• Study Resource
  • Explore
    • Arts & Humanities
    • Business
    • Engineering & Technology
    • Foreign Language
    • History
    • Math
    • Science
    • Social Science

    Top subcategories

    • Advanced Math
    • Algebra
    • Basic Math
    • Calculus
    • Geometry
    • Linear Algebra
    • Pre-Algebra
    • Pre-Calculus
    • Statistics And Probability
    • Trigonometry
    • other →

    Top subcategories

    • Astronomy
    • Astrophysics
    • Biology
    • Chemistry
    • Earth Science
    • Environmental Science
    • Health Science
    • Physics
    • other →

    Top subcategories

    • Anthropology
    • Law
    • Political Science
    • Psychology
    • Sociology
    • other →

    Top subcategories

    • Accounting
    • Economics
    • Finance
    • Management
    • other →

    Top subcategories

    • Aerospace Engineering
    • Bioengineering
    • Chemical Engineering
    • Civil Engineering
    • Computer Science
    • Electrical Engineering
    • Industrial Engineering
    • Mechanical Engineering
    • Web Design
    • other →

    Top subcategories

    • Architecture
    • Communications
    • English
    • Gender Studies
    • Music
    • Performing Arts
    • Philosophy
    • Religious Studies
    • Writing
    • other →

    Top subcategories

    • Ancient History
    • European History
    • US History
    • World History
    • other →

    Top subcategories

    • Croatian
    • Czech
    • Finnish
    • Greek
    • Hindi
    • Japanese
    • Korean
    • Persian
    • Swedish
    • Turkish
    • other →
 
Profile Documents Logout
Upload
Artificial intelligence in electric power systems: a survey of the
Artificial intelligence in electric power systems: a survey of the

... July 12-16, 1992. Manuscript submitted January 28, 1992; made available for printing May 13, 1992. ...
www.goertzel.org/dynapsyc/2007/mirrorself.pdf
www.goertzel.org/dynapsyc/2007/mirrorself.pdf

... neuron systems is still only partially understood, so that the tie-in between mirror neurons and psychological structures posited here must be viewed as subject to revision based on further refinement of our understanding in the biology of mirror neurons. Ultimately, the core ideas of this paper wou ...
Integrating Scheduling and Control Functions in Computer
Integrating Scheduling and Control Functions in Computer

... sizes. ...
View PDF - CiteSeerX
View PDF - CiteSeerX

... example, Olivier may refuse to cooperate with the others if he thinks that it is more important for him to go home and take care of his daughter. Therefore, con icts usually arise, due to the existence of local and global goals. Moreover, a complex conversation must be held in order to establish the ...
Analyzing Impact of AI Tools on Traditional Workflow Systems
Analyzing Impact of AI Tools on Traditional Workflow Systems

... world Workflow systems are the backbone of any commercial organization which manages the specification, modeling and implementation of work processes of the organization. Workflow systems provide edge to organization over its rivals in dynamic business environment who still using static model for fu ...
Managing the Digital Firm - Department of Computer Engineering
Managing the Digital Firm - Department of Computer Engineering

... specific field in much the same way that a human expert would. The knowledge typically comes from a series of conversations between the developer of the expert system and one or more experts. The completed system applies the knowledge to problems specified by a user. ...
Managing the Digital Firm
Managing the Digital Firm

... specific field in much the same way that a human expert would. The knowledge typically comes from a series of conversations between the developer of the expert system and one or more experts. The completed system applies the knowledge to problems specified by a user. ...
Knowledge acquisition and processing: new methods for
Knowledge acquisition and processing: new methods for

... Neuro-fuzzy systems are soft computing methods utilizing artificial neural networks and fuzzy systems. Various connectionist architectures of neuro-fuzzy systems can be constructed. The knowledge acquisition concerns fuzzy IF-THEN rules, and is performed by a learning process. The systems realize an ...
Automated Modelling and Solving in Constraint Programming
Automated Modelling and Solving in Constraint Programming

... set, which is given, for instance, as a set of examples of its solutions and non-solutions. This kind of learning is called constraint acquisition (Bessiere et al. 2005). The motivations for constraint acquisition are many. For example, in order to solve partially defined constraints more efficient ...
intelligent robots: the question of embodiment
intelligent robots: the question of embodiment

... determines how behaviour is generated based on signals from sensors and to motor systems. Research in bottom-up approaches via reactive architectures has primarily lead to emergent behaviour [17] [18] [19] [20]. Such approaches involve quite simplistic control architectures and highlight how relativ ...
Chapter 4 Diagnostic Expert Systems: From Expert`s Knowledge to
Chapter 4 Diagnostic Expert Systems: From Expert`s Knowledge to

... Rule-based expert systems have a wide range of applications for diagnostic tasks where expertise and experience are available but deep understanding of the physical properties of the system is either unavailable or too costly to obtain. In the rule-based systems, knowledge is represented in the form ...
The role of artificial intelligence techniques in training
The role of artificial intelligence techniques in training

... The delivery of the expert's trace to the learner raises several issues, namely the question 'do we need to explain everything ?'. When human beings provide an explanation, they adapt this explanation to the explainee. They especially vary the granularity of the explanation. If the explainer believe ...
Karlsruhe Text - Tecfa
Karlsruhe Text - Tecfa

... The delivery of the expert's trace to the learner raises several issues, namely the question 'do we need to explain everything ?'. When human beings provide an explanation, they adapt this explanation to the explainee. They especially vary the granularity of the explanation. If the explainer believe ...
The Triangle of Life
The Triangle of Life

... The third stage in the Triangle is the period of maturity. It starts when the organism in question becomes fertile (circle 3 in Figure 2) and leads to a new Triangle when this organism conceives a child, i.e., produces a new genome through recombination and/or mutation (circle 1).2 It should be note ...
Concepts of Object- and Agent-Oriented Simulation
Concepts of Object- and Agent-Oriented Simulation

... to conduct controlled experimentation with software components developed in single or distributed Artificial Intelligence [7, 8], serve as a simulation environment for autonomous senso-motoric systems [9], or intend to capture deliberative capabilities in simulating natural societies more adequately ...
Management Information Systems 11e
Management Information Systems 11e

... need to create a taxonomy that will help organize the information into meaningful categories. That makes it easy to find things later on. For example, you have lots of digital renderings of your company logo. Set up a taxonomy called “Logo.” Now, whenever you add another digital file of a logo, you ...
Energy-Based Models for Sparse Overcomplete Representations
Energy-Based Models for Sparse Overcomplete Representations

... When our energy-based approach to ICA is made overcomplete, it continues to be a proper density model and it retains the computationally convenient property that the features are a deterministic function of the observation vector. However, it abandons the marginal independence of the features (which ...
Intelligent System for Information Security Management: Architecture
Intelligent System for Information Security Management: Architecture

... discovery or network reconnaissance. The attacker collects information about the target using public databases and documents as well as more invasive scanners and grabbers. Then, the attacker tries to discover vulnerabilities in the services identified, either through more research or by using a too ...
BENCHMARKING THE TRANSITION TO AGILE MANUFACTURING: A KNOWLEDGE-BASED SYSTEMS APPROACH
BENCHMARKING THE TRANSITION TO AGILE MANUFACTURING: A KNOWLEDGE-BASED SYSTEMS APPROACH

... environment would be placed in one partition, or simple matcher, and patterns relating to flexibility would reside in a second simple matcher. Thus, the problem solver’s knowledge is partitioned into one or more simple matchers, each of which can be evaluated based on the patterns it contains. The s ...
CYBERNETICS: A Definition
CYBERNETICS: A Definition

... to me and I composed the following text and incorporated a figure that I had created for an earlier purpose. My original text follows, which was published in a slightly reedited form. Final text is Copyright (c) Macmillan Publishing.] Artificial Intelligence and cybernetics: Aren't they the same thi ...
Fuzzy Systems and Neuro-Computing in Credit Approval
Fuzzy Systems and Neuro-Computing in Credit Approval

... through all the rules. So Happy Together Fuzzy logic and neural networks are complementary technologies in the design of intelligent systems. Each method has its pros and cons. For example: • Artificial neural systems suffer from their inability to explain the steps by which they reach decisions and ...
acrobat
acrobat

... One can think of two different approaches to improve this performance: (1) using a better optimization algorithm to find a lower energy conformation; and (2) changing the energy function. Deciding between these two approaches is currently difficult because simulated annealing and many of the other m ...
Form, function and the matter of experience
Form, function and the matter of experience

... program that did something interestingly cognitive have been asked the question; but does it know what it is doing? Does it know that it is doing something? Turing (1950) discussed this question under the heading ‘the argument from consciousness’, and attributed it to Professor Jefferson who spoke a ...
Regulating Artificial Intelligence Systems
Regulating Artificial Intelligence Systems

... Peter Huber coined the term “public risk” to describe threats to human health or safety that are “centrally or mass-produced, broadly distributed, and largely outside the individual risk bearer’s direct understanding and control.”14 Dawn was just breaking on the Information Age when Huber first used ...
biology i - Center for Technology Outreach
biology i - Center for Technology Outreach

... • Significance of nondisjunction, deletion, substitutions, translocation, frame shift mutation in animals • Occurrence and significance of genetic disorders such as sickle cell anemia, Tay-Sachs disorder, cystic fibrosis, hemophilia, Downs Syndrome, color blindness 6. Demonstrate an understanding of ...
< 1 ... 12 13 14 15 16 17 18 19 20 ... 94 >

Incomplete Nature



Incomplete Nature: How Mind Emerged from Matter is a 2011 book by biological anthropologist Terrence Deacon. The book covers topics in biosemiotics, philosophy of mind, and the origins of life. Broadly, the book seeks to naturalistically explain ""aboutness"", that is, concepts like intentionality, meaning, normativity, purpose, and function; which Deacon groups together and labels as ententional phenomena.
  • studyres.com © 2025
  • DMCA
  • Privacy
  • Terms
  • Report