Search results for " Mach"

showing 10 items of 1388 documents

A Self-Contained Biometric Sensor for Ubiquitous Authentication

2007

This paper describes a real-life behavior framework in simulation game based on Probabilistic State Machine (PSM) with Gaussian random distribution. According to the dynamic environment information, NPC can generate behavior planning autonomously associated with defined FSM. After planning process, we illuminate Gaussian probabilistic function for real-life action simulation in time and spatial domains. The expected value of distribution is estimated during behavior planning process and variance is determined by NPC personality in order to realize real life behavior simulation. We experiment the framework and Gaussian PSM on a restaurant simulation game. Furthermore we give some suggestions…

symbols.namesakeFinite-state machineTheoretical computer scienceComputer scienceGaussianAutonomous agentProbabilistic logicsymbolsVariance (accounting)Function (mathematics)Expected valueVirtual reality
researchProduct

Moving beyond the Turing test

2012

Computers interacting with, not imitating, humans is the way forward.

symbols.namesakeTheoretical computer scienceGeneral Computer ScienceComputer scienceTuring testsymbolsMultitape Turing machineCommunications of the ACM
researchProduct

Support vector machine integrated with game-theoretic approach and genetic algorithm for the detection and classification of malware

2013

Abstract. —In the modern world, a rapid growth of mali- cious software production has become one of the most signifi- cant threats to the network security. Unfortunately, wides pread signature-based anti-malware strategies can not help to de tect malware unseen previously nor deal with code obfuscation te ch- niques employed by malware designers. In our study, the prob lem of malware detection and classification is solved by applyin g a data-mining-based approach that relies on supervised mach ine- learning. Executable files are presented in the form of byte a nd opcode sequences and n-gram models are employed to extract essential features from these sequences. Feature vectors o btained are…

ta113Network securitybusiness.industryComputer scienceFeature vectorFeature extractionuhatBytecomputer.file_formatMachine learningcomputer.software_genrehaittaohjelmatSupport vector machineObfuscation (software)ComputingMethodologies_PATTERNRECOGNITIONnetworknetwork securityMalwareData miningArtificial intelligenceExecutabletietoturvabusinesscomputer2013 IEEE Globecom Workshops (GC Wkshps)
researchProduct

Turing's error-revised

2016

Many important lines of argumentation have been presented during the last decades claiming that machines cannot think like people. Yet, it has been possible to construct devices and information systems, which replace people in tasks which have previously been occupied by people as the tasks require intelligence. The long and versatile discourse over, what machine intelligence is, suggests that there is something unclear in the foundations of the discourse itself. Therefore, we critically studied the foundations of used theory languages. By looking critically some of the main arguments of machine thinking, one can find unifying factors. Most of them are based on the fact that computers canno…

ta113computationClass (set theory)modelformal language02 engineering and technologyconsciousnessArgumentation theoryEpistemologyTuring machineTuring machinesymbols.namesake020204 information systemsFormal language0202 electrical engineering electronic engineering information engineeringsymbolsSelection (linguistics)020201 artificial intelligence & image processingSociologyConstruct (philosophy)TuringcomputermindNatural languagecomputer.programming_languageInternational Journal of Philosophy Study
researchProduct

Mathematical models and stability analysis of three-phase synchronous machines

2013

tahtikoneetthe limit load problemlimit cycles of the second kindkuormitussähkökoneetstabilitytransient processessähkögeneraattoritcircular solutionssynchronous machinesvakavuusroottoritmatemaattiset mallitthe non-local reduction methodsähkömoottoritdynamiikkafour-pole rotor
researchProduct

Toward modernizing the systematic review pipeline in genetics: efficient updating via data mining

2012

Purpose: The aim of this study was to demonstrate that modern data mining tools can be used as one step in reducing the labor necessary to produce and maintain systematic reviews. Methods: We used four continuously updated, manually curated resources that summarize MEDLINE-indexed articles in entire fields using systematic review methods (PDGene, AlzGene, and SzGene for genetic determinants of Parkinson disease, Alzheimer disease, and schizophrenia, respectively; and the Tufts Cost-Effectiveness Analysis (CEA) Registry for cost-effectiveness analyses). In each data set, we trained a classification model on citations screened up until 2009. We then evaluated the ability of the model to class…

text classificationTechnology Assessment BiomedicalDatabases FactualComputer scienceCost-Benefit AnalysisReview Literature as TopicHardware_PERFORMANCEANDRELIABILITYEmpirical Researchcomputer.software_genre03 medical and health sciences0302 clinical medicineMeta-Analysis as TopicAlzheimer DiseaseHardware_INTEGRATEDCIRCUITSData MiningHumanssupport vector machineOriginal Research Article030212 general & internal medicineGenetics (clinical)030304 developmental biologyGenetics0303 health sciencesParkinson DiseasePipeline (software)3. Good healthmeta-analysisReview Literature as Topicmachine learningSchizophreniaData miningPeriodicals as Topiccomputercitation screeningSoftwareGenetics in Medicine
researchProduct

Problem Transformation Methods with Distance-Based Learning for Multi-Target Regression

2020

Multi-target regression is a special subset of supervised machine learning problems. Problem transformation methods are used in the field to improve the performance of basic methods. The purpose of this article is to test the use of recently popularized distance-based methods, the minimal learning machine (MLM) and the extreme minimal learning machine (EMLM), in problem transformation. The main advantage of the full data variants of these methods is the lack of any meta-parameter. The experimental results for the MLM and EMLM show promising potential, emphasizing the utility of the problem transformation especially with the EMLM. peerReviewed

the minimal learning machine (MLM) and the extreme minimal learning machine (EMLM)koneoppiminenemphasizing the utility of the problem transformation especially with the EMLM.Multi-target regression is a special subset of supervised machine learning problems. Problem transformation methods are used in the field to improve the performance of basic methods. The purpose of this article is to test the use of recently popularized distance-based methodsin problem transformation. The main advantage of the full data variants of these methods is the lack of any meta-parameter. The experimental results for the MLM and EMLM show promising potential
researchProduct

Overview of Power Electronic Switches: A Summary of the Past, State-of-the-Art and Illumination of the Future.

2020

As the need for green and effective utilization of energy continues to grow, the advancements in the energy and power electronics industry are constantly driven by this need, as both industries are intertwined for obvious reasons. The developments in the power electronics industry has over the years hinged on the progress of the semiconductor device industry. The semiconductor device industry could be said to be on the edge of a turn into a new era, a paradigm shift from the conventional silicon devices to the wide band gap semiconductor technologies. While a lot of work is being done in research and manufacturing sectors, it is important to look back at the past, evaluate the current progr…

thyristorsEngineeringinsulated gate bipolar transistorslcsh:Mechanical engineering and machinery02 engineering and technologyReviewbipolar transistors01 natural sciencesElectronic switchpower semiconductor devicesPower electronics0103 physical sciences0202 electrical engineering electronic engineering information engineeringPower semiconductor devicelcsh:TJ1-1570Electrical and Electronic Engineering010302 applied physicsbusiness.industrypower semiconductor switchesMechanical Engineering020208 electrical & electronic engineeringThyristorSemiconductor deviceVDP::Teknologi: 500Work (electrical)Control and Systems EngineeringParadigm shiftState (computer science)businessTelecommunicationspower transistorsMicromachines
researchProduct

Efficient remote authentication

2013

In 2003, Kennel and Jamieson described a method of remote machine authentication. By authentication, the authors meant that the remote machine is non-virtual, and the operating system on the remote machine is not malicious. The described method does not consider the variety of versions of each operating system. The description completely ignores the existence of modules that can be plugged into the operating system. The authors of this paper adapt the method described by Kennel and Jamieson to the real world so that itcan be applied without prior knowledge of theoperating system or the modules on the remote machine. peerReviewed

todentaminentietokoneetetäkäyttöremote authenticationtietoturvavirtuaaliympäristöVirtual machinedatabasedigital rights management
researchProduct

A Stylistic Analysis of the English Translations of Machiavelli's The Prince: Mansfield, Skinner and Connell

2009

The Prince is counted among those political works which gave rise to modern political science. Linguists have shown how the writing technique, that makes The Prince a unique work, is one of the main instruments used by Machiavelli to persuade his addressee to adopt the political tactics he was recommending. On the basis of their Italian studies on The Prince, the paper analyses how Machiavelli’s style was transferred from Italian into English in the most recent and authoritative English translations by Harvey C. Mansfield (1985), Quentin Skinner & Russell Price (1989 [1988]) and William J. Connell (2005). Three significant passages of Machiavelli’s masterpiece and their translations have be…

translational stylistics Machiavelli The Prince.Settore L-LIN/12 - Lingua E Traduzione - Lingua Inglese
researchProduct