• Tidak ada hasil yang ditemukan

OER000001396.pdf

N/A
N/A
Nguyễn Gia Hào

Academic year: 2023

Membagikan "OER000001396.pdf"

Copied!
118
0
0

Teks penuh

In the following, we use the terms computer science and informatics - which are not entirely correct - as synonyms. It is our responsibility—not only as scientists but also as citizens—to make the public aware of these dichotomies or dialectical relationships of computing.

Introduction

As technology matured over the next four decades, computer science emerged as an area of ​​great value to all of science and engineering. The first of these operated until the end of the 1940s, and the computer industry was born in the 1950s.

The Birth of a Discipline

In the early years, universities resisted the creation of new departments because computer science was seen as a technological field with no pedigree. In the 1950s, there was widespread recognition of the value of computing for science, engineering, business, and various other sectors (Akera 2007).

The Quest for Independence

The process of placing new computer science departments in hospitable environments of their universities has, not surprisingly, led to an intensification of the debates about the roles of the three roots (engineering, science and mathematics) in the identity of the field. The Europeans used the term "informatics" in the same way and did not change from their established usage.

Search for Disciplinary Identity

Conflicts surrounding experimental computer science became evident in the late 1970s, and for various reasons first manifested with computer workforce problems (Feldman and Sutherland 1979). Unlike the other two, this was not an internal clash between computer scientists; it challenged the relationship between computer science and other sciences.

Emergence of a Science

This has raised a new question: where does computer science fit into the firmament of all sciences. The strong case for natural computing is one of the most exciting (and controversial) in the modern history of science: it suggests that there must be a reason for the astonishing success of computers in predicting and modeling phenomena in all fields of science. science, and maybe that's because the world itself is an information processor.

Conclusions

Feldman JA, Sutherland WR (1979) Rejuvenating experimental computer science: a report to the National Science Foundation and others. McCracken DD, Denning PJ, Brandin DH (1979) An ACM executive committee position on the crisis in experimental computer science.

Introduction

Summary Big science brings unprecedented advances in many fundamental fields, such as biology and medicine. In this paper, I begin with a discussion of prototypical examples of great science in the medical and biological domains, which serve the purpose of introducing the data-driven approach in contrast to the model-driven approach; then I trace the beginning of the emphasis on "big data" to the so-called "fourth paradigm" and recall some enlightening principles by Jim Gray, who first inspired the fourth paradigm revolution.

Where “Big Science” Is Really Big: Pharma Industry and Genomics

Several worldwide consortia have been established to accumulate sequence data and make it available to the research community through the combined efforts of hundreds of laboratories worldwide. In the near future, we expect genome sequencing to be a key to understanding many pathologies, and we foresee bridging genomics to personalized healthcare; this could be among humanity's most interesting "big data" problems.

Where It All Started: “Fourth Paradigm”

A posteriori I was still trapped in a disciplinary silo, he was already moving towards interdisciplinary data science. The new emerging model, referred to as Pi-shaped, adds another vertical competency, covering the mathematical, statistical, and computational skills needed to handle data science.

Fig. 2.3 “The fourth paradigm” book cover and an old photo of Jim and Stefano
Fig. 2.3 “The fourth paradigm” book cover and an old photo of Jim and Stefano

Data Science and Academia: Issues and Opportunities

Data science is simply a label for a new skill set and should not be separated from the departments in which it is useful. Data science can be organized as a consulting service, similar to IT infrastructure.

Fig. 2.6 Skills which are targeted by the Harvard: Master of Science in Computational Science and Engineering (CSE), retrieved from the program ’ s Web pages
Fig. 2.6 Skills which are targeted by the Harvard: Master of Science in Computational Science and Engineering (CSE), retrieved from the program ’ s Web pages

Assessment and Conclusions

An intermediate path to the above approaches may be to organize data science within an interdisciplinary institute, along with the cross-departmental organization that is becoming commonplace in academia. Images or other third-party material in this chapter are covered under this chapter's Creative Commons license, unless otherwise noted in the credit line for the material.

Setting the Scene

Robotics as an Interdisciplinary Area Involving ICT

Robotics is a good example of an interdisciplinary research field that is heavily dependent on computer science and computer engineering. Even if we are used to think of robots as mechanical machines, most of the methods, knowledge and experience in robotics are related to computer science and computer engineering (Eu Robotics 2014).

Specialty Profiles and Interdisciplinary Research

Certainly, this is a dynamic challenge, expertise can be developed and changed and indeed should change in response to the changes in the environment (market needs, available jobs, technological trends and developments in science). If the environment is very stable, species can afford to become more specialized and maximize their chances of survival in a limited number of possible conditions.

Shaping Centre for Biorobotics: A Case Study

From the individual's point of view, it becomes important to harmonize the individual's competences with the needs of the environment. The first outsourcing question we asked ourselves at the outset was whether the Biorobotics Center should develop expertise in the two disciplines involved, biology and robotics.

Table 3.1 summarizes the changing focus of the research group since its estab- estab-lishment in 2008
Table 3.1 summarizes the changing focus of the research group since its estab- estab-lishment in 2008

Lessons Learned

It should be noted here that over the years more computer engineering skills are also being outsourced. Communication problems in interdisciplinary teams are quite common, especially if the common goal is lacking.

Summary and Conclusions

IJspeert AJ, Crespi A et al (2007) From swimming to walking with a salamander robot powered by a spinal cord model. Manyika J, Chui M et al (2013) Disruptive technologies: developments that will transform life, business and the global economy.

Introduction

The organization of the team should be as flat as possible (but not too flat) with well-defined roles, but also as fluid as possible (without the rule of rigidity), which enables personal and group progress. One of the foundations is to develop trust between people and to maintain good interpersonal relations in the team (without quarrels).

Group Alignment

Common Vision

For example, a long-term vision for our group has been advances in artificial intelligence, text understanding, analysis of global social dynamics, sensor analysis. No group-level corruption also presupposes individuals who have the character to conduct themselves above personal short-term gain for long-term gain at all levels including personal, group and society.

Common Approach to Leadership

The common vision must be developed at different levels, including a long-term vision that gives high-level directions, a mid-term vision that ensures the synchronization of separate projects with the long-term vision and a short-term vision that enables the fulfillment of goals of specific projects. Yet we want to recognize their potential benefits to our long-term vision and turn them into success.

Maintain the Flow

Every research project is a chance to improve our assets be it in the form of knowledge and experiences, algorithms and tools developed, written publications, social network of collaborators or something else. As researchers integrated into a research community, we want to build and maintain a social network of partners with whom we collaborate.

Flexible Internal Organization

As our interests and ideas change and evolve, our social network should follow and sometimes even lead, as meeting new people can spark new directions in our research. That is, it is in the nature of research that at the same time a person can have different roles depending on the context.

Profile of Group Members

Trust

First, we trust ourselves and our own values ​​so that we can express our ideas, our talents and share them with others. Furthermore, to make honest progress in research, we must be honest in what we do, in what we know and what we do not know.

Excellence

As we progress, we need an open mind and humility to listen to criticism and suggestions. As problems approach, we need to trust the initial vision and the process, while also needing a healthy openness to take risks.

External Collaboration

By starting the vision and going through all the process, we make a decision to go for winning and not for losing. It means that you put all of yourself into it, you merge your vision/purpose and your life.

Conclusions

Characteristics of a Leader

A very simple rule is to see if something can be done by someone else in the group and if so, delegate it. When delegating, clearly state what needs to be done and provide support and supervision where necessary.

Successful Leadership

Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as you credit the original author(s) and the source appropriately, provide a link to the Creative Commons license, and indicate whether changes have been made. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulations or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.

Introduction

Summary An effort arising from an invited conversation on "ethics and computers" to re-ground ethics in the rules of logical reasoning, from three concrete principles (Goodness, Truth, Justice) and two meta-principles (Retention and Importance). The following five sections, supplemented by one on the foundations of rational thought and another on the concept of relativism, detail the proposed principles of ethics.

Classical Ethics

After discussion and polishing, it could serve as the basis for a second part dealing with the original theme of ethics and computers. A traditional idea often suggested as the key to ethics is the "Golden Rule": Treat others as you would have them treat you.

Distinctions

A definition of the ideal democracy could be that it is the place where all ethical behavior is legal. Rational thinking is indeed the foundation of the approach to ethics developed in this discussion.

Rules of Reason

The final concept against which the role of ethics is assessed is reason, in the sense of rational problem-solving processes as used in science and engineering. The likely answer in such cases is that a satisfactory solution is as unlikely as Russell's barber, or a definition of "heterological" in the Grelling-Nelson paradox, or a C compiler that guarantees completion of the generated code.

The Principle of Restraint

From an ethical point of view, their behavior is all the more repugnant because it violates the principle of goodness by preying on the weak. The Limitation Principle reduces this danger by telling us to limit the application of ethics to cases of an unquestionably ethical nature: decisions that require a crucial distinction between good and evil.

The Principle of Importance

A doctor wrote to a friend in June 1933 that she had not yet become a cannibal, but "was not sure that I will not be one by the time my letter reaches you." Good people died first. A criticism of the Principle of Importance is that it does not include rules for assessing the relative weight of conflicting criteria.

Relativism

The Principle of Importance does not imply that different cases are compared with each other, but that competing criteria are compared in one case. In many practical cases, however, the more difficult step is to accept that more than one criterion is involved; after that the assessment is not so difficult.

The Principle of Goodness

But the no-harm principle itself goes a long way toward addressing the core goals of ethics. This rule, the Principle of Life, is another quasi-absolute consequence of the Principle of Goodness: above all, it preserves human life.

The Principle of Fairness

Any acceptance of killing human beings after birth must be limited by the strictest and most exceptional conditions. For example, The Principle of Life explains that while we regret separating a child from his teacher, we recoil in horror at the idea of ​​separating him from his parents.

The Principle of Truth

If everyone lied all the time, or many people most of the time, it would be very difficult for society to function. The company will, it seems, recover; but only after providing, through his egregious violation of the Truth Principle, a textual quality example of unethical behavior that will surely serve many generations of ethicists to come.

Conclusion

This issue is an illustration of the SnowTwo Cultures thesis: computer scientists trying to address fault tolerance and protecting computer networks have made significant progress in understanding how a system can operate correctly even if some or possibly many of its components are, consistently or occasionally, deliver misinformation. In the past 10 years we have entered a new phase of the digital shaping of society.

Introduction, or How to Do Ethics of IT Now?

In the 1970s and 1980s, attention was increasingly focused on the context of technology, i.e. values ​​can even become drivers of IT development, instead of being an obstacle in the design of information technology.

Value Sensitive Design

Ethicists will need to devote a large portion of their attention to design to be relevant in the twenty-first century. The gradual functional decomposition of supra functional requirements leads to the moral specifications (see Fig.6.2).

Fig. 6.1 Key problem twenty-first century: value sensitive design
Fig. 6.1 Key problem twenty-first century: value sensitive design

Responsible Innovation 4

Another story - not much different from that of the smart meter - is the introduction of a nationwide electronic patient file in the Netherlands. The continued and systematic focus on data protection and privacy has made Europe an important cradle of new products and services in the field of Privacy by Design or Privacy Enhancing Technologies.

Conclusion

Maastricht_-_Netherlands/12/Electronic_patient_records_in_the_Netherlands.html Thaler R, Sunstein C (2008) Nudge: the mild power of choice architecture. IT security and data protection must enable digital sovereignty and are at the same time areas where Europe has developed recognized expertise in the past and can develop further strength in the future.

Introduction

Just this very recent issue that became public shows that infrastructure and capabilities need to be re-examined in light of digital sovereignty, trust and security. The following chapters highlight some areas where digital sovereignty has a lot of room for improvement and at the same time show the possible ways to get closer to the goal.

Fig. 7.1 Digital sovereignty in public press
Fig. 7.1 Digital sovereignty in public press

Jurisdiction Aware IT and Communications

Given that the information to identify the legal context is very small, it can also be handled with two or three bits in existing communications packets, which - if properly implemented - can be asserted in a responsible way by the provider of communication. Optionally, packet travel can be marked xx1 xx applies to the source and communications transit xx0 xx applies to the communication source.

Switching Mobile Connections: Floating Cross- Jurisdiction to Reduce Cost

If such an arrangement would be agreed by cooperating providers in a transitive way, the user and the services would receive reliable information if their own provider offered this service. As an example of this important "function", it should be mentioned that at this level the encryption of the traffic over the air can also be configured.

Push Notification: Always on a Short Leash

This might have been the case when there were few and far between landlines, but it is no longer a realistic assumption at this point in time.

Cloud Storage: Do We Have to Fear About IPR

As with environmental issues and a labor-related legislation, this could be a further asset that Europe is reluctant to concede and will then find that some of the business is not realistic.

Document Collaboration: In the Cloud as You Type

Validation of active elements: it must be possible to limit the origin of active elements (eg HTML5 javascript) to come from a server that the user trusts, to prevent circumvention of the criteria above. Encrypted collaboration: When documents originate from a collaborative process, it must be possible to encrypt every part of the document that leaves the user's device/browser using user-selected key management for encryption and decryption.

Conclusions

According to the provider, identification methods are not according to the demands of the users. It seems that low female participation is mainly a problem of the western and northwestern countries in the world.

Introduction

Subsequently, the most culturally differentiated participation of women in computer science studies is discussed.

Women in the History of Computing

Even in the 1960s, programming was done by a high percentage of women, and when Computer Science (CS) started as a scientific subject and course of.

The Contingent Female Enrollment in Informatics Studies

Both the collapse of the Soviet Union and the disintegration of structures in Arab countries were disastrous for women's participation. With the reunification of Germany, the situation changed drastically in all places in the GDR, the most surprising of which is shown in the picture of TU Rostock (Figure 8.3).

Fig. 8.1 Women in computer science GDR (Source: Dolores L. Augustine, private communica- communica-tion; diagram B
Fig. 8.1 Women in computer science GDR (Source: Dolores L. Augustine, private communica- communica-tion; diagram B

Understanding the Findings

But what about France and the academy francaise, the second scientific institution in the world. These cultures are mostly carried out in the interaction between men and women and between the two sexes outside the workplace.

Fig. 8.6 Computer science beginners as % of total number of CS students (w.r.t. to German and foreign students) (Source: Statistisches Bundesamt 2005)
Fig. 8.6 Computer science beginners as % of total number of CS students (w.r.t. to German and foreign students) (Source: Statistisches Bundesamt 2005)

Introduction and Intentions of the Libretto

Summary This text describes the libretto for a one-person opera about Ada, Countess of Lovelace, its development, and thus Ada's life and work. It was a great challenge to make her abstract mathematical skills and her insights into the possibilities of computers audible and visible at the beginning of the nineteenth century, as well as her (first) programming, from e.g.

Short Biographical Notions and Historic Setting

And that the virtuous mother realizes at least once that she lacks something for her perfection - and mercilessly fights this insight in her daughter.

Logistics, Production and Staging

Her attempts at gambling are like a metaphor that sums it all up in a nutshell. A chronological sequence for the four scenes was not possible because the themes would have to be covered several times throughout Ada's life.

The Acts

  • Biografic Background
  • Act 1 Ada as a Child, Education and Relation to Her Mother
  • Act 2 Men in Adas Life, Her Father, the Scientists
  • Act 3 Ada ’ s Relation to Mathematics and Technology
  • Act 4 Sickness, Ediction and Gambling

When he had further developed his universal freely programmable "analytical engine" (see Babbage 1999), Ada was thrilled. In fact, she saw in this machine her salvation, so that she could connect poetics, music and emotions with rational science, mathematics and technology, a symbiosis that she had missed so much - she was happy.

The Staging

Virtual realities and actors, avatars, robots and drones will also appear in projections and link up with the texts of the choir of the twentieth/twenty-first century. Babbage C (1961) On the Principles and Development of the Calculator: And Other Pioneering Writings by Charles Babbage and Others.

Gambar

Figure 2.2, extracted from Paradigm 4 (2015), indicates the current state of genomic computing, where a lot of progress has been done in the so called “primary analysis” (essentially the reading of DNA) and “secondary analysis” (essentially, the alignment
Fig. 2.3 “The fourth paradigm” book cover and an old photo of Jim and Stefano
Fig. 2.4 Representations for data science research expertise: (a) “T” vs. “Pi-shaped” education and (b) multidisciplinary contributions to data science (from: DrewConway.com, retrieved 25/6/
Fig. 2.6 Skills which are targeted by the Harvard: Master of Science in Computational Science and Engineering (CSE), retrieved from the program ’ s Web pages
+7

Referensi

Dokumen terkait

كانه  نيتقيرط دادعلإ تاءاصحإ لوح عاطقلا ريغ يمسرلا : ةقيرطلا ةرشابملا ةلثمتملا يف زاجنإ حسم صاخ تادحول جاتنلاا يتلا طشنت يف عاطقلا ريغ ،يمسرلا فدهب فوقولا ىلع تازيمم صئاصخو