Results for 'Gamow vectors'

240 found
Order:
  1. Mathematical Models for Unstable Quantum Systems and Gamow States.Manuel Gadella, Sebastian Fortin, Juan Pablo Jorge & Marcelo Losada - 2022 - Entropy 24 (6):804.
    We review some results in the theory of non-relativistic quantum unstable systems. We account for the most important definitions of quantum resonances that we identify with unstable quantum systems. Then, we recall the properties and construction of Gamow states as vectors in some extensions of Hilbert spaces, called Rigged Hilbert Spaces. Gamow states account for the purely exponential decaying part of a resonance; the experimental exponential decay for long periods of time physically characterizes a resonance. We briefly (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. An Algebraic Model for Quantum Unstable States.Sebastian Fortin, Manuel Gadella, Federico Holik, Juan Pablo Jorge & Marcelo Losada - 2022 - Mathematics 10 (23).
    In this review, we present a rigorous construction of an algebraic method for quantum unstable states, also called Gamow states. A traditional picture associates these states to vectors states called Gamow vectors. However, this has some difficulties. In particular, there is no consistent definition of mean values of observables on Gamow vectors. In this work, we present Gamow states as functionals on algebras in a consistent way. We show that Gamow states are (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Static and dynamic vector semantics for lambda calculus models of natural language.Mehrnoosh Sadrzadeh & Reinhard Muskens - 2018 - Journal of Language Modelling 6 (2):319-351.
    Vector models of language are based on the contextual aspects of language, the distributions of words and how they co-occur in text. Truth conditional models focus on the logical aspects of language, compositional properties of words and how they compose to form sentences. In the truth conditional approach, the denotation of a sentence determines its truth conditions, which can be taken to be a truth value, a set of possible worlds, a context change potential, or similar. In the vector models, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  4. (1 other version)Word vector embeddings hold social ontological relations capable of reflecting meaningful fairness assessments.Ahmed Izzidien - 2021 - AI and Society (March 2021):1-20.
    Programming artificial intelligence to make fairness assessments of texts through top-down rules, bottom-up training, or hybrid approaches, has presented the challenge of defining cross-cultural fairness. In this paper a simple method is presented which uses vectors to discover if a verb is unfair or fair. It uses already existing relational social ontologies inherent in Word Embeddings and thus requires no training. The plausibility of the approach rests on two premises. That individuals consider fair acts those that they would be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Expanding the vector model for dispositionalist approaches to causation.Joseph A. Baltimore - 2019 - Synthese 196 (12):5083-5098.
    Neuron diagrams are heavily employed in academic discussions of causation. Stephen Mumford and Rani Lill Anjum, however, offer an alternative approach employing vector diagrams, which this paper attempts to develop further. I identify three ways in which dispositionalists have taken the activities of powers to be related: stimulation, mutual manifestation, and contribution combination. While Mumford and Anjum do provide resources for representing contribution combination, which might be sufficient for their particular brand of dispositionalism, I argue that those resources are not (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  6. Reality as a Vector in Hilbert Space.Sean M. Carroll - 2022 - In Valia Allori, Quantum Mechanics and Fundamentality: Naturalizing Quantum Theory between Scientific Realism and Ontological Indeterminacy. Cham: Springer. pp. 211-224.
    I defend the extremist position that the fundamental ontology of the world consists of a vector in Hilbert space evolving according to the Schrödinger equation. The laws of physics are determined solely by the energy eigenspectrum of the Hamiltonian. The structure of our observed world, including space and fields living within it, should arise as a higher-level emergent description. I sketch how this might come about, although much work remains to be done.
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  7. Vectors of epistemic insecurity.Emily Sullivan & Mark Alfano - 2020 - In Ian James Kidd, Quassim Cassam & Heather Battaly, Vice Epistemology. New York, NY: Routledge.
    Epistemologists have addressed a variety of modal epistemic standings, such as sensitivity, safety, risk, and epistemic virtue. These concepts mark out the ways that beliefs can fail to track the truth, articulate the conditions needed for knowledge, and indicate ways to become a better epistemic agent. However, it is our contention that current ways of carving up epistemic modality ignore the complexities that emerge when individuals are embedded within a community and listening to a variety of sources, some of whom (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8. Spoils to the Vector - How to model causes if you are a realist about powers.Stephen Mumford & Rani Lill Anjum - 2011 - The Monist 94 (1):54-80.
    A standard way of representing causation is with neuron diagrams. This has become popular since the influential work of David Lewis. But it should not be assumed that such representations are metaphysically neutral and amenable to any theory of causation. On the contrary, this way of representing causation already makes several Humean assumptions about what causation is, and which suit Lewis’s programme of Humean Supervenience. An alternative of a vector diagram is better suited for a powers ontology. Causation should be (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  9. DSm Super Vector Space of Refined Labels.W. B. Vasantha Kandasamy & Florentin Smarandache - 2011 - Columbus, OH, USA: Zip Publishing.
    In this book authors for the first time introduce the notion of supermatrices of refined labels. Authors prove super row matrix of refined labels form a group under addition. However super row matrix of refined labels do not form a group under product; it only forms a semigroup under multiplication. In this book super column matrix of refined labels and m × n matrix of refined labels are introduced and studied.
    Download  
     
    Export citation  
     
    Bookmark  
  10. Impact of Variation in Vector Space on the performance of Machine and Deep Learning Models on an Out-of-Distribution malware attack Detection.Tosin Ige - forthcoming - Ieee Conference Proceeding.
    Several state-of-the-art machine and deep learning models in the mode of adversarial training, input transformation, self adaptive training, adversarial purification, zero-shot, one- shot, and few-shot meta learning had been proposed as a possible solution to an out-of-distribution problems by applying them to wide arrays of benchmark dataset across different research domains with varying degrees of performances, but investigating their performance on previously unseen out-of- distribution malware attack remains elusive. Having evaluated the poor performances of these state-of-the-art approaches in our previous (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Context Update for Lambdas and Vectors.Reinhard Muskens & Mehrnoosh Sadrzadeh - 2016 - In Maxime Amblard, Philippe de Groote, Sylvain Pogodalla & Christian Rétoré, Logical Aspects of Computational Linguistics. Celebrating 20 Years of LACL (1996–2016). Berlin, Germany: Springer. pp. 247--254.
    Vector models of language are based on the contextual aspects of words and how they co-occur in text. Truth conditional models focus on the logical aspects of language, the denotations of phrases, and their compositional properties. In the latter approach the denotation of a sentence determines its truth conditions and can be taken to be a truth value, a set of possible worlds, a context change potential, or similar. In this short paper, we develop a vector semantics for language based (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  12. Values for victims and vectors of disease.Elsa Kugelberg - 2022 - Journal of Medical Ethics 48 (9):641-642.
    John and Curran have convincingly shown that Scanlonian contractualism is a valuable resource for evaluating pandemic response policies, and that we should reject cost–benefit analysis in favour of a contractualist framework. However, they fail to consider the part of contractualism that Scanlon constructed precisely to deal with the question of when the state can restrict individuals from making choices that are harmful to themselves and others: the value of choice view. In doing so, they leave it open for opponents of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  13.  57
    PAPR Reduction with Palindromic Codes Using Biasing Vector Technique in OFDM.M. V. S. Sairam & B. Prabhakara Rao - 2009 - International Journal of Electronics Engineering 1 (2):157-159.
    The main drawback of the OFDM system is high Peak to Average Power Ratio (PAPR), which calls for high power amplifiers in the system. This problem can be mitigated by using Block codes that are Non Transparent. We investigated the potential of the Palindromic codes in reducing the PAPR with the proposed biasing method. Using exhaustive search, a bias vector of n bits is chosen and added to all possible codewords (using modulo-2 addition) such that the maximum PAPR of all (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  62
    Adaptive Cybersecurity in the Digital Age: Emerging Threat Vectors and Next-Generation Defense Strategies.Harish Kumar Reddy Kommera - 2024 - International Journal for Research in Applied Science and Engineering Technology (Ijraset) 12 (9):558-564.
    This article examines the rapidly evolving landscape of cybersecurity, focusing on emerging threats and innovative defense mechanisms. We analyze four key threat vectors: Advanced Persistent Threats (APTs), ransomware, Internet of Things (IoT) vulnerabilities, and social engineering attacks. These threats pose significant risks to organizations, including data breaches, financial losses, and operational disruptions. In response, we explore cutting-edge defense mechanisms such as Artificial Intelligence and Machine Learning for threat detection, Zero Trust Architecture for access control, blockchain for data integrity, behavioral (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  15. The View from Vector Space: an account of conceptual geography.Joshua Stein - 2014 - Journal of Cognition and Neuroethics 2 (1):71-91.
    Download  
     
    Export citation  
     
    Bookmark  
  16. Representation of strongly independent preorders by vector-valued functions.David McCarthy, Kalle M. Mikkola & Teruji Thomas - 2017 - Mpra.
    We show that without assuming completeness or continuity, a strongly independent preorder on a possibly infinite dimensional convex set can always be given a vector-valued representation that naturally generalizes the standard expected utility representation. More precisely, it can be represented by a mixture-preserving function to a product of lexicographic function spaces.
    Download  
     
    Export citation  
     
    Bookmark  
  17. Follow the Math!: The Mathematics of Quantum Mechanics as the Mathematics of Set Partitions Linearized to (Hilbert) Vector Spaces.David Ellerman - 2022 - Foundations of Physics 52 (5):1-40.
    The purpose of this paper is to show that the mathematics of quantum mechanics is the mathematics of set partitions linearized to vector spaces, particularly in Hilbert spaces. That is, the math of QM is the Hilbert space version of the math to describe objective indefiniteness that at the set level is the math of partitions. The key analytical concepts are definiteness versus indefiniteness, distinctions versus indistinctions, and distinguishability versus indistinguishability. The key machinery to go from indefinite to more definite (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  18. Cohesive Logic Vectors.Parker Emmerson - manuscript
    We have now mapped the set of analogies Ai,j to conceptual and mechanical meanings. This allows us to recognize how the Group Algebraic System G decomposes into five smaller subsystems, each of which relate to well-known symbolic systems. Furthermore, by recognizing the algorithmic transformations between these subsystems, we can apply each representing a single component of the Group Algebraic System G, or model how algorithms are used in mathematics, by mapping its meaning onto the corresponding transformation steps between the subsystems. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Philosophical Toys as Vectors for Diagrammatic Creation: The Case of The Fragmented Orchestra.Claudia Mongini - 2013 - Teorie Vědy / Theory of Science 35 (2):289-313.
    The central topic of this essay consists into establishing a relation between two dimensions of formation: the conceptual process of creating philo- sophical toys - that is of reelaborating existing philosophical concepts, mainly deriving from the thought of Gilles Deleuze and Félix Guattari, in terms of their potential as ‘operative constructs' - and their parallel redeployment towards the specific problem of analyz- ing a recent transdisciplinary artwork. By means of this strategical shift, theory looses its character of explanation and illustration. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. On momentum operators given by Killing vectors whose integral curves are geodesics.Thomas Schürmann - 2022 - Physics 4 (4): 1440-1452.
    We consider momentum operators on intrinsically curved manifolds. Given that the momentum operators are Killing vector fields whose integral curves are geodesics, it is shown that the corresponding manifold is either flat, or otherwise of compact type with positive constant sectional curvature and dimension equal to 1, 3 or 7. Explicit representations of momentum operators and the associated Casimir element will be discussed for the 3-sphere. It will be verified that the structure constants of the underlying Lie algebra are proportional (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup 99) dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   111 citations  
  22. OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  23. Political Footprints: Political Discourse Analysis using Pre-Trained Word Vectors.Christophe Bruchansky - manuscript
    How political opinions are spread on social media has been the subject of many academic researches recently, and rightly so. Social platforms give researchers a unique opportunity to understand how public discourses are perceived, owned and instrumentalized by the general public. This paper is instead focussing on the political discourses themselves, and how a specific machine learning technique - vector space models (VSMs) -, can be used to make systematic and more objective discourse analysis. Political footprints are vector-based representation of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. Dirac-Type Equations in a Gravitational Field, with Vector Wave Function.Mayeul Arminjon - 2008 - Foundations of Physics 38 (11):1020-1045.
    An analysis of the classical-quantum correspondence shows that it needs to identify a preferred class of coordinate systems, which defines a torsionless connection. One such class is that of the locally-geodesic systems, corresponding to the Levi-Civita connection. Another class, thus another connection, emerges if a preferred reference frame is available. From the classical Hamiltonian that rules geodesic motion, the correspondence yields two distinct Klein-Gordon equations and two distinct Dirac-type equations in a general metric, depending on the connection used. Each of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25. How does a tautology say nothing?Ian Proops - 2024 - In Jimmy Plourde & Mathieu Marion, Wittgenstein’s Pre-Tractatus Writings: Interpretations and Reappraisals (History of Analytic Philosophy).
    In the Tractatus, Wittgenstein claims that tautologies 'say nothing'. Later he explains that when he had called tautologies 'senseless' he had had in mind the point that they possessed a zero quantity of sense. He holds that a tautology, insofar as it is the limit of a series of propositions of diminishing quantity of sense, constitutes a degenerate case of a proposition, somewhat as a point is a degenerate case of a circular conic section. But he also holds that a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26.  62
    Harnessing Machine Learning to Predict Chronic Kidney Disease Risk.M. Arulselvan - 2025 - Journal of Science Technology and Research (JSTAR) 6 (1):1-16.
    Early detection of CKD is essential for timely intervention and improved patient outcomes. This project aims to develop a machine learning-based predictive model for diagnosing CKD at an early stage. By utilizing a range of clinical features such as age, blood pressure, blood sugar, and other relevant biomarkers, we employ machine learning algorithms, including Decision Trees, Random Forests, and Support Vector Machines (SVM), to predict the likelihood of a patient developing CKD.
    Download  
     
    Export citation  
     
    Bookmark  
  27. Protogeometer: Falling Into Future.Vladimir Rogozhin - 2014 - FQXi Essay Contest 2014.
    Universe silence … Why? TechnoSfera … Where does it move? BioSfera … Where is the ―non-return point? NooSfera … What to do? The deep mind looks for primordial senses of the ―LifeWorld(LebensWelt). Сonsciousness, matter, memory … Self-Consciousness… Сonsciousness is attracting senses vector magnitude, intentional effect of absolute complexity. The Vector of Сonsciousness - the Triune Vector of absolute forms of existence of matter (limit states), the Vector of the Absolute Existential Field of the Universe, a polyvalent sense phenomenon of Ontological (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  28
    Leveraging Machine Learning for Real-Time Short-Term Snowfall Forecasting Using MultiSource Atmospheric and Terrain Data Integration.Gopinathan Vimal Raja - 2022 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 5 (8):1336-1339.
    This paper presents a machine learning-based framework for real-time short-term snowfall forecasting by integrating atmospheric and topographic data. The model uses real-time meteorological data such as temperature, humidity, and pressure, along with terrain data like elevation and land cover, to predict snowfall occurrence within a 12-hour forecast window. Random Forest (RF) and Support Vector Machine (SVM) models are employed to process these multi-source inputs, demonstrating a significant improvement in prediction accuracy over traditional methods. Experimental results show that the RF model (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  29. Heart Disease Prediction Using Machine Learning Techniques.D. Devendran - 2025 - Journal of Science Technology and Research (JSTAR) 6 (1):1-17.
    Heart disease remains one of the leading causes of mortality worldwide. Early prediction and diagnosis are critical in preventing severe outcomes and improving the quality of life for patients. This project focuses on developing a robust heart disease prediction system using machine learning techniques. By analyzing a comprehensive dataset consisting of various patient attributes such as age, sex, blood pressure, cholesterol levels, and other medical parameters, the system aims to predict the likelihood of a patient having heart disease. The project (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Adaptive SVM Techniques for Optimized Detection of Known and Novel Cyber Intrusions.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-405.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead.
    Download  
     
    Export citation  
     
    Bookmark  
  31. Aggregation for potentially infinite populations without continuity or completeness.David McCarthy, Kalle M. Mikkola & J. Teruji Thomas - 2019 - arXiv:1911.00872 [Econ.TH].
    We present an abstract social aggregation theorem. Society, and each individual, has a preorder that may be interpreted as expressing values or beliefs. The preorders are allowed to violate both completeness and continuity, and the population is allowed to be infinite. The preorders are only assumed to be represented by functions with values in partially ordered vector spaces, and whose product has convex range. This includes all preorders that satisfy strong independence. Any Pareto indifferent social preorder is then shown to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. The Profundity of absence.Varanasi Ramabrahmam - manuscript
    The significance and use of absence of a thing is highlighted as its presence. The role of absence in various disciplines of mathematics, physics, semi-conductor electronics, computing and cognitive sciences for ease in conceptualizing is discussed. The use of null set, null vector and null matrix are also presented.
    Download  
     
    Export citation  
     
    Bookmark  
  33. More Than Impossible: Negative and Complex Probabilities and Their Philosophical Interpretation.Vasil Penchev - 2020 - Logic and Philosophy of Mathematics eJournal (Elsevier: SSRN) 12 (16):1-7.
    A historical review and philosophical look at the introduction of “negative probability” as well as “complex probability” is suggested. The generalization of “probability” is forced by mathematical models in physical or technical disciplines. Initially, they are involved only as an auxiliary tool to complement mathematical models to the completeness to corresponding operations. Rewards, they acquire ontological status, especially in quantum mechanics and its formulation as a natural information theory as “quantum information” after the experimental confirmation the phenomena of “entanglement”. Philosophical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  59
    Breast Cancer Detection Using Machine Learning.Shifa A. M. Amrutha D. - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (11):19401-19406.
    Breast cancer is one of the leading causes of death among women worldwide. Early detection plays a crucial role in improving survival rates, and machine learning (ML) provides powerful tools for identifying cancerous tumors in medical imaging and diagnostic data. This paper explores various machine learning techniques used for breast cancer detection, with a particular focus on the Wisconsin Breast Cancer Dataset (WBCD). We evaluate several classification models, including Logistic Regression (LR), Support Vector Machine (SVM), k-Nearest Neighbors (k-NN), and Random (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Super Special Codes using Super Matrices.W. B. Vasantha Kandasamy, Florentin Smarandache & K. Ilanthenral - 2010 - Stockholm, Sweden: Svenska fysikarkivet.
    The new classes of super special codes are constructed in this book using the specially constructed super special vector spaces. These codes mainly use the super matrices. These codes can be realized as a special type of concatenated codes.
    Download  
     
    Export citation  
     
    Bookmark  
  36.  38
    Implementation of Movie Recommender System using Supervised Learning.Nandanwar Prakash Chandr - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 7 (2):4923-4927.
    Recommender systems have become essential in modern entertainment platforms, aiding users in discovering movies and TV shows tailored to their preferences. Traditional movie recommendation systems often rely on collaborative filtering or content-based methods. However, supervised learning offers an alternative approach by learning from labeled data, leveraging classification or regression models to predict user preferences. In this paper, we explore the implementation of a movie recommender system using supervised learning techniques, such as decision trees, random forests, and support vector machines. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. A BRIEF OUTLINE OF THE POSSIBLE BASICS OF COSMOLOGY IN THE 22nd CENTURY, AND WHAT IT MEANS FOR RELIGION.Rodney Bartlett - manuscript
    This article’s conclusion is that the theories of Einstein are generally correct and will still be relevant in the next century (there will be modifications necessary for development of quantum gravity). Those Einsteinian theories are Special Relativity, General Relativity, and the title of a paper he published in 1919 which asked if gravitation plays a role in the composition of elementary particles of matter. This paper was the bridge between General Relativity and the Unified Field Theory he sought during the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  61
    Integrated SVM-FFNN for Fraud Detection in Banking Financial Transactions (13th edition).Sugumar Dr R. - 2023 - Journal of Internet Services and Information Security 13 (4):12-25.
    Detecting fraud in financial transactions is crucial for guaranteeing the integrity and security of financial systems. This paper presents an integrated approach for detecting fraudulent activities that incorporates Support Vector Machines (SVM) and Feedforward Neural Networks (FFNN). The proposed methodology utilizes the strengths of SVM and FFNN to distinguish between classes and capture complex patterns and relationships, respectively. The SVM model functions as a feature extractor, supplying the FFNN with high-level representations as inputs. Through an exhaustive evaluation utilizing labeled financial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Archeology of Consciousness ↔ The Ontological Basification of Mathematics (Knowledge) ↔ The Nature of Consciousness. [REVIEW]Vladimir Rogozhin - manuscript
    A condensed summary of the adventures of ideas (1990-2020). Methodology of evolutionary-phenomenological constitution of Consciousness. Vector (BeVector) of Consciousness. Consciousness is a qualitative vector quantity. Vector of Consciousness as a synthesizing category, eidos-prototecton, intentional meta-observer. The development of the ideas of Pierre Teilhard de Chardin, Brentano, Husserl, Bergson, Florensky, Losev, Mamardashvili, Nalimov. Dialectic of Eidos and Logos. "Curve line" of the Consciousness Vector from space and time. The lower and upper sides of the "abyss of being". The existential tension of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. On mathematical constructions of time and relativity.Varanasi Ramabrahmam - manuscript
    The mathematical constructions, physical structure and manifestations of physical time are reviewed. The nature of insight and mathematics used to understand and deal with physical time associated with classical, quantum and cosmic processes is contemplated together with a comprehensive understanding of classical time. Scalar time (explicit time or quantitative time), vector time (implicit time or qualitative time), biological time, time of and in conscious awareness are discussed. The mathematical understanding of time in special and general theories of relativity is critically (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. Limbertwig.Parker Emmerson - 2023
    This work is a attempt to describe various braches of mathematics and the analogies betwee them. Namely: 1) Symbolic Analogic 2) Lateral Algebraic Expressions 3) Calculus of Infin- ity Tensors Energy Number Synthesis 4) Perturbations in Waves of Calculus Structures (Group Theory of Calculus) 5) Algorithmic Formation of Symbols (Encoding Algorithms) The analogies between each of the branches (and most certainly other branches) of mathematics form, ”logic vectors.” Forming vector statements of logical analogies and semantic connections between the di↵erentiated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. New principles foreign policy of Turkey at the beginning of the XXI century.Zumrud Melikova - 2022 - Metafizika 5 (4):159-173.
    In the 2000s, Turkey began to increase its efforts to transform from a model country to a central country by implementing an active foreign policy in its geopolitical region and neighboring regions. Starting from the 2000s, Turkey defined new principles guiding its foreign policy and implemented the strategies it followed. In addition to the basic foreign policy principles of Turkey in the regional and global arena, principles such as multi-vector diplomacy, proactive foreign policy, “zero problem” with neighboring countries, transition from (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Thoughts on Artificial Intelligence and the Origin of Life Resulting from General Relativity, with Neo-Darwinist Reference to Human Evolution and Mathematical Reference to Cosmology.Rodney Bartlett - manuscript
    When this article was first planned, writing was going to be exclusively about two things - the origin of life and human evolution. But it turned out to be out of the question for the author to restrict himself to these biological and anthropological topics. A proper understanding of them required answering questions like “What is the nature of the universe – the home of life – and how did it originate?”, “How can time travel be removed from fantasy and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Getting Causes from Powers, by Stephen Mumford and Rani Lill Anjum. [REVIEW]Luke Glynn - 2012 - Mind 121 (484):1099-1106.
    In this book, Mumford and Anjum advance a theory of causation based on a metaphysics of powers. The book is for the most part lucidly written, and contains some interesting contributions: in particular on the necessary connection between cause and effect and on the perceivability of the causal relation. I do, however, have reservations about some of the book’s central theses: in particular, that cause and effect are simultaneous, and that causes can fruitfully be represented as vectors.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  45. 12 Open Questions about Multidimensional Value.Daniel Muñoz - manuscript
    This is just an initial draft, which I hope to work on over the next year in light of comments. If you think I left off a big question, or left on a boring one, please email me! (Thanks to Brian Hedden and Harvey Lederman for some initial comments.).
    Download  
     
    Export citation  
     
    Bookmark  
  46. A powerful theory of causation.Stephen Mumford & Rani Anjum - 2010 - In Anna Marmodoro, The Metaphysics of Powers: Their Grounding and Their Manifestations. New York: Routledge. pp. 143--159.
    Hume thought that if you believed in powers, you believed in necessary connections in nature. He was then able to argue that there were none such because anything could follow anything else. But Hume wrong-footed his opponents. A power does not necessitate its manifestations: rather, it disposes towards them in a way that is less than necessary but more than purely contingent. -/- In this paper a dispositional theory of causation is offered. Causes dispose towards their effects and often produce (...)
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  47. An Introduction to Partition Logic.David Ellerman - 2014 - Logic Journal of the IGPL 22 (1):94-125.
    Classical logic is usually interpreted as the logic of propositions. But from Boole's original development up to modern categorical logic, there has always been the alternative interpretation of classical logic as the logic of subsets of any given (nonempty) universe set. Partitions on a universe set are dual to subsets of a universe set in the sense of the reverse-the-arrows category-theoretic duality--which is reflected in the duality between quotient objects and subobjects throughout algebra. Hence the idea arises of a dual (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  48. The Boundaries of Meaning: A Case Study in Neural Machine Translation.Yuri Balashov - 2022 - Inquiry: An Interdisciplinary Journal of Philosophy 66.
    The success of deep learning in natural language processing raises intriguing questions about the nature of linguistic meaning and ways in which it can be processed by natural and artificial systems. One such question has to do with subword segmentation algorithms widely employed in language modeling, machine translation, and other tasks since 2016. These algorithms often cut words into semantically opaque pieces, such as ‘period’, ‘on’, ‘t’, and ‘ist’ in ‘period|on|t|ist’. The system then represents the resulting segments in a dense (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):350-359.
    Cardiovascular diseases (CVD) represent a significant cause of morbidity and mortality worldwide, necessitating early detection for effective intervention. This research explores the application of machine learning (ML) algorithms in predicting cardiovascular diseases with enhanced accuracy by integrating optimization techniques. By leveraging data-driven approaches, ML models can analyze vast datasets, identifying patterns and risk factors that traditional methods might overlook. This study focuses on implementing various ML algorithms, such as Decision Trees, Random Forest, Support Vector Machines, and Neural Networks, optimized through (...)
    Download  
     
    Export citation  
     
    Bookmark   126 citations  
  50. SVM-Enhanced Intrusion Detection System for Effective Cyber Attack Identification and Mitigation.M. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):397-403.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark   39 citations  
1 — 50 / 240