷。  相似文献   

6.
7.
Considerable theoretical work has been done in the area of moral reasoning. However, little conceptual thinking has been done about the relations between moral cognition and moral action. As a result, empirical research in this area has been unsystematic and difficult to interpret. A theoretical model, the Self Model, is proposed here, starting from the assumption that moral reasons are functionally related to action. First, a concept of cognitive motivation is presented as necessary for any cognitive account of morality. Two cognitive approaches to moral conduct, Piaget's and Haan's, are then discussed in their positive contributions and in their limitations. The Self Model is finally described through a set of empirically testable propositions. Its major theoretical characteristics are: it is cognitive, recognizing as the central function of human cognition the appraisal of truth; it acknowledges a basic duality of motivation, but stresses the normative pull of cognitive motivation; it is developmental; it uses the self as the central explanatory concept, establishing both the sense of personal responsibility and the dynamism of self-consistency.  相似文献   

8.
With the widespread application of data-driven intelligent technologies, data is increasingly used to record and influence the behavior of the world and people. Although the value rationality of dataism behind the dataization of the world has yet to be thoroughly analyzed, the new data analysis society which is characterized by an intelligent social form has quietly arrived. From a phenomenological point of view, the foundation of the operation and governance of a data analysis society is to analyze human behavior by using data and intelligent algorithms, but this kind of intelligent surveillance is speculative cognition, which may misread and improperly interfere with the agency of observed. There is an urgent need to set boundaries for possible technological abuse. At the same time, in view of the fact that data-driven social computing attempts to influence human behavior through the calculation of human behavior, the value of human behavior itself should be questioned as a problem to be solved. Further, in the face of the potential challenges of machine cognition and engineering thinking to human nature in the construction of an intelligent society, it is urgent to construct an ethical reflection arc that can restrict and correct its abuse.  相似文献   

9.
10.
The distinction between ontological ground-truth phenomena and epistemic measurements of those phenomena is discussed and analyzed in the context of complex cognitive systems research. A common style of computational simulation is identified as a Dissect-the-Simulation motif. In this style, a model of cognition is designed and when it generally mimics some cognitive behavior, its own ontic processes (which are fully accessible because it is a simulation) are proposed as potential ontic processes inside actual human cognition. I propose here a second style of modeling, which might be called Measure-the-Simulation. In this style, simulated versions of coarse-grained epistemic measurements are performed on the model with the intent of discovering how those epistemic measurements themselves may transform the actual ontic data, and thus induce a variety of mis-categorizations of phenomena. When our epistemic measurements are better understood, such mis-categorizations can perhaps be avoided. As a proof of concept, Conway’s Game of Life is analyzed and measured with two different types of coarse-grained epistemic measures. Dramatic differences are identified in how a binary coarse-graining, versus a graded coarse-graining, transforms the discovery process for activity patterns on the lattice of this cellular automaton.  相似文献   

11.
12.
在言语-表象认知风格模型中, 视觉表象认知风格一直被视为单一的结构, 且在此基础上发展出的各种测量方法均存在效度上的缺陷, 导致了研究者对该认知风格模型的普遍质疑。随着对视觉认知加工研究的深入, 尤其是对视觉客体表象与视觉空间表象在功能和解剖上的双分离的理解, 为进一步区分表象型认知风格提供了理论和实证依据, 进而促进了客体-空间表象和言语(Object-Spatial Imagery and Verbal, OSIV)认知风格模型的提出, 而在此基础上开发的新测量工具(Object-Spatial Imagery and Verbal Questionnaire, OSIVQ)具有良好的信、效度, 有力地支持了OSIV认知风格模型。OSIV认知风格模型及其测量为研究人类的认知风格以及视觉认知拓展了新视野。尽管如此, 两种不同视觉表象子系统并存于个体的视觉表象系统中, 因此, 它们分离的原因、相互作用及其与视觉注意之间的关系有待进一步研究。  相似文献   

13.
14.
An account was given of the development within the Russian literature of a uniprocess formulation of classical and instrumental conditioning, known as the bidirectional conditioning hypothesis. The hypothesis purports to offer a single set of Pavlovian principles to account for both paradigms, based upon a neural model which assumes that bidirectional (forward and backward) connections are formed in both classical and instrumental conditioning situations. In instrumental conditioning, the bidirectional connections are hypothesized to be simply more complex than those in classical conditioning, and any differences in empirical functions are presumed to lie not in difference in mechanism, but in the strength of the forward and backward connections. Although bidirectional connections are assumed to develop in instrumental conditioning, the experimental investigation of the bidirectional conditioning hypothesis has been essentially restricted to the classical conditioning operations of pairing two CSs (sensory preconditioning training), a US followed by a CS (backward conditioning training) and two USs. However, the paradigm involving the pairing of two USs, because of theoretical and analytical considerations, is the one most commonly employed by Russian investigators. The results of an initial experiment involving the pairing of two USs, and reference to the results of a more extensive investigation, leads us to tentatively question the validity of the bidirectional conditioning account of instrumental conditioning.  相似文献   

15.
算法拒绝意指尽管算法通常能比人类做出更准确的决策, 但人们依然更偏好人类决策的现象。算法拒绝的三维动机理论归纳了算法主体怀疑、道德地位缺失和人类特性湮没这三个主要原因, 分别对应信任、责任和掌控三种心理动机, 并对应改变算法拒绝的三种可行方案: 提高人类对算法的信任度, 强化算法的主体责任, 探索个性化算法设计以突显人对算法决策的控制力。未来研究可进一步以更社会性的视角探究算法拒绝的发生边界和其他可能动机。  相似文献   

16.
Computational algorithms of image processing were developed and evaluated to select, by motion detection, images of resting artificial pigs and to segment the pigs (mixture of black and white pigs) from their background. Motion detection of the pigs was implemented by detecting interframe differences of postural behavioral images. This algorithm combines the advantages of likelihood ratio method and shading model method and shows a stable performance under noisy and dynamic illumination conditions. Segmentation of the pigs from their background was implemented by employing multilevel thresholding and background reference techniques. The algorithm automatically determines the number of thresholds needed and produces satisfactory segmentation when both black and white pigs with different image intensities are present at the same time (the most complicated situation). The reference background image is updated so that temporal changes in illumination and/or spatial changes of the pen condition have little effect on the performance of image segmentation. The algorithm employs statistical models of the pigs and background and Bayes hypothesis testing to obtain and update the exposed portion of the reference background. Linear filters were used in this process for updating the parameters. These algorithms will serve as essential components for a novel, behavior-based, interactive approach to assess and control thermal comfort of group-housed pigs, which is expected to result in enhanced animal health and well-being.  相似文献   

17.
Resource allocation and task scheduling is a complex task in fog computing environment because of the inherent heterogeneity among the fog devices. The proposed work attempts to solve the problem by using the popular multi criteria decision making methods such as AHP and TOPSIS. The goal of this paper is to propose a model for performance oriented task - resource mapping in a fog computing environment. MIPS, RAM & storage, uplink latency, downlink latency, uplink bandwidth, downlink bandwidth, trust, cost per MIPS, cost per memory, cost per storage and cost per bandwidth are the various performance characteristics considered in this work for task – resource mapping. Two different multi-criteria decision making methods are employed in order to assess the performance characteristics of the fog devices. In the first method, Analytic Hierarchy Process (AHP) is used for both priority weight calculation and ranking of fog devices. In the second method, AHP is used for priority weight calculation, based on the weights yielded by AHP, Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) algorithm is executed in order to rank the fog devices. Then the fog devices can be allocated to the tasks based on its rank. Furthermore, a motivational example is also demonstrated to validate the proposed method. Simulation results show that the proposed technique exhibits superior performance over other scheduling algorithms in the fog environment by incorporating performance, security, and cost metrics into scheduling decisions.  相似文献   

18.
Is vision informationally encapsulated from cognition or is it cognitively penetrated? I shall argue that intentions penetrate vision in the experience of visual spatial constancy: the world appears to be spatially stable despite our frequent eye movements. I explicate the nature of this experience and critically examine and extend current neurobiological accounts of spatial constancy, emphasizing the central role of motor signals in computing such constancy. I then provide a stringent condition for failure of informational encapsulation that emphasizes a computational condition for cognitive penetration: cognition must serve as an informational resource for visual computation. This requires proposals regarding semantic information transfer, a crucial issue in any model of informational encapsulation. I then argue that intention provides an informational resource for computation of visual spatial constancy. Hence, intention penetrates vision.  相似文献   

19.
Core knowledge   总被引:4,自引:0,他引:4  
Compex cognitive skills such as reading and calculation and complex cognitive achievements such as formal science and mathematics may depend on a set of building block systems that emerge early in human ontogeny and phylogeny. These core knowledge systems show characteristic limits of domain and task specificity: Each serves to represent a particular class of entities for a particular set of purposes. By combining representations from these systems, however, human cognition may achieve extraordinary flexibility. Studies of cognition in human infants and in nonhuman primates therefore may contribute to understanding unique features of human knowledge.  相似文献   

20.
视觉表象产生加工的可塑性水平研究   总被引:1,自引:0,他引:1  
采用标准化的视觉表象产生任务,以经过系统训练以及三个不同年龄阶段被试为研究对象来研究视觉表象产生加工时所表现出的可塑性水平。研究结果表明,视觉表象产生加工水平会因外界系统训练而发生功能增强的练习效应,也表现出随着个体的发展所呈现出的年龄效应,年幼儿童还不能产生空间表征,9岁左右可能是儿童类别表象产生能力发展的一个重要时期,也是个体视觉表象产生加工能力可塑性最高的时期。说明由于受大脑神经细胞活动特性改变的影响,视觉表象产生能力具有相对较高的可塑性和易变性特点。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号