Frontiers in Computer Science最新文献

筛选
英文 中文
Computational charisma—A brick by brick blueprint for building charismatic artificial intelligence 计算魅力——一砖一瓦构建魅力型人工智能的蓝图
Frontiers in Computer Science Pub Date : 2023-11-02 DOI: 10.3389/fcomp.2023.1135201
Björn W. Schuller, Shahin Amiriparian, Anton Batliner, Alexander Gebhard, Maurice Gerczuk, Vincent Karas, Alexander Kathan, Lennart Seizer, Johanna Löchner
{"title":"Computational charisma—A brick by brick blueprint for building charismatic artificial intelligence","authors":"Björn W. Schuller, Shahin Amiriparian, Anton Batliner, Alexander Gebhard, Maurice Gerczuk, Vincent Karas, Alexander Kathan, Lennart Seizer, Johanna Löchner","doi":"10.3389/fcomp.2023.1135201","DOIUrl":"https://doi.org/10.3389/fcomp.2023.1135201","url":null,"abstract":"Charisma is considered as one's ability to attract and potentially influence others. Clearly, there can be considerable interest from an artificial intelligence's (AI) perspective to provide it with such skill. Beyond, a plethora of use cases opens up for computational measurement of human charisma, such as for tutoring humans in the acquisition of charisma, mediating human-to-human conversation, or identifying charismatic individuals in big social data. While charisma is a subject of research in its own right, a number of models exist that base it on various “pillars,” that is, dimensions, often following the idea that charisma is given if someone could and would help others. Examples of such pillars, therefore, include influence (could help) and affability (would help) in scientific studies, or power (could help), presence, and warmth (both would help) as a popular concept. Modeling high levels in these dimensions, i. e., high influence and high affability, or high power, presence, and warmth for charismatic AI of the future, e. g., for humanoid robots or virtual agents, seems accomplishable. Beyond, also automatic measurement appears quite feasible with the recent advances in the related fields of Affective Computing and Social Signal Processing. Here, we therefore present a brick by brick blueprint for building machines that can appear charismatic, but also analyse the charisma of others. We first approach the topic very broadly and discuss how the foundation of charisma is defined from a psychological perspective. Throughout the manuscript, the building blocks (bricks) then become more specific and provide concrete groundwork for capturing charisma through artificial intelligence (AI). Following the introduction of the concept of charisma, we switch to charisma in spoken language as an exemplary modality that is essential for human-human and human-computer conversations. The computational perspective then deals with the recognition and generation of charismatic behavior by AI. This includes an overview of the state of play in the field and the aforementioned blueprint. We then list exemplary use cases of computational charismatic skills. The building blocks of application domains and ethics conclude the article.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":"178 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135974885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mandarin Chinese translation of the Artificial-Social-Agent questionnaire instrument for evaluating human-agent interaction 评估人-代理交互作用的人工社会-代理问卷工具的中文翻译
Frontiers in Computer Science Pub Date : 2023-10-30 DOI: 10.3389/fcomp.2023.1149305
Fengxiang Li, Siska Fitrianie, Merijn Bruijnes, Amal Abdulrahman, Fu Guo, Willem-Paul Brinkman
{"title":"Mandarin Chinese translation of the Artificial-Social-Agent questionnaire instrument for evaluating human-agent interaction","authors":"Fengxiang Li, Siska Fitrianie, Merijn Bruijnes, Amal Abdulrahman, Fu Guo, Willem-Paul Brinkman","doi":"10.3389/fcomp.2023.1149305","DOIUrl":"https://doi.org/10.3389/fcomp.2023.1149305","url":null,"abstract":"The Artificial-Social-Agent (ASA) questionnaire is an instrument for evaluating human-ASA interaction. It consists of 19 constructs and related dimensions measured by either 24 questionnaire items (short version) or 90 questionnaire items (long version). The questionnaire was built and validated by a research community effort to make evaluation results more comparable between agents and findings more generalizable. The current questionnaire is in English, which limits its use to only a population with an adequate command of the English language. Translating the questionnaire into more languages allows for the inclusion of other populations and the possibility of comparing them. Therefore, this paper presents a Mandarin Chinese translation of the questionnaire. After three construction cycles that included forward and backward translation, we gave both the final version of the translated and original English questionnaire to 242 bilingual crowd-workers to evaluate 14 ASAs. Results show on average a good level of correlation on the construct/dimension level (ICC M = 0.79, SD = 0.09, range [0.61, 0.95]) and on the item level (ICC M = 0.62, SD = 0.14, range [0.19, 0.92]) between the two languages for the long version, and for the short version (ICC M = 0.66, SD = 0.12, range [0.41, 0.92]). The analysis also established correction values for converting questionnaire item scores between Chinese and English questionnaires. Moreover, we also found systematic differences in English questionnaire scores between the bilingual sample and a previously collected mixed-international English-speaking sample. We hope this and the Chinese questionnaire translation will motivate researchers to study human-ASA interaction among a Chinese literate population and to study cultural similarities and differences in this area.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":"122 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136103968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Plant-human entanglements in buildings: designing for care infrastructuring with office occupants and pot plants 建筑中的植物与人类的纠缠:为办公人员和盆栽植物设计护理基础设施
Frontiers in Computer Science Pub Date : 2023-10-30 DOI: 10.3389/fcomp.2023.1233905
Susan Loh, Yasu Santo, Marcus Foth
{"title":"Plant-human entanglements in buildings: designing for care infrastructuring with office occupants and pot plants","authors":"Susan Loh, Yasu Santo, Marcus Foth","doi":"10.3389/fcomp.2023.1233905","DOIUrl":"https://doi.org/10.3389/fcomp.2023.1233905","url":null,"abstract":"The current outsourcing of maintenance and the use of technological devices to automatically care for plants in buildings change the spatial experience between human office occupants and plants. This caretaker system distances people from plants, inclining us to regard them more as decorative objects. The relationship between humans and plants in a building is often unidirectional, with plants providing humans multiple benefits such as improved health and well-being, and increased worker productivity. In our human-plant interaction study, we developed a layer of care infrastructure within an office building that gives agency to people as a collective to interact with and take care of other non-human beings; that is, plants. In re-imagining mediated human-building interaction, we employed technology as an ambient mediator where people, plants and technology comprised the plant care system in a typical office building. A year-long design intervention was introduced within a typical office floor using artifacts (pots, shelves, and digital system) which we fabricated for the plants. From the results of an 8 week participation experiment together with data from qualitative interviews of 6 study participants, we identified five themes: Technology, Object/Thing, Infrastructuring, Commoning, and Care. Our analysis of these themes informs a care infrastructuring approach where both humans and plants become interdependent office co-inhabitants. By entangling with technology, care, and others, we present an infrastructuring layer to mediate human-building interactions with plants.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":"317 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136067720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging linear mapping for model-agnostic adversarial defense 利用线性映射进行与模型无关的对抗性防御
Frontiers in Computer Science Pub Date : 2023-10-30 DOI: 10.3389/fcomp.2023.1274832
Huma Jamil, Yajing Liu, Nathaniel Blanchard, Michael Kirby, Chris Peterson
{"title":"Leveraging linear mapping for model-agnostic adversarial defense","authors":"Huma Jamil, Yajing Liu, Nathaniel Blanchard, Michael Kirby, Chris Peterson","doi":"10.3389/fcomp.2023.1274832","DOIUrl":"https://doi.org/10.3389/fcomp.2023.1274832","url":null,"abstract":"In the ever-evolving landscape of deep learning, novel designs of neural network architectures have been thought to drive progress by enhancing embedded representations. However, recent findings reveal that the embedded representations of various state-of-the-art models are mappable to one another via a simple linear map, thus challenging the notion that architectural variations are meaningfully distinctive. While these linear maps have been established for traditional non-adversarial datasets, e.g., ImageNet, to our knowledge no work has explored the linear relation between adversarial image representations of these datasets generated by different CNNs. Accurately mapping adversarial images signals the feasibility of generalizing an adversarial defense optimized for a specific network. In this work, we demonstrate the existence of a linear mapping of adversarial inputs between different models that can be exploited to develop such model-agnostic, generalized adversarial defense. We further propose an experimental setup designed to underscore the concept of this model-agnostic defense. We train a linear classifier using both adversarial and non-adversarial embeddings within the defended space. Subsequently, we assess its performance using adversarial embeddings from other models that are mapped to this space. Our approach achieves an AUROC of up to 0.99 for both CIFAR-10 and ImageNet datasets.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136105712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensive cyber security for port and harbor ecosystems 港口和港口生态系统综合网络安全
Frontiers in Computer Science Pub Date : 2023-10-25 DOI: 10.3389/fcomp.2023.1154069
Jouni Pöyhönen, Martti Lehto
{"title":"Comprehensive cyber security for port and harbor ecosystems","authors":"Jouni Pöyhönen, Martti Lehto","doi":"10.3389/fcomp.2023.1154069","DOIUrl":"https://doi.org/10.3389/fcomp.2023.1154069","url":null,"abstract":"Global maritime transportation and logistics systems are essential parts of critical infrastructures in every society, and a crucial part of maritime logistics processes are seaports. In the coming years, digitalization and increased levels of autonomy in logistic transport chains are expected to take leaps forward. This development can help create safer, more efficient, more sustainable, and more reliable service chains to meet the requirements for a better quality of life and global prosperity. Port and harbor operations connect the maritime transport to other modes of transportation and enable multimodal transportation. Smart ports play a central role in future transport logistics and supply chains. Digitalization helps improve the efficiency of terminal systems in the processes of these ports. In the best cases, digitalization can also promote the reduction of emissions by optimizing port operations and enhancing cargo and people flows while improving the experience for all stakeholders. The improvement of port processes relies on the development of information and communication technology (ICT) as well as on industrial control systems (ICS) and operation technologies (OT). At the same time, the cyber security of maritime logistics also needs to be addressed. This article presents our findings related to the Sea4Value research goal on cyber security, which is a comprehensive cyber security architecture for port services at the system level. The article emphasizes the importance of a system of systems approach in terms of a comprehensive cyber security management process for port ecosystems. The description and recognition of management steps of every stakeholder are the key elements in this kind of process.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135168231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Accessible Digital Musical Instruments through the lens of disability models: a case study with instruments targeting d/Deaf people 残障模型视角下的无障碍数字乐器分析——以聋人乐器为例
Frontiers in Computer Science Pub Date : 2023-10-24 DOI: 10.3389/fcomp.2023.1158476
Erivan Gonçalves Duarte, Isabelle Cossette, Marcelo M. Wanderley
{"title":"Analysis of Accessible Digital Musical Instruments through the lens of disability models: a case study with instruments targeting d/Deaf people","authors":"Erivan Gonçalves Duarte, Isabelle Cossette, Marcelo M. Wanderley","doi":"10.3389/fcomp.2023.1158476","DOIUrl":"https://doi.org/10.3389/fcomp.2023.1158476","url":null,"abstract":"Music educators and researchers have grown increasingly aware of the need for traditional musical practices to promote inclusive music for disabled people. Inclusive music participation has been addressed by Accessible Digital Musical Instruments (ADMIs), which welcome different ways of playing and perceiving music, with considerable impact on music-making for disabled people. ADMIs offer exciting possibilities for instrument design to consider and incorporate individual constraints (e.g., missing arm, low vision, hearing loss, etc.) more than traditional acoustic instruments, whose generally fixed design allows little room for disabled musicians inclusivity. Relatively few works discuss ADMIs in the context of disability studies, and no work has investigated the impact of different disability models in the process of designing inclusive music technology. This paper proposes criteria to classify ADMIs according to the medical, social, and cultural models of disability, then applies these criteria to evaluate eleven ADMIs targeting d/Deaf people. This analysis allows us to reflect on the design of ADMIs from different perspectives of disability, giving insights for future projects and deepening our understanding of medical, social, and cultural aspects of accessible music technology.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135265965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
KiData: simple data visualization tool for future data scientists KiData:面向未来数据科学家的简单数据可视化工具
Frontiers in Computer Science Pub Date : 2023-10-23 DOI: 10.3389/fcomp.2023.1209515
Sally Hamouda, Sahith Kancharla, Gurkirat Singh, Lin Yang, Zhuoqun Wang, Siliang Zhang, Raseen Nirjhar, John Golden
{"title":"KiData: simple data visualization tool for future data scientists","authors":"Sally Hamouda, Sahith Kancharla, Gurkirat Singh, Lin Yang, Zhuoqun Wang, Siliang Zhang, Raseen Nirjhar, John Golden","doi":"10.3389/fcomp.2023.1209515","DOIUrl":"https://doi.org/10.3389/fcomp.2023.1209515","url":null,"abstract":"Data and visualizations are powerful tools that provide insights, analysis, and conclusions in a logical and easy-to-understand manner. However, the current school curriculum lacks adequate preparation for students to understand, analyze, interpret, or create complex data visualizations, which can hinder their potential careers in data science. To address this gap, our project aimed to develop a user-friendly web-based tool that provides interactive lessons on data and visualizations for elementary school children. The website consists of 12 lessons, categorized by grade levels (1st–2nd grade, 3rd–4th grade, and 5th–6th grade), and includes an interactive question-answer section. Users can scroll down after reading the lessons and practice questions based on the visualizations. The website also has the potential to incorporate games related to data and visualization. The lessons are implemented using React.js and Java with the Spring framework, and new lessons can easily be added by storing them in a markdown folder. The website features a navigation bar with tabs for Home, Lessons, Games, About, and Contact. Additionally, a feedback form is included to gather user feedback for further improvements. The website is currently in the testing stage, and future surveys for teachers and elementary school students will be added to enhance the features provided. Our study presents preliminary findings and serves as a foundational exploration. We acknowledge that further research and experimentation are required to validate and expand upon the results discussed herein.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135367735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Techno-economic assessment of 5G infrastructure sharing business models in rural areas 农村5G基础设施共享商业模式的技术经济评估
Frontiers in Computer Science Pub Date : 2023-10-20 DOI: 10.3389/fcomp.2023.1191853
Shruthi Koratagere Anantha Kumar, Edward J. Oughton
{"title":"Techno-economic assessment of 5G infrastructure sharing business models in rural areas","authors":"Shruthi Koratagere Anantha Kumar, Edward J. Oughton","doi":"10.3389/fcomp.2023.1191853","DOIUrl":"https://doi.org/10.3389/fcomp.2023.1191853","url":null,"abstract":"How cost-efficient are potential infrastructure sharing business models for the 5G era (and beyond)? This significant question needs to be addressed if we are to deliver universal affordable broadband in line with Target 9.1 of the UN Sustainable Development Goals. Although almost two-thirds of the global population is now connected, many users still lack access to high-speed and reliable broadband connectivity. Indeed, some of the largest connectivity issues are associated with those living in areas of low economic viability. Consequently, this assessment evaluates the cost implications of different infrastructure sharing business models using a techno-economic assessment framework. The results indicate that a rural 5G neutral host network (NHN) strategy helps to reduce total cost between 10 and 50% compared with other sharing strategies. We also find that, compared to a baseline strategy with No Sharing , the net present value of rural 5G sharing strategies can earn between 30 and 90% more profit. The network upgrades to 5G using various sharing strategies are most sensitive to changes in the average revenue per user, the adoption rate, and the amount of existing site infrastructure. For example, the results from this study show that a 20% variation in demand revenue is estimated to increase the net present value of the sharing strategies by 2–5 times compared to the No Sharing strategy. Similarly, a 10% increase in existing infrastructure lowers the net present value by 8–30%. The infrastructure sharing strategies outlined in this study have the potential to enhance network viability while bridging the digital divide in remote and rural locations.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135617015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Quantum image denoising: a framework via Boltzmann machines, QUBO, and quantum annealing 量子图像去噪:通过玻尔兹曼机,QUBO和量子退火的框架
Frontiers in Computer Science Pub Date : 2023-10-19 DOI: 10.3389/fcomp.2023.1281100
Phillip Kerger, Ryoji Miyazaki
{"title":"Quantum image denoising: a framework via Boltzmann machines, QUBO, and quantum annealing","authors":"Phillip Kerger, Ryoji Miyazaki","doi":"10.3389/fcomp.2023.1281100","DOIUrl":"https://doi.org/10.3389/fcomp.2023.1281100","url":null,"abstract":"We investigate a framework for binary image denoising via restricted Boltzmann machines (RBMs) that introduces a denoising objective in quadratic unconstrained binary optimization (QUBO) form well-suited for quantum annealing. The denoising objective is attained by balancing the distribution learned by a trained RBM with a penalty term for derivations from the noisy image. We derive the statistically optimal choice of the penalty parameter assuming the target distribution has been well-approximated, and further suggest an empirically supported modification to make the method robust to that idealistic assumption. We also show under additional assumptions that the denoised images attained by our method are, in expectation, strictly closer to the noise-free images than the noisy images are. While we frame the model as an image denoising model, it can be applied to any binary data. As the QUBO formulation is well-suited for implementation on quantum annealers, we test the model on a D-Wave Advantage machine, and also test on data too large for current quantum annealers by approximating QUBO solutions through classical heuristics.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135730414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Atmosphere, mood, and scientific explanation 气氛、情绪和科学解释
Frontiers in Computer Science Pub Date : 2023-10-16 DOI: 10.3389/fcomp.2023.1154737
David Kirsh
{"title":"Atmosphere, mood, and scientific explanation","authors":"David Kirsh","doi":"10.3389/fcomp.2023.1154737","DOIUrl":"https://doi.org/10.3389/fcomp.2023.1154737","url":null,"abstract":"In this article, I consider how scientific theories may explain architectural atmosphere. Architects use atmosphere to refer to a holistic, emergent property of a space that partly determines the mood of inhabitants. It is said to be a “subtle, intangible, ambient quality of a place” that also significantly shapes the way we interact with a space. It is caused by the way light, texture, materials, layout, geometry, acoustics, smell, and other perceptual properties influence affect. But it goes beyond these individually because of non-linear interactions between them. In sections one and two, I explain what an externalist account of the atmosphere would look like. This is an interpretation that objectifies the atmosphere, treating it as a complex causal property of buildings and spaces, accessible to scientific study through ethnographic research, through quantifying and minutely observing and recording humans and the buildings they are in, and then using machine learning and statistical analyses to identify correlations. The goal is to push the identification of the underlying external attributes as far as possible, ultimately to where a machine might enter a room, move around, and then label its atmosphere. In section three, I explore an internalist or subjectivist account of the atmosphere. This is the position that pushes back on machine identification of atmospheres. A subjectivist interpretation is harder to study scientifically because it involves knowing so much about the inner state and the history of a person. Culture, incoming mood, prior experience and associations, interests, tasks, social interaction, and more may all affect mood. Section four explores the frequently underestimated role—on emotion and space comprehension—played by the tasks that occupants perform while in a space, and the way their surrounding social and technological context intrudes on their encounter. I introduce and defend the view that tasks, social context, and nearby technology situate a person in a different environment than when they are inactive. This complicates the search for atmosphere. Nonetheless, I end on an optimistic note that there may yet be a place for atmosphere in the neuroscience of architecture, but it will be much different than our current thinking.","PeriodicalId":52823,"journal":{"name":"Frontiers in Computer Science","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136116738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信