Results for 'Recurrent model'

975 found
Order:
  1. The Recurrent Model of Bodily Spatial Phenomenology.Tony Cheng & Patrick Haggard - 2018 - Journal of Consciousness Studies 25 (3-4):55-70.
    In this paper, we introduce and defend the recurrent model for understanding bodily spatial phenomenology. While Longo, Azañón and Haggard (2010) propose a bottom-up model, Bermúdez (2017) emphasizes the top-down aspect of the information processing loop. We argue that both are only half of the story. Section 1 intro- duces what the issues are. Section 2 starts by explaining why the top- down, descending direction is necessary with the illustration from the ‘body-based tactile rescaling’ paradigm (de Vignemont, (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  2. Convergence, Continuity and Recurrence in Dynamic Epistemic Logic.Dominik Klein & Rasmus K. Rendsvig - 2017 - In Alexandru Baltag, Jeremy Seligman & Tomoyuki Yamada, Logic, Rationality, and Interaction (LORI 2017, Sapporo, Japan). Springer. pp. 108-122.
    The paper analyzes dynamic epistemic logic from a topological perspective. The main contribution consists of a framework in which dynamic epistemic logic satisfies the requirements for being a topological dynamical system thus interfacing discrete dynamic logics with continuous mappings of dynamical systems. The setting is based on a notion of logical convergence, demonstratively equivalent with convergence in Stone topology. Presented is a flexible, parametrized family of metrics inducing the latter, used as an analytical aid. We show maps induced by action (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  3. Recurrent Neural Network Based Speech emotion detection using Deep Learning.P. Pavithra - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):65-77.
    In modern days, person-computer communication systems have gradually penetrated our lives. One of the crucial technologies in person-computer communication systems, Speech Emotion Recognition (SER) technology, permits machines to correctly recognize emotions and greater understand users' intent and human-computer interlinkage. The main objective of the SER is to improve the human-machine interface. It is also used to observe a person's psychological condition by lie detectors. Automatic Speech Emotion Recognition(SER) is vital in the person-computer interface, but SER has challenges for accurate recognition. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Could a large language model be conscious?David J. Chalmers - 2023 - Boston Review 1.
    [This is an edited version of a keynote talk at the conference on Neural Information Processing Systems (NeurIPS) on November 28, 2022, with some minor additions and subtractions.] -/- There has recently been widespread discussion of whether large language models might be sentient or conscious. Should we take this idea seriously? I will break down the strongest reasons for and against. Given mainstream assumptions in the science of consciousness, there are significant obstacles to consciousness in current models: for example, their (...)
    Download  
     
    Export citation  
     
    Bookmark   40 citations  
  5. TV Time, Recurrence, and the Situation of the Spectator: An Approach via Stanley Cavell, Raúl Ruiz, and Ruiz’s Late Chilean Series Litoral.Byron Davies - 2023 - In Sandra Laugier David LaRocca, Television with Stanley Cavell in Mind. Exeter, UK: University of Exeter Press. pp. 191-221.
    This essay distinguishes some significant commonalities and differences between the film-philosophies of Chilean filmmaker Raúl Ruiz (especially in his book Poetics of Cinema) and U.S. philosopher Stanley Cavell. I argue that despite shared senses of the poetics of the film image and certain shared philosophical references, Ruiz and Cavell differed over their conceptions of the model spectator and their relations to autonomous films and worlds from which spectators are excluded (on Cavell's picture) versus fragments out of which the spectator (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. A Unified Cognitive Model of Visual Filling-In Based on an Emergic Network Architecture.David Pierre Leibovitz - 2013 - Dissertation, Carleton University
    The Emergic Cognitive Model (ECM) is a unified computational model of visual filling-in based on the Emergic Network architecture. The Emergic Network was designed to help realize systems undergoing continuous change. In this thesis, eight different filling-in phenomena are demonstrated under a regime of continuous eye movement (and under static eye conditions as well). -/- ECM indirectly demonstrates the power of unification inherent with Emergic Networks when cognition is decomposed according to finer-grained functions supporting change. These can interact (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Predicting urban Heat Island in European cities: A comparative study of GRU, DNN, and ANN models using urban morphological variables.Alireza Attarhay Tehrani, Omid Veisi, Kambiz Kia, Yasin Delavar, Sasan Bahrami, Saeideh Sobhaninia & Asma Mehan - 2024 - Urban Climate 56 (102061):1-27.
    Continued urbanization, along with anthropogenic global warming, has and will increase land surface temperature and air temperature anomalies in urban areas when compared to their rural surroundings, leading to Urban Heat Islands (UHI). UHI poses environmental and health risks, affecting both psychological and physiological aspects of human health. Thus, using a deep learning approach that considers morphological variables, this study predicts UHI intensity in 69 European cities from 2007 to 2021 and projects UHI impacts for 2050 and 2080. The research (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  8.  76
    AI-Driven Air Quality Forecasting Using Multi-Scale Feature Extraction and Recurrent Neural Networks.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):575-590.
    We investigate the application of Convolutional Neural Networks (CNN), Long Short-Term Memory (LSTM) networks, and a hybrid CNN-LSTM model for forecasting air pollution levels based on historical data. Our experimental setup uses real-world air quality datasets from multiple regions, containing measurements of pollutants like PM2.5, PM10, CO, NO2, and SO2, alongside meteorological data such as temperature, humidity, and wind speed. The models are trained, validated, and tested using a split dataset, and their accuracy is evaluated using performance metrics like (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. The Overman and the Arahant: Models of Human Perfection in Nietzsche and Buddhism.Soraj Hongladarom - 2011 - Asian Philosophy 21 (1):53-69.
    Two models of human perfection proposed by Nietzsche and the Buddha are investigated. Both the overman and the arahant need practice and individual effort as key to their realization, and they share roughly the same conception of the self as a construction. However, there are also a number of salient differences. Though realizing it to be constructed, the overman does proclaim himself through his assertion of the will to power. The realization of the true nature of the self does not (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  68
    Advanced Deep Learning Models for Proactive Malware Detection in Cybersecurity Systems.A. Manoj Prabharan - 2023 - Journal of Science Technology and Research (JSTAR) 5 (1):666-676.
    By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by training DL models to classify malicious and benign software with high precision. A robust experimental setup evaluates the framework using benchmark malware datasets, yielding a 96% detection accuracy and demonstrating resilience against adversarial attacks. Real-time analysis capabilities further (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  59
    Comparing LSTM, GRU, and CNN Approaches in Air Quality Prediction Models.A. Manoj Prabharan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):576-585.
    The results show that the hybrid CNN-LSTM model outperforms the individual models in terms of prediction accuracy and robustness, suggesting that combining convolutional layers with recurrent units is beneficial for capturing both spatial and temporal patterns in air quality data. This study demonstrates the potential of deep learning methods to offer real-time, accurate air quality forecasting systems, which can aid policymakers and urban planners in managing air pollution more effectively.
    Download  
     
    Export citation  
     
    Bookmark  
  12.  40
    Deep Learning-Based Speech Emotion Recognition.Sharma Karan - 2022 - International Journal of Multidisciplinary and Scientific Emerging Research 10 (2):715-718.
    Speech Emotion Recognition (SER) is an essential component in human-computer interaction, enabling systems to understand and respond to human emotions. Traditional emotion recognition methods often rely on handcrafted features, which can be limited in capturing the full complexity of emotional cues. In contrast, deep learning approaches, particularly convolutional neural networks (CNNs), recurrent neural networks (RNNs), and long short-term memory (LSTM) networks, offer more robust solutions by automatically learning hierarchical features from raw audio data. This paper reviews recent advancements in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  88
    Speech Emotion Recognition Using Machine Learning.Abhiram Pajjuri - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (5):1-15.
    . Speech Emotion Recognition (SER) is an interdisciplinary field that leverages signal processing and machine learning techniques to identify and classify emotions conveyed through speech. In recent years, SER has gained significant attention due to its potential applications in human-computer interaction, healthcare, education, and customer service. Emotions such as happiness, anger, sadness, fear, surprise, and disgust can be inferred from various acoustic features including pitch, intensity, speech rate, and spectral characteristics. However, accurately recognizing emotions from speech is challenging due to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. The Elusive Experience of Agency.Robert E. Briscoe - 2011 - Topics in Cognitive Science 3 (2):262-267.
    I here present some doubts about whether Mandik’s (2010) proposed intermediacy and recurrence constraints are necessary and sufficient for agentive experience. I also argue that in order to vindicate the conclusion that agentive experience is an exclusively perceptual phenomenon (Prinz, 2007), it is not enough to show that the predictions produced by forward models of planned motor actions are conveyed by mock sensory signals. Rather, it must also be shown that the outputs of “comparator” mechanisms that compare these predictions against (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15.  84
    Epistemic Perpetuum Mobile Scams.Nadisha-Marie Aliman - manuscript
    In the presently unfolding deepfake era, recurrent inflationary algorithmic superintelligence (ASI) achievement claims degenerated from being a mere reflection of an exaggerated but candid initial enthusiasm to becoming a convenient tool for misdirection facilitating epistemic perpetuum mobile (EPM) scams. This transdisciplinarily conceived paper compactly analyzes the underlying ASI definition avoidance problem which emerged from interactions between three major epistemic trends in the ASI debate: boomerism, doomerism and pragmatism. Via taking a fourth external perspective entertained by a fictive entity called (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  16. Understanding the Higher-Order Approach to Consciousness.Richard Brown, Hakwan Lau & Joseph E. LeDoux - 2019 - Trends in Cognitive Sciences 23 (9):754-768.
    Critics have often misunderstood the higher-order theory (HOT) of consciousness. Here we clarify its position on several issues, and distinguish it from other views such as the global The higher-order theory (HOT) of consciousness has often been misunderstood by critics. Here we clarify its position on several issues, and distinguish it from other views such as the global workspace theory (GWT) and early sensory models (e.g. first-order local recurrency theories). For example, HOT has been criticized for over-intellectualizing consciousness. We show (...)
    Download  
     
    Export citation  
     
    Bookmark   54 citations  
  17. Medical Image Classification with Machine Learning Classifier.Destiny Agboro - forthcoming - Journal of Computer Science.
    In contemporary healthcare, medical image categorization is essential for illness prediction, diagnosis, and therapy planning. The emergence of digital imaging technology has led to a significant increase in research into the use of machine learning (ML) techniques for the categorization of images in medical data. We provide a thorough summary of recent developments in this area in this review, using knowledge from the most recent research and cutting-edge methods.We begin by discussing the unique challenges and opportunities associated with medical image (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  18. How Archaeological Evidence Bites Back: Strategies for Putting Old Data to Work in New Ways.Alison Wylie - 2017 - Science, Technology, and Human Values 42 (2):203-225.
    Archaeological data are shadowy in a number of senses. Not only are they notoriously fragmentary but the conceptual and technical scaffolding on which archaeologists rely to constitute these data as evidence can be as constraining as it is enabling. A recurrent theme in internal archaeological debate is that reliance on sedimented layers of interpretative scaffolding carries the risk that “preunderstandings” configure what archaeologists recognize and record as primary data, and how they interpret it as evidence. The selective and destructive (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  19. How WEIRD is Cognitive Archaeology? Engaging with the Challenge of Cultural Variation and Sample Diversity.Anton Killin & Ross Pain - 2023 - Review of Philosophy and Psychology 14 (2):539-563.
    In their landmark 2010 paper, “The weirdest people in the world?”, Henrich, Heine, and Norenzayan outlined a serious methodological problem for the psychological and behavioural sciences. Most of the studies produced in the field use people from Western, Educated, Industrialised, Rich and Democratic (WEIRD) societies, yet inferences are often drawn to the species as a whole. In drawing such inferences, researchers implicitly assume that either there is little variation across human populations, or that WEIRD populations are generally representative of the (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  20. Heraclitus against the Naïve Paratactic Metaphysics of Mere Things.Keith Begley - 2021 - Ancient Philosophy Today 3 (1):74-97.
    This article considers an interpretative model for the study of Heraclitus, which was first put forward by Alexander Mourelatos in 1973, and draws upon a related model put forward by Julius Moravcsik beginning in 1983. I further develop this combined model and provide a motivation for an interpretation of Heraclitus. This is also of interest for modern metaphysics due to the recurrence of structurally similar problems, including the ‘colour exclusion’ problem that was faced by Wittgenstein. Further, I (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  21.  91
    Empowering Cybersecurity with Intelligent Malware Detection Using Deep Learning Techniques.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-665.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  22. Scientizing the humanities.Barbara Herrnstein Smith - 2016 - Common Knowledge 22 (3):353-372.
    Advocates of literary Darwinism, cognitive cultural studies, neuroaesthetics, digital humanities, and other such hybrid fields now seek explicitly to make the aims and methods of one or another humanities discipline approximate more closely the aims and methods of science, and at their most visionary, they urge as well the overall integration of the humanities and natural sciences. This essay indicates some major considerations—historical, conceptual, and pragmatic—that may be useful for assessing these efforts and predicting their future. Arguments promoting integration often (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  23. Training in compensatory strategies enhances rapport in interactions involving people with Möebius Syndrome.John Michael, Kathleen Bogart, Kristian Tylen, Joel Krueger, Morten Bech, John R. Ostergaard & Riccardo Fusaroli - 2015 - Frontiers in Neurology 6 (213):1-11.
    In the exploratory study reported here, we tested the efficacy of an intervention designed to train teenagers with Möbius syndrome (MS) to increase the use of alternative communication strategies (e.g., gestures) to compensate for their lack of facial expressivity. Specifically, we expected the intervention to increase the level of rapport experienced in social interactions by our participants. In addition, we aimed to identify the mechanisms responsible for any such increase in rapport. In the study, five teenagers with MS interacted with (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  24. J N MOHANTY (Jiten/Jitendranath) In Memoriam.David Woodruff- Smith & Purushottama Bilimoria - 2023 - Https://Www.Apaonline.Org/Page/Memorial_Minutes2023.
    J. N. (Jitendra Nath) Mohanty (1928–2023). -/- Professor J. N. Mohanty has characterized his life and philosophy as being both “inside” and “outside” East and West, i.e., inside and outside traditions of India and those of the West, living in both India and United States: geographically, culturally, and philosophically; while also traveling the world: Melbourne to Moscow. Most of his academic time was spent teaching at the University of Oklahoma, The New School Graduate Faculty, and finally Temple University. Yet his (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. Crime Prediction Using Machine Learning and Deep Learning.S. Venkatesh - 2024 - Journal of Science Technology and Research (JSTAR) 6 (1):1-13.
    Crime prediction has emerged as a critical application of machine learning (ML) and deep learning (DL) techniques, aimed at assisting law enforcement agencies in reducing criminal activities and improving public safety. This project focuses on developing a robust crime prediction system that leverages the power of both ML and DL algorithms to analyze historical crime data and predict potential future incidents. By integrating a combination of classification and clustering techniques, our system identifies crime-prone areas, trends, and patterns. Key parameters such (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. Deepfake Detection Using LSTM and RESNEXT50.Nikhil Cilivery - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (8):1-15.
    As the prevalence of deepfake videos continues to escalate, there is an urgent need for robust and efficient detection methods to mitigate the potential consequences of misinformation and manipulation. This abstract explores the application of Long Short-Term Memory (LSTM) networks in the realm of deepfake video detection. LSTM, a type of recurrent neural network (RNN), has proven to be adept at capturing temporal dependencies in sequential data, making it a promising candidate for analysing the dynamic nature of videos. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Wittgenstein and the Cognitive Science of Religion: Interpreting Human Nature and the Mind.Robert Vinten (ed.) - 2023 - London: Bloomsbury Academic.
    Advancing our understanding of one of the most influential 20th-century philosophers, Robert Vinten brings together an international line up of scholars to consider the relevance of Ludwig Wittgenstein's ideas to the cognitive science of religion. Wittgenstein's claims ranged from the rejection of the idea that psychology is a 'young science' in comparison to physics to challenges to scientistic and intellectualist accounts of religion in the work of past anthropologists. Chapters explore whether these remarks about psychology and religion undermine the frameworks (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  55
    Intelligent Malware Detection Empowered by Deep Learning for Cybersecurity Enhancement.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-635.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Principles of Monadic Homeostasis (a quasi-principled view on immortality).Herapteon . - manuscript
    Following the inferences of my previous work "Monadic Conditionality", this work further investigates the nature of being-for-itself's transformations and what happens with any being-for-itself in between eternal returns, completing a quasi-principled view on immortality (suggested and started in my previous work). Through mathematical reasoning, this model infers that infinitesimal differences between successive event lines grow gradually across subspaces, until reaching the state of eternal return; the cycle repeats, resulting in each event line having its own eternal return, preserving monadic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  95
    A Novel Deep Learning-Based Framework for Intelligent Malware Detection in Cybersecurity.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):666-669.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31.  68
    Revolutionizing Cybersecurity: Intelligent Malware Detection Through Deep Neural Networks.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-666.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Deep Learning-Based Speech and Vision Synthesis to Improve Phishing Attack Detection through a Multi-layer Adaptive Framework.Tosin ige, Christopher Kiekintveld & Aritran Piplai - forthcoming - Proceedings of the IEEE:8.
    The ever-evolving ways attacker continues to improve their phishing techniques to bypass existing state-of-the-art phishing detection methods pose a mountain of challenges to researchers in both industry and academia research due to the inability of current approaches to detect complex phishing attack. Thus, current anti-phishing methods remain vulnerable to complex phishing because of the increasingly sophistication tactics adopted by attacker coupled with the rate at which new tactics are being developed to evade detection. In this research, we proposed an adaptable (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  33. MACHINE LEARNING IMPROVED ADVANCED DIAGNOSIS OF SOFT TISSUES TUMORS.M. Bavadharani - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):112-123.
    Delicate Tissue Tumors (STT) are a type of sarcoma found in tissues that interface, backing, and encompass body structures. Due to their shallow recurrence in the body and their extraordinary variety, they seem, by all accounts, to be heterogeneous when seen through Magnetic Resonance Imaging (MRI). They are effortlessly mistaken for different infections, for example, fibro adenoma mammae, lymphadenopathy, and struma nodosa, and these indicative blunders have an extensive unfavorable impact on the clinical treatment cycle of patients. Analysts have proposed (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34.  75
    An investigation into the performances of the Current state-of-the-art Naive Bayes, Non-Bayesian and Deep Learning Based Classifier for Phishing Detection: A Survey. [REVIEW]Tosin Ige - manuscript
    Phishing is one of the most effective ways in which cybercriminals get sensitive details such as credentials for online banking, digital wallets, state secrets, and many more from potential victims. They do this by spamming users with malicious URLs with the sole purpose of tricking them into divulging sensitive information which is later used for various cybercrimes. In this research, we did a comprehensive review of current state-of-the-art machine learning and deep learning phishing detection techniques to expose their vulnerabilities and (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  35. Return of Power: Theory of a Cosmic Bridge to the Dialectical Overhuman.Hermes Varini - 2018 - In 6th Philosophy and Culture of the Information Society International Conference, Saint-Petersburg State University of Aerospace Instrumentation (SUAI), November 16-17, 2018. Saint-Petersburg, Russia: Saint-Petersburg State University of Aerospace Instrumentation (SUAI). pp. 23.
    Propounded in relation to a peculiar mode in the view of an oscillating or cyclic universe, the concept of Return of Power, or of ontic recurrence as further increase in ontic Power signifies the determination of the existing entity according to its own selective recurrence as dialectically exceeding a previous status. Based thus upon the assumption that the actual ontological existence of the entity lies in its own potentiated recurrence (for it is maintained that only what is able to return (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Methods and Applications of Non-Linear Analysis in Neurology and Psycho-physiology.Elio Conte - 2012 - Journal of Consciousness Exploration and Research 1 (9):1070-1138.
    In the light of the results obtained during the last two decades in analysis of signals by time series, it has become evident that the tools of non linear dynamics have their elective role of application in biological, and, in particular, in neuro-physiological and psycho-physiological studies. The basic concept in non linear analysis of experimental time series is that one of recurrence whose conceptual counterpart is represented from variedness and variability that are the foundations of complexity in dynamic processes. Thus, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Classical Probability, Shakespearean Sonnets, and Multiverse Hypotheses.James Goetz - 2006 - International Society for Complexity, Information, and Design Archive 2006.
    We evaluate classical probability in relation to the random generation of a Shakespearean sonnet by a typing monkey and the random generation of universes in a World Ensemble based on various multiverse models involving eternal inflation. We calculate that it would take a monkey roughly 10^942 years to type a Shakespearean sonnet, which pushes the scenario into a World Ensemble. The evaluation of a World Ensemble based on various models of eternal inflation suggests that there is no middle ground between (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  38. Coherence and correspondence in the network dynamics of belief suites.Patrick Grim, Andrew Modell, Nicholas Breslin, Jasmine Mcnenny, Irina Mondescu, Kyle Finnegan, Robert Olsen, Chanyu An & Alexander Fedder - 2017 - Episteme 14 (2):233-253.
    Coherence and correspondence are classical contenders as theories of truth. In this paper we examine them instead as interacting factors in the dynamics of belief across epistemic networks. We construct an agent-based model of network contact in which agents are characterized not in terms of single beliefs but in terms of internal belief suites. Individuals update elements of their belief suites on input from other agents in order both to maximize internal belief coherence and to incorporate ‘trickled in’ elements (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Free Will Skepticism and Criminal Behavior: A Public Health-Quarantine Model.Gregg D. Caruso - 2016 - Southwest Philosophy Review 32 (1):25-48.
    One of the most frequently voiced criticisms of free will skepticism is that it is unable to adequately deal with criminal behavior and that the responses it would permit as justified are insufficient for acceptable social policy. This concern is fueled by two factors. The first is that one of the most prominent justifications for punishing criminals, retributivism, is incompatible with free will skepticism. The second concern is that alternative justifications that are not ruled out by the skeptical view per (...)
    Download  
     
    Export citation  
     
    Bookmark   41 citations  
  40. What do we want from Explainable Artificial Intelligence (XAI)? – A stakeholder perspective on XAI and a conceptual model guiding interdisciplinary XAI research.Markus Langer, Daniel Oster, Timo Speith, Lena Kästner, Kevin Baum, Holger Hermanns, Eva Schmidt & Andreas Sesing - 2021 - Artificial Intelligence 296 (C):103473.
    Previous research in Explainable Artificial Intelligence (XAI) suggests that a main aim of explainability approaches is to satisfy specific interests, goals, expectations, needs, and demands regarding artificial systems (we call these “stakeholders' desiderata”) in a variety of contexts. However, the literature on XAI is vast, spreads out across multiple largely disconnected disciplines, and it often remains unclear how explainability approaches are supposed to achieve the goal of satisfying stakeholders' desiderata. This paper discusses the main classes of stakeholders calling for explainability (...)
    Download  
     
    Export citation  
     
    Bookmark   25 citations  
  41. Intention as a Model for Belief.Richard Holton - 2014 - In Manuel Vargas & Gideon Yaffe, Rational and Social Agency: The Philosophy of Michael Bratman. New York, NY: Oxford University Press.
    This paper argues that a popular account of intentions can be extended to beliefs. Beliefs are stable all-out states that allow for planning and coordination in a way that is tractable for cognitively limited creatures like human beings. Scepticism is expressed that there is really anything like credences as standardly understood.
    Download  
     
    Export citation  
     
    Bookmark   63 citations  
  42.  51
    A hybrid modified artificial bee colony (ABC)-based artificial _neural network model for power management controller and hybrid energy system for energy source integration.Rajendran Sugumar - 2023 - Engineering Proceedings 59 (35):1-12.
    Small MGS (microgrid systems) are capable of decreasing energy losses. Long-distance power transmission lines are constructed by integrating distributed power sources with energy storage subsystems, which is the current trend in the development of RES (renewable energy sources). Although energies produced by RES do not cause pollution, they are stochastic and hence challenging to manage. This disadvantage makes high penetration of RES risky for the stability, dependability, and power quality of main electrical grids. The energies obtained from RES must thus (...)
    Download  
     
    Export citation  
     
    Bookmark   43 citations  
  43. Eternal Recurrence and Nihilism: Adding Weight to the Unbearable Lightness of Action.Nadeem J. Z. Hussain - manuscript
    (Version 2.4) I have argued elsewhere for ascribing an error theory about all normative and evaluative judgements to Nietzsche. Such a nihilism brings with it a puzzle: how could we—or at least the select few of us being addressed by Nietzsche—continue in the face of this nihilism? This is a philosophical puzzle and so, defeasibly, an interpretive puzzle. If there is no theory it would make sense for Nietzsche to have about how the select few could go on, then this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Recurrent Processing Theory (RPT) v. Global Neuronal Workspace Theory (GNWT). A comment on Pitts et al 2018.Carlos Montemayor & Harry Haladjian - 2019 - Philosophical Transactions of the Royal Society B 374.
    The relationship between attention and consciousness is one that is crucial for understanding perception and different types of conscious experience, and we commend this analysis of the topic by Pitts, Lutsyshyna, and Hillyard (2018). We have also examined this relationship closely (e.g., Montemayor & Haladjian, 2015) and would like to point out a few potential contradictions in the Pitts et al. paper that require clarification, particularly in the attempt to reconcile aspects of recurrent processing theory (RPT) with global neuronal (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. A trilemma for the lexical utility model of the precautionary principle.H. Orri Stefánsson - 2024 - Philosophical Studies 181 (12):3271-3287.
    Bartha and DesRoches (Synthese 199(3–4):8701–8740, 2021) and Steel and Bartha (Risk Analysis 43(2):260–268, 2023) argue that we should understand the precautionary principle as the injunction to maximise lexical utilities. They show that the lexical utility model has important pragmatic advantages. Moreover, the model has the theoretical advantage of satisfying all axioms of expected utility theory except continuity. In this paper I raise a trilemma for any attempt at modelling the precautionary principle with lexical utilities: it permits choice cycles (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  46. From Homo-economicus to Homo-virtus: A System-Theoretic Model for Raising Moral Self-Awareness.Julian Friedland & Benjamin M. Cole - 2019 - Journal of Business Ethics 155 (1):191-205.
    There is growing concern that a global economic system fueled predominately by financial incentives may not maximize human flourishing and social welfare externalities. If so, this presents a challenge of how to get economic actors to adopt a more virtuous motivational mindset. Relying on historical, psychological, and philosophical research, we show how such a mindset can be instilled. First, we demonstrate that historically, financial self-interest has never in fact been the only guiding motive behind free markets, but that markets themselves (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  47. The causal mechanical model of explanation.James Woodward - 1989 - Minnesota Studies in the Philosophy of Science 13:359-83.
    Download  
     
    Export citation  
     
    Bookmark   43 citations  
  48. Closure of Constraints as a Theoretical Model.Campbell Rider - forthcoming - Philosophy of Science.
    In this paper I offer a model-theoretic interpretation of Autonomy Theory as defended by Moreno, Mossio, Montévil and Bich. I address accusations that Autonomy Theory is excessively liberal, such as those made by Garson (2017), arguing that these misunderstand the role of strategic abstractions and generalizations in theory construction. Conceiving of closure of constraints as a model-building effort that emphasizes generality – in the spirit of Levins (1966) – also clarifies its potential for application in empirical contexts.
    Download  
     
    Export citation  
     
    Bookmark  
  49. The Sanctifying Work of the Holy Spirit: Revisiting Alston’s Interpersonal Model.Steven L. Porter & Brandon Rickabaugh - 2018 - Journal of Analytic Theology 6:112-130.
    Of the various loci of systematic theology that call for sustained philosophical investigation, the doctrine of sanctification stands out as a prime candidate. In response to that call, William Alston developed three models of the sanctifying work of the Holy Spirit: the fiat model, the interpersonal model, and the sharing model. In response to Alston’s argument for the sharing model, this paper offers grounds for a reconsideration of the interpersonal model. We close with a discussion (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  50. Magnetized Memories: Analogies and Templates in Model Transfer.Tarja Knuuttila & Andrea Loettgers - 2020 - In S. Holm & M. Serban, Biology: Living Machines? Routledge. pp. 123-140.
    One striking feature of the contemporary modeling practice is its interdisciplinarity: the same function forms and equations, and mathematical and computational methods are being transferred across disciplinary boundaries. Within philosophy of science this interdisciplinary dimension of modeling has been addressed by both analogy and template-based approaches that have proceeded separately from each other. We argue that a more fully-blown account of model transfer needs both perspectives. We examine analogical reasoning and template application through a detailed case study on the (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
1 — 50 / 975