Results for 'Vectors'

264 found
Order:
  1. Static and dynamic vector semantics for lambda calculus models of natural language.Mehrnoosh Sadrzadeh & Reinhard Muskens - 2018 - Journal of Language Modelling 6 (2):319-351.
    Vector models of language are based on the contextual aspects of language, the distributions of words and how they co-occur in text. Truth conditional models focus on the logical aspects of language, compositional properties of words and how they compose to form sentences. In the truth conditional approach, the denotation of a sentence determines its truth conditions, which can be taken to be a truth value, a set of possible worlds, a context change potential, or similar. In the vector models, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  2. (1 other version)Word vector embeddings hold social ontological relations capable of reflecting meaningful fairness assessments.Ahmed Izzidien - 2021 - AI and Society (March 2021):1-20.
    Programming artificial intelligence to make fairness assessments of texts through top-down rules, bottom-up training, or hybrid approaches, has presented the challenge of defining cross-cultural fairness. In this paper a simple method is presented which uses vectors to discover if a verb is unfair or fair. It uses already existing relational social ontologies inherent in Word Embeddings and thus requires no training. The plausibility of the approach rests on two premises. That individuals consider fair acts those that they would be (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Expanding the vector model for dispositionalist approaches to causation.Joseph A. Baltimore - 2019 - Synthese 196 (12):5083-5098.
    Neuron diagrams are heavily employed in academic discussions of causation. Stephen Mumford and Rani Lill Anjum, however, offer an alternative approach employing vector diagrams, which this paper attempts to develop further. I identify three ways in which dispositionalists have taken the activities of powers to be related: stimulation, mutual manifestation, and contribution combination. While Mumford and Anjum do provide resources for representing contribution combination, which might be sufficient for their particular brand of dispositionalism, I argue that those resources are not (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  4. Reality as a Vector in Hilbert Space.Sean M. Carroll - 2022 - In Valia Allori, Quantum Mechanics and Fundamentality: Naturalizing Quantum Theory between Scientific Realism and Ontological Indeterminacy. Cham: Springer. pp. 211-224.
    I defend the extremist position that the fundamental ontology of the world consists of a vector in Hilbert space evolving according to the Schrödinger equation. The laws of physics are determined solely by the energy eigenspectrum of the Hamiltonian. The structure of our observed world, including space and fields living within it, should arise as a higher-level emergent description. I sketch how this might come about, although much work remains to be done.
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  5. Vectors of epistemic insecurity.Emily Sullivan & Mark Alfano - 2020 - In Ian James Kidd, Quassim Cassam & Heather Battaly, Vice Epistemology. New York, NY: Routledge.
    Epistemologists have addressed a variety of modal epistemic standings, such as sensitivity, safety, risk, and epistemic virtue. These concepts mark out the ways that beliefs can fail to track the truth, articulate the conditions needed for knowledge, and indicate ways to become a better epistemic agent. However, it is our contention that current ways of carving up epistemic modality ignore the complexities that emerge when individuals are embedded within a community and listening to a variety of sources, some of whom (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  6. Spoils to the Vector - How to model causes if you are a realist about powers.Stephen Mumford & Rani Lill Anjum - 2011 - The Monist 94 (1):54-80.
    A standard way of representing causation is with neuron diagrams. This has become popular since the influential work of David Lewis. But it should not be assumed that such representations are metaphysically neutral and amenable to any theory of causation. On the contrary, this way of representing causation already makes several Humean assumptions about what causation is, and which suit Lewis’s programme of Humean Supervenience. An alternative of a vector diagram is better suited for a powers ontology. Causation should be (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  7. Context Update for Lambdas and Vectors.Reinhard Muskens & Mehrnoosh Sadrzadeh - 2016 - In Maxime Amblard, Philippe de Groote, Sylvain Pogodalla & Christian Rétoré, Logical Aspects of Computational Linguistics. Celebrating 20 Years of LACL (1996–2016). Berlin, Germany: Springer. pp. 247--254.
    Vector models of language are based on the contextual aspects of words and how they co-occur in text. Truth conditional models focus on the logical aspects of language, the denotations of phrases, and their compositional properties. In the latter approach the denotation of a sentence determines its truth conditions and can be taken to be a truth value, a set of possible worlds, a context change potential, or similar. In this short paper, we develop a vector semantics for language based (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  8. Impact of Variation in Vector Space on the performance of Machine and Deep Learning Models on an Out-of-Distribution malware attack Detection.Tosin Ige - forthcoming - Ieee Conference Proceeding.
    Several state-of-the-art machine and deep learning models in the mode of adversarial training, input transformation, self adaptive training, adversarial purification, zero-shot, one- shot, and few-shot meta learning had been proposed as a possible solution to an out-of-distribution problems by applying them to wide arrays of benchmark dataset across different research domains with varying degrees of performances, but investigating their performance on previously unseen out-of- distribution malware attack remains elusive. Having evaluated the poor performances of these state-of-the-art approaches in our previous (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Values for victims and vectors of disease.Elsa Kugelberg - 2022 - Journal of Medical Ethics 48 (9):641-642.
    John and Curran have convincingly shown that Scanlonian contractualism is a valuable resource for evaluating pandemic response policies, and that we should reject cost–benefit analysis in favour of a contractualist framework. However, they fail to consider the part of contractualism that Scanlon constructed precisely to deal with the question of when the state can restrict individuals from making choices that are harmful to themselves and others: the value of choice view. In doing so, they leave it open for opponents of (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  10. Follow the Math!: The Mathematics of Quantum Mechanics as the Mathematics of Set Partitions Linearized to (Hilbert) Vector Spaces.David Ellerman - 2022 - Foundations of Physics 52 (5):1-40.
    The purpose of this paper is to show that the mathematics of quantum mechanics is the mathematics of set partitions linearized to vector spaces, particularly in Hilbert spaces. That is, the math of QM is the Hilbert space version of the math to describe objective indefiniteness that at the set level is the math of partitions. The key analytical concepts are definiteness versus indefiniteness, distinctions versus indistinctions, and distinguishability versus indistinguishability. The key machinery to go from indefinite to more definite (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  11. The View from Vector Space: an account of conceptual geography.Joshua Stein - 2014 - Journal of Cognition and Neuroethics 2 (1):71-91.
    Download  
     
    Export citation  
     
    Bookmark  
  12. Adaptive Cybersecurity in the Digital Age: Emerging Threat Vectors and Next-Generation Defense Strategies.Harish Kumar Reddy Kommera - 2024 - International Journal for Research in Applied Science and Engineering Technology (Ijraset) 12 (9):558-564.
    This article examines the rapidly evolving landscape of cybersecurity, focusing on emerging threats and innovative defense mechanisms. We analyze four key threat vectors: Advanced Persistent Threats (APTs), ransomware, Internet of Things (IoT) vulnerabilities, and social engineering attacks. These threats pose significant risks to organizations, including data breaches, financial losses, and operational disruptions. In response, we explore cutting-edge defense mechanisms such as Artificial Intelligence and Machine Learning for threat detection, Zero Trust Architecture for access control, blockchain for data integrity, behavioral (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  13. Philosophical Toys as Vectors for Diagrammatic Creation: The Case of The Fragmented Orchestra.Claudia Mongini - 2013 - Teorie Vědy / Theory of Science 35 (2):289-313.
    The central topic of this essay consists into establishing a relation between two dimensions of formation: the conceptual process of creating philo- sophical toys - that is of reelaborating existing philosophical concepts, mainly deriving from the thought of Gilles Deleuze and Félix Guattari, in terms of their potential as ‘operative constructs' - and their parallel redeployment towards the specific problem of analyz- ing a recent transdisciplinary artwork. By means of this strategical shift, theory looses its character of explanation and illustration. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Representation of strongly independent preorders by vector-valued functions.David McCarthy, Kalle M. Mikkola & Teruji Thomas - 2017 - Mpra.
    We show that without assuming completeness or continuity, a strongly independent preorder on a possibly infinite dimensional convex set can always be given a vector-valued representation that naturally generalizes the standard expected utility representation. More precisely, it can be represented by a mixture-preserving function to a product of lexicographic function spaces.
    Download  
     
    Export citation  
     
    Bookmark  
  15.  69
    PAPR Reduction with Palindromic Codes Using Biasing Vector Technique in OFDM.M. V. S. Sairam & B. Prabhakara Rao - 2009 - International Journal of Electronics Engineering 1 (2):157-159.
    The main drawback of the OFDM system is high Peak to Average Power Ratio (PAPR), which calls for high power amplifiers in the system. This problem can be mitigated by using Block codes that are Non Transparent. We investigated the potential of the Palindromic codes in reducing the PAPR with the proposed biasing method. Using exhaustive search, a bias vector of n bits is chosen and added to all possible codewords (using modulo-2 addition) such that the maximum PAPR of all (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. On momentum operators given by Killing vectors whose integral curves are geodesics.Thomas Schürmann - 2022 - Physics 4 (4): 1440-1452.
    We consider momentum operators on intrinsically curved manifolds. Given that the momentum operators are Killing vector fields whose integral curves are geodesics, it is shown that the corresponding manifold is either flat, or otherwise of compact type with positive constant sectional curvature and dimension equal to 1, 3 or 7. Explicit representations of momentum operators and the associated Casimir element will be discussed for the 3-sphere. It will be verified that the structure constants of the underlying Lie algebra are proportional (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Cohesive Logic Vectors.Parker Emmerson - manuscript
    We have now mapped the set of analogies Ai,j to conceptual and mechanical meanings. This allows us to recognize how the Group Algebraic System G decomposes into five smaller subsystems, each of which relate to well-known symbolic systems. Furthermore, by recognizing the algorithmic transformations between these subsystems, we can apply each representing a single component of the Group Algebraic System G, or model how algorithms are used in mathematics, by mapping its meaning onto the corresponding transformation steps between the subsystems. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  26
    How Mosquitoes Domesticated Themselves—and Became Global Disease Vectors.Đỏ Sếu - 2025 - Xomchim.Com.
    A new genomic study by Lozada-Chávez et al. [2] sheds light on the remarkable evolutionary transformation of Aedes aegypti, the primary vector of yellow fever, dengue, Zika, and chikungunya [3-5].
    Download  
     
    Export citation  
     
    Bookmark  
  19. DSm Super Vector Space of Refined Labels.W. B. Vasantha Kandasamy & Florentin Smarandache - 2011 - Columbus, OH, USA: Zip Publishing.
    In this book authors for the first time introduce the notion of supermatrices of refined labels. Authors prove super row matrix of refined labels form a group under addition. However super row matrix of refined labels do not form a group under product; it only forms a semigroup under multiplication. In this book super column matrix of refined labels and m × n matrix of refined labels are introduced and studied.
    Download  
     
    Export citation  
     
    Bookmark  
  20. Dirac-Type Equations in a Gravitational Field, with Vector Wave Function.Mayeul Arminjon - 2008 - Foundations of Physics 38 (11):1020-1045.
    An analysis of the classical-quantum correspondence shows that it needs to identify a preferred class of coordinate systems, which defines a torsionless connection. One such class is that of the locally-geodesic systems, corresponding to the Levi-Civita connection. Another class, thus another connection, emerges if a preferred reference frame is available. From the classical Hamiltonian that rules geodesic motion, the correspondence yields two distinct Klein-Gordon equations and two distinct Dirac-type equations in a general metric, depending on the connection used. Each of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  21. OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By leveraging (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup 99) dataset (...)
    Download  
     
    Export citation  
     
    Bookmark   111 citations  
  23. Political Footprints: Political Discourse Analysis using Pre-Trained Word Vectors.Christophe Bruchansky - manuscript
    How political opinions are spread on social media has been the subject of many academic researches recently, and rightly so. Social platforms give researchers a unique opportunity to understand how public discourses are perceived, owned and instrumentalized by the general public. This paper is instead focussing on the political discourses themselves, and how a specific machine learning technique - vector space models (VSMs) -, can be used to make systematic and more objective discourse analysis. Political footprints are vector-based representation of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  24. How does a tautology say nothing?Ian Proops - 2024 - In Jimmy Plourde & Mathieu Marion, Wittgenstein’s Pre-Tractatus Writings: Interpretations and Reappraisals (History of Analytic Philosophy).
    In the Tractatus, Wittgenstein claims that tautologies 'say nothing'. Later he explains that when he had called tautologies 'senseless' he had had in mind the point that they possessed a zero quantity of sense. He holds that a tautology, insofar as it is the limit of a series of propositions of diminishing quantity of sense, constitutes a degenerate case of a proposition, somewhat as a point is a degenerate case of a circular conic section. But he also holds that a (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25.  75
    Harnessing Machine Learning to Predict Chronic Kidney Disease Risk.M. Arulselvan - 2025 - Journal of Science Technology and Research (JSTAR) 6 (1):1-16.
    Early detection of CKD is essential for timely intervention and improved patient outcomes. This project aims to develop a machine learning-based predictive model for diagnosing CKD at an early stage. By utilizing a range of clinical features such as age, blood pressure, blood sugar, and other relevant biomarkers, we employ machine learning algorithms, including Decision Trees, Random Forests, and Support Vector Machines (SVM), to predict the likelihood of a patient developing CKD.
    Download  
     
    Export citation  
     
    Bookmark  
  26. Protogeometer: Falling Into Future.Vladimir Rogozhin - 2014 - FQXi Essay Contest 2014.
    Universe silence … Why? TechnoSfera … Where does it move? BioSfera … Where is the ―non-return point? NooSfera … What to do? The deep mind looks for primordial senses of the ―LifeWorld(LebensWelt). Сonsciousness, matter, memory … Self-Consciousness… Сonsciousness is attracting senses vector magnitude, intentional effect of absolute complexity. The Vector of Сonsciousness - the Triune Vector of absolute forms of existence of matter (limit states), the Vector of the Absolute Existential Field of the Universe, a polyvalent sense phenomenon of Ontological (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  49
    Leveraging Machine Learning for Real-Time Short-Term Snowfall Forecasting Using MultiSource Atmospheric and Terrain Data Integration.Gopinathan Vimal Raja - 2022 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 5 (8):1336-1339.
    This paper presents a machine learning-based framework for real-time short-term snowfall forecasting by integrating atmospheric and topographic data. The model uses real-time meteorological data such as temperature, humidity, and pressure, along with terrain data like elevation and land cover, to predict snowfall occurrence within a 12-hour forecast window. Random Forest (RF) and Support Vector Machine (SVM) models are employed to process these multi-source inputs, demonstrating a significant improvement in prediction accuracy over traditional methods. Experimental results show that the RF model (...)
    Download  
     
    Export citation  
     
    Bookmark   14 citations  
  28. Heart Disease Prediction Using Machine Learning Techniques.D. Devendran - 2025 - Journal of Science Technology and Research (JSTAR) 6 (1):1-17.
    Heart disease remains one of the leading causes of mortality worldwide. Early prediction and diagnosis are critical in preventing severe outcomes and improving the quality of life for patients. This project focuses on developing a robust heart disease prediction system using machine learning techniques. By analyzing a comprehensive dataset consisting of various patient attributes such as age, sex, blood pressure, cholesterol levels, and other medical parameters, the system aims to predict the likelihood of a patient having heart disease. The project (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Adaptive SVM Techniques for Optimized Detection of Known and Novel Cyber Intrusions.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-405.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead.
    Download  
     
    Export citation  
     
    Bookmark  
  30. Aggregation for potentially infinite populations without continuity or completeness.David McCarthy, Kalle M. Mikkola & J. Teruji Thomas - 2019 - arXiv:1911.00872 [Econ.TH].
    We present an abstract social aggregation theorem. Society, and each individual, has a preorder that may be interpreted as expressing values or beliefs. The preorders are allowed to violate both completeness and continuity, and the population is allowed to be infinite. The preorders are only assumed to be represented by functions with values in partially ordered vector spaces, and whose product has convex range. This includes all preorders that satisfy strong independence. Any Pareto indifferent social preorder is then shown to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Mathematical Models for Unstable Quantum Systems and Gamow States.Manuel Gadella, Sebastian Fortin, Juan Pablo Jorge & Marcelo Losada - 2022 - Entropy 24 (6):804.
    We review some results in the theory of non-relativistic quantum unstable systems. We account for the most important definitions of quantum resonances that we identify with unstable quantum systems. Then, we recall the properties and construction of Gamow states as vectors in some extensions of Hilbert spaces, called Rigged Hilbert Spaces. Gamow states account for the purely exponential decaying part of a resonance; the experimental exponential decay for long periods of time physically characterizes a resonance. We briefly discuss one (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. More Than Impossible: Negative and Complex Probabilities and Their Philosophical Interpretation.Vasil Penchev - 2020 - Logic and Philosophy of Mathematics eJournal (Elsevier: SSRN) 12 (16):1-7.
    A historical review and philosophical look at the introduction of “negative probability” as well as “complex probability” is suggested. The generalization of “probability” is forced by mathematical models in physical or technical disciplines. Initially, they are involved only as an auxiliary tool to complement mathematical models to the completeness to corresponding operations. Rewards, they acquire ontological status, especially in quantum mechanics and its formulation as a natural information theory as “quantum information” after the experimental confirmation the phenomena of “entanglement”. Philosophical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  33. The Profundity of absence.Varanasi Ramabrahmam - manuscript
    The significance and use of absence of a thing is highlighted as its presence. The role of absence in various disciplines of mathematics, physics, semi-conductor electronics, computing and cognitive sciences for ease in conceptualizing is discussed. The use of null set, null vector and null matrix are also presented.
    Download  
     
    Export citation  
     
    Bookmark  
  34. A BRIEF OUTLINE OF THE POSSIBLE BASICS OF COSMOLOGY IN THE 22nd CENTURY, AND WHAT IT MEANS FOR RELIGION.Rodney Bartlett - manuscript
    This article’s conclusion is that the theories of Einstein are generally correct and will still be relevant in the next century (there will be modifications necessary for development of quantum gravity). Those Einsteinian theories are Special Relativity, General Relativity, and the title of a paper he published in 1919 which asked if gravitation plays a role in the composition of elementary particles of matter. This paper was the bridge between General Relativity and the Unified Field Theory he sought during the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Super Special Codes using Super Matrices.W. B. Vasantha Kandasamy, Florentin Smarandache & K. Ilanthenral - 2010 - Stockholm, Sweden: Svenska fysikarkivet.
    The new classes of super special codes are constructed in this book using the specially constructed super special vector spaces. These codes mainly use the super matrices. These codes can be realized as a special type of concatenated codes.
    Download  
     
    Export citation  
     
    Bookmark  
  36.  48
    Implementation of Movie Recommender System using Supervised Learning.Nandanwar Prakash Chandr - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 7 (2):4923-4927.
    Recommender systems have become essential in modern entertainment platforms, aiding users in discovering movies and TV shows tailored to their preferences. Traditional movie recommendation systems often rely on collaborative filtering or content-based methods. However, supervised learning offers an alternative approach by learning from labeled data, leveraging classification or regression models to predict user preferences. In this paper, we explore the implementation of a movie recommender system using supervised learning techniques, such as decision trees, random forests, and support vector machines. We (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37.  91
    Integrated SVM-FFNN for Fraud Detection in Banking Financial Transactions (13th edition).Sugumar Dr R. - 2023 - Journal of Internet Services and Information Security 13 (4):12-25.
    Detecting fraud in financial transactions is crucial for guaranteeing the integrity and security of financial systems. This paper presents an integrated approach for detecting fraudulent activities that incorporates Support Vector Machines (SVM) and Feedforward Neural Networks (FFNN). The proposed methodology utilizes the strengths of SVM and FFNN to distinguish between classes and capture complex patterns and relationships, respectively. The SVM model functions as a feature extractor, supplying the FFNN with high-level representations as inputs. Through an exhaustive evaluation utilizing labeled financial (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38.  91
    Breast Cancer Detection Using Machine Learning.Shifa A. M. Amrutha D. - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (11):19401-19406.
    Breast cancer is one of the leading causes of death among women worldwide. Early detection plays a crucial role in improving survival rates, and machine learning (ML) provides powerful tools for identifying cancerous tumors in medical imaging and diagnostic data. This paper explores various machine learning techniques used for breast cancer detection, with a particular focus on the Wisconsin Breast Cancer Dataset (WBCD). We evaluate several classification models, including Logistic Regression (LR), Support Vector Machine (SVM), k-Nearest Neighbors (k-NN), and Random (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39.  17
    Vegetative Drought Prediction.Amit V. Jadhav Prof Jayashri D. Bhoj, Ratri D. Jana, Nandita S. Jagtap, Anudnya M. Patil - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4):9293-9298.
    Drought is a critical environmental issue that affects agriculture, water resources, and ecosystems. Traditional drought monitoring methods rely on ground-based meteorological observations, which have limited spatial coverage and do not provide real-time assessments. This project aims to develop a Vegetative Drought Prediction System by integrating Vegetation Condition Index (VCI) data from the ISRO VEDAS VCI Dashboard, remote sensing indices (NDVI), meteorological drought indicators (SPI, PDSI), and machine learning algorithms (Random Forest, SVM, LSTM) to accurately detect and predict drought conditions. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Archeology of Consciousness ↔ The Ontological Basification of Mathematics (Knowledge) ↔ The Nature of Consciousness. [REVIEW]Vladimir Rogozhin - manuscript
    A condensed summary of the adventures of ideas (1990-2020). Methodology of evolutionary-phenomenological constitution of Consciousness. Vector (BeVector) of Consciousness. Consciousness is a qualitative vector quantity. Vector of Consciousness as a synthesizing category, eidos-prototecton, intentional meta-observer. The development of the ideas of Pierre Teilhard de Chardin, Brentano, Husserl, Bergson, Florensky, Losev, Mamardashvili, Nalimov. Dialectic of Eidos and Logos. "Curve line" of the Consciousness Vector from space and time. The lower and upper sides of the "abyss of being". The existential tension of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  41. New principles foreign policy of Turkey at the beginning of the XXI century.Zumrud Melikova - 2022 - Metafizika 5 (4):159-173.
    In the 2000s, Turkey began to increase its efforts to transform from a model country to a central country by implementing an active foreign policy in its geopolitical region and neighboring regions. Starting from the 2000s, Turkey defined new principles guiding its foreign policy and implemented the strategies it followed. In addition to the basic foreign policy principles of Turkey in the regional and global arena, principles such as multi-vector diplomacy, proactive foreign policy, “zero problem” with neighboring countries, transition from (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42. Getting Causes from Powers, by Stephen Mumford and Rani Lill Anjum. [REVIEW]Luke Glynn - 2012 - Mind 121 (484):1099-1106.
    In this book, Mumford and Anjum advance a theory of causation based on a metaphysics of powers. The book is for the most part lucidly written, and contains some interesting contributions: in particular on the necessary connection between cause and effect and on the perceivability of the causal relation. I do, however, have reservations about some of the book’s central theses: in particular, that cause and effect are simultaneous, and that causes can fruitfully be represented as vectors.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  43. Thoughts on Artificial Intelligence and the Origin of Life Resulting from General Relativity, with Neo-Darwinist Reference to Human Evolution and Mathematical Reference to Cosmology.Rodney Bartlett - manuscript
    When this article was first planned, writing was going to be exclusively about two things - the origin of life and human evolution. But it turned out to be out of the question for the author to restrict himself to these biological and anthropological topics. A proper understanding of them required answering questions like “What is the nature of the universe – the home of life – and how did it originate?”, “How can time travel be removed from fantasy and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. On mathematical constructions of time and relativity.Varanasi Ramabrahmam - manuscript
    The mathematical constructions, physical structure and manifestations of physical time are reviewed. The nature of insight and mathematics used to understand and deal with physical time associated with classical, quantum and cosmic processes is contemplated together with a comprehensive understanding of classical time. Scalar time (explicit time or quantitative time), vector time (implicit time or qualitative time), biological time, time of and in conscious awareness are discussed. The mathematical understanding of time in special and general theories of relativity is critically (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  45. Limbertwig.Parker Emmerson - 2023
    This work is a attempt to describe various braches of mathematics and the analogies betwee them. Namely: 1) Symbolic Analogic 2) Lateral Algebraic Expressions 3) Calculus of Infin- ity Tensors Energy Number Synthesis 4) Perturbations in Waves of Calculus Structures (Group Theory of Calculus) 5) Algorithmic Formation of Symbols (Encoding Algorithms) The analogies between each of the branches (and most certainly other branches) of mathematics form, ”logic vectors.” Forming vector statements of logical analogies and semantic connections between the di↵erentiated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. 12 Open Questions about Multidimensional Value.Daniel Muñoz - manuscript
    This is just an initial draft, which I hope to work on over the next year in light of comments. If you think I left off a big question, or left on a boring one, please email me! (Thanks to Brian Hedden and Harvey Lederman for some initial comments.).
    Download  
     
    Export citation  
     
    Bookmark  
  47. The Problem of Mental Action.Thomas Metzinger - 2017 - Philosophy and Predicitive Processing.
    In mental action there is no motor output to be controlled and no sensory input vector that could be manipulated by bodily movement. It is therefore unclear whether this specific target phenomenon can be accommodated under the predictive processing framework at all, or if the concept of “active inference” can be adapted to this highly relevant explanatory domain. This contribution puts the phenomenon of mental action into explicit focus by introducing a set of novel conceptual instruments and developing a first (...)
    Download  
     
    Export citation  
     
    Bookmark   27 citations  
  48. Utils and Shmutils.Jacob M. Nebel - 2021 - Ethics 131 (3):571-599.
    Matthew Adler's Measuring Social Welfare is an introduction to the social welfare function (SWF) methodology. This essay questions some ideas at the core of the SWF methodology having to do with the relation between the SWF and the measure of well-being. The facts about individual well-being do not single out a particular scale on which well-being must be measured. As with physical quantities, there are multiple scales that can be used to represent the same information about well-being; no one scale (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  49. Utilitarianism with and without expected utility.David McCarthy, Kalle Mikkola & Joaquin Teruji Thomas - 2020 - Journal of Mathematical Economics 87:77-113.
    We give two social aggregation theorems under conditions of risk, one for constant population cases, the other an extension to variable populations. Intra and interpersonal welfare comparisons are encoded in a single ‘individual preorder’. The theorems give axioms that uniquely determine a social preorder in terms of this individual preorder. The social preorders described by these theorems have features that may be considered characteristic of Harsanyi-style utilitarianism, such as indifference to ex ante and ex post equality. However, the theorems are (...)
    Download  
     
    Export citation  
     
    Bookmark   11 citations  
  50. Medical Image Classification with Machine Learning Classifier.Destiny Agboro - forthcoming - Journal of Computer Science.
    In contemporary healthcare, medical image categorization is essential for illness prediction, diagnosis, and therapy planning. The emergence of digital imaging technology has led to a significant increase in research into the use of machine learning (ML) techniques for the categorization of images in medical data. We provide a thorough summary of recent developments in this area in this review, using knowledge from the most recent research and cutting-edge methods.We begin by discussing the unique challenges and opportunities associated with medical image (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 264