Search results for "BERT"
showing 10 items of 1789 documents
Acting under the idea of freedom: Kant and the Incorporation Thesis
2010
Este artículo examina un supuesto fundamental de la filosofía moral kantiana, a saber: que sin libertad trascendental, entendida como la propiedad de la voluntad por la que se determina a actuar sin ser afectada por resortes sensibles, no se le pueden imputar al presunto agente actos inmorales. Teóricamente se argumenta contra el sentido lógico del supuesto (se revela la consecuencia aporética de la concepción) y se muestra cuán superfluo es en la práctica. De todos modos, se le reconoce a Kant, contra una línea de argumentación nietzscheana bien conocida, el mérito de haber captado el compromiso humano insuperable con la idea de que somos seres discrecionales o libres trascendentalmente. Y…
Quantum like modelling of decision making: quantifying uncertainty with the aid of the Heisenberg-Robertson inequality
2018
This paper contributes to quantum-like modeling of decision making (DM) under uncertainty through application of Heisenberg’s uncertainty principle (in the form of the Robertson inequality). In this paper we apply this instrument to quantify uncertainty in DM performed by quantum-like agents. As an example, we apply the Heisenberg uncertainty principle to the determination of mutual interrelation of uncertainties for “incompatible questions” used to be asked in political opinion pools. We also consider the problem of representation of decision problems, e.g., in the form of questions, by Hermitian operators, commuting and noncommuting, corresponding to compatible and incompatible questions …
An Innovative Ambient Identification Method
2020
Ambient modal identification, also known as Operational Modal Analysis (OMA), aims to identify the modal properties of a structure based on vibration data collected when the structure is under its operating conditions, i.e., no initial excitation or known artificial excitation. This procedure for testing and/or monitoring historic buildings, is particularly attractive for civil engineers concerned with the safety of complex historic structures. However, since the external force is not recorded, the identification methods have to be more sophisticated and based on stochastic mechanics. In this context, this contribution will introduce an innovative ambient identification method based on appl…
Y ahora ¿qué?
1997
Upport vector machines for nonlinear kernel ARMA system identification.
2006
Nonlinear system identification based on support vector machines (SVM) has been usually addressed by means of the standard SVM regression (SVR), which can be seen as an implicit nonlinear autoregressive and moving average (ARMA) model in some reproducing kernel Hilbert space (RKHS). The proposal of this letter is twofold. First, the explicit consideration of an ARMA model in an RKHS (SVM-ARMA 2k) is proposed. We show that stating the ARMA equations in an RKHS leads to solving the regularized normal equations in that RKHS, in terms of the autocorrelation and cross correlation of the (nonlinearly) transformed input and output discrete time processes. Second, a general class of SVM-based syste…
Hypervisor-assisted dynamic malware analysis
2021
AbstractMalware analysis is a task of utmost importance in cyber-security. Two approaches exist for malware analysis: static and dynamic. Modern malware uses an abundance of techniques to evade both dynamic and static analysis tools. Current dynamic analysis solutions either make modifications to the running malware or use a higher privilege component that does the actual analysis. The former can be easily detected by sophisticated malware while the latter often induces a significant performance overhead. We propose a method that performs malware analysis within the context of the OS itself. Furthermore, the analysis component is camouflaged by a hypervisor, which makes it completely transp…
Fast fringe pattern phase demodulation using FIR Hilbert transformers
2016
This paper suggests the use of FIR Hilbert transformers to extract the phase of fringe patterns. This method is computationally faster than any known spatial method that produces wrapped phase maps. Also, the algorithm does not require any parameters to be adjusted which are dependent upon the specific fringe pattern that is being processed, or upon the particular setup of the optical fringe projection system that is being used. It is therefore particularly suitable for full algorithmic automation. The accuracy and validity of the suggested method has been tested using both computer-generated and real fringe patterns. This novel algorithm has been proposed for its advantages in terms of com…
Optimizing Kernel Ridge Regression for Remote Sensing Problems
2018
Kernel methods have been very successful in remote sensing problems because of their ability to deal with high dimensional non-linear data. However, they are computationally expensive to train when a large amount of samples are used. In this context, while the amount of available remote sensing data has constantly increased, the size of training sets in kernel methods is usually restricted to few thousand samples. In this work, we modified the kernel ridge regression (KRR) training procedure to deal with large scale datasets. In addition, the basis functions in the reproducing kernel Hilbert space are defined as parameters to be also optimized during the training process. This extends the n…
Artificial Intelligence in Protecting Smart Building’s Cloud Service Infrastructure from Cyberattacks
2020
Gathering and utilizing stored data is gaining popularity and has become a crucial component of smart building infrastructure. The data collected can be stored, for example, into private, public, or hybrid cloud service infrastructure or distributed service by utilizing data platforms. The stored data can be used when implementing services, such as building automation (BAS). Cloud services, IoT sensors, and data platforms can face several kinds of cybersecurity attack vectors such as adversarial, AI-based, DoS/DDoS, insider attacks. If a perpetrator can penetrate the defenses of a data platform, she can cause significant harm to the system. For example, the perpetrator can disrupt a buildin…
Intertwining operators between different Hilbert spaces: connection with frames
2009
In this paper we generalize a strategy recently proposed by the author concerning intertwining operators. In particular we discuss the possibility of extending our previous results in such a way to construct (almost) isospectral self-adjoint operators living in different Hilbert spaces. Many examples are discussed in details. Many of them arise from the theory of frames in Hilbert spaces, others from the so-called g-frames.