Results for 'Overfitting'

10 found
Order:
  1. Moral Overfitting.Audrey Powers - forthcoming - Philosophical Studies.
    This is a paper about model-building and overfitting in normative ethics. Overfitting is recognized as a methodological error in modeling in the philosophy of science and scientific practice, but this concern has not been brought to bear on the practice of normative ethics. I first argue that moral inquiry shares similarities with scientific inquiry in that both may productively rely on model-building, and, as such, overfitting worries should apply to both fields. I then offer a diagnosis of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Hyperintensionality and Overfitting.Francesco Berto - 2024 - Synthese 203:117.
    A hyperintensional epistemic logic would take the contents which can be known or believed as more fine-grained than sets of possible worlds. I consider one objection to the idea: Williamson’s Objection from Overfitting. I propose a hyperintensional account of propositions as sets of worlds enriched with topics: what those propositions, and so the attitudes having them as contents, are about. I show that the account captures the conditions under which sentences express the same content; that it can be pervasively (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Civic Identity Consisting of Moral and Political Identity among Young Adults.Hyemin Han & Kelsie J. Dawson - forthcoming - Personality and Individual Differences.
    In the present study, we tested whether civic identity consisting of moral and political identity via the bifactor model of civic identity with the Stanford Civic Purpose dataset. Previous research in youth development proposed that civic identity consists of two closely related identity constructs, i.e., moral and political identity. Given the bifactor model in factor analysis assumes the presence of both the general and specific factors, we hypothesized that the bifactor model would better fit the data than conventional alternative models. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. A Theory of Predictive Dissonance: Predictive Processing Presents a New Take on Cognitive Dissonance.Roope Oskari Kaaronen - 2018 - Frontiers in Psychology 9.
    This article is a comparative study between predictive processing (PP, or predictive coding) and cognitive dissonance (CD) theory. The theory of CD, one of the most influential and extensively studied theories in social psychology, is shown to be highly compatible with recent developments in PP. This is particularly evident in the notion that both theories deal with strategies to reduce perceived error signals. However, reasons exist to update the theory of CD to one of “predictive dissonance.” First, the hierarchical PP (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  5. Knowledge, Noise, and Curve-Fitting: A methodological argument for JTB?Jonathan M. Weinberg - 2017 - In Rodrigo Borges, Claudio de Almeida & Peter David Klein (eds.), Explaining Knowledge: New Essays on the Gettier Problem. Oxford, United Kingdom: Oxford University Press.
    The developing body of empirical work on the "Gettier effect" indicates that, in general, the presence of a Gettier-type structure in a case makes participants less likely to attribute knowledge in that case. But is that a sufficient reason to diverge from a JTB theory of knowledge? I argue that considerations of good model selection, and worries about noise and overfitting, should lead us to consider that a live, open question. The Gettier effect is perhaps so transient, and so (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. Smoke Detectors Using ANN.Marwan R. M. Al-Rayes & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):1-9.
    Abstract: Smoke detectors are critical devices for early fire detection and life-saving interventions. This research paper explores the application of Artificial Neural Networks (ANNs) in smoke detection systems. The study aims to develop a robust and accurate smoke detection model using ANNs. Surprisingly, the results indicate a 100% accuracy rate, suggesting promising potential for ANNs in enhancing smoke detection technology. However, this paper acknowledges the need for a comprehensive evaluation beyond accuracy. It discusses potential challenges, such as overfitting, dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  7. Latent Structural Analysis for Measures of Character Strengths: Achieving Adequate Fit.Hyemin Han & Robert E. McGrath - forthcoming - Current Psychology.
    The VIA Classification of Strengths and Virtues is the most commonly used model of positive personality. In this study, we used two methods of model modification to develop models for two measures of the character strengths, the VIA Inventory of Strengths-Revised and the Global Assessment of Character Strengths. The first method consisted of freeing residual covariances based on modification indices until good fit was achieved. The second was residual network modeling (RNM), which frees residual partial correlations while minimizing a function (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  8.  54
    Exploiting the In-Distribution Embedding Space with Deep Learning and Bayesian inference for Detection and Classification of an Out-of-Distribution Malware (Extended Abstract).Tosin ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Aaai Conferenece Proceeding.
    Current state-of-the-art out-of-distribution algorithm does not address the variation in dynamic and static behavior between malware variants from the same family as evidence in their poor performance against an out-of-distribution malware attack. We aims to address this limitation by: 1) exploitation of the in-dimensional embedding space between variants from the same malware family to account for all variations 2) exploitation of the inter-dimensional space between different malware family 3) building a deep learning-based model with a shallow neural network with maximum (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  51
    Exploiting the In-Distribution Embedding Space with Deep Learning and Bayesian inference for Detection and Classification of an Out-of-Distribution Malware (Extended Abstract).Tosin Ige - forthcoming - Aaai Conference.
    Current state-of-the-art out-of-distribution algorithm does not address the variation in dynamic and static behavior between malware variants from the same family as evidence in their poor performance against an out-of-distribution malware attack. We aims to address this limitation by: 1) exploitation of the in-dimensional embedding space between variants from the same malware family to account for all variations 2) exploitation of the inter-dimensional space between different malware family 3) building a deep learning-based model with a shallow neural network with maximum (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Fine-tuning MobileNetV2 for Sea Animal Classification.Mohammed Marouf & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (4):44-50.
    Abstract: Classifying sea animals is an important problem in marine biology and ecology as it enables the accurate identification and monitoring of species populations, which is crucial for understanding and protecting marine ecosystems. This paper addresses the problem of classifying 19 different sea animals using convolutional neural networks (CNNs). The proposed solution is to use a pretrained MobileNetV2 model, which is a lightweight and efficient CNN architecture, and fine-tune it on a dataset of sea animals. The results of the study (...)
    Download  
     
    Export citation  
     
    Bookmark