Results for 'spam filter'

1000+ found
Order:
  1.  17
    Collective classification for spam filtering.C. Laorden, B. Sanz, I. Santos, P. Galan-Garcia & P. G. Bringas - 2013 - Logic Journal of the IGPL 21 (4):540-548.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  2. Selected Papers from the 11th Conference of the Spanish Association for Artificial Intelligence (CAEPIA 2005)-Tokenising, Stemming and Stopword Removal on Anti-spam Filtering Domain. [REVIEW]Jose R. Mendez, Eva L. Iglesias, Florentino Fdez-Riverola, Fernando Diaz & Juan M. Corchado - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 449-458.
  3.  92
    Adaptive intelligent learning approach based on visual anti-spam email model for multi-natural language.Akbal Omran Salman, Dheyaa Ahmed Ibrahim & Mazin Abed Mohammed - 2021 - Journal of Intelligent Systems 30 (1):774-792.
    Spam electronic mails (emails) refer to harmful and unwanted commercial emails sent to corporate bodies or individuals to cause harm. Even though such mails are often used for advertising services and products, they sometimes contain links to malware or phishing hosting websites through which private information can be stolen. This study shows how the adaptive intelligent learning approach, based on the visual anti-spam model for multi-natural language, can be used to detect abnormal situations effectively. The application of this (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  7
    Novel email spam detection method using sentiment analysis and personality recognition.Enaitz Ezpeleta, Iñaki Velez de Mendizabal, José María Gómez Hidalgo & Urko Zurutuza - 2020 - Logic Journal of the IGPL 28 (1):83-94.
    Unsolicited email campaigns remain as one of the biggest threats affecting millions of users per day. During the past years several techniques to detect unsolicited emails have been developed. This work provides means to validate the hypothesis that the identification of the email messages’ intention can be approached by sentiment analysis and personality recognition techniques. These techniques will provide new features that improve current spam classification techniques. We combine personality recognition and sentiment analysis techniques to analyse email content. We (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  64
    Ensemble Machine Learning Model for Classification of Spam Product Reviews.Muhammad Fayaz, Atif Khan, Javid Ur Rahman, Abdullah Alharbi, M. Irfan Uddin & Bader Alouffi - 2020 - Complexity 2020:1-10.
    Nowadays, online product reviews have been at the heart of the product assessment process for a company and its customers. They give feedback to a company on improving product quality, planning, and monitoring its business schemes in order to increase sale and gain more profit. They are also helpful for customers to select the right products in less effort and time. Most companies make spam reviews of products in order to increase the products sales and gain more profit. Detecting (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  17
    Covering laws in historical practice.Sten Spam Nikon - 1971 - Inquiry: An Interdisciplinary Journal of Philosophy 14 (1-4):445-463.
    Carl G. Hempel has expressed the view that explanation in history is of a kind with explanation in any other branch of empirical science. Historians, according to him, aim at showing that the events they describe are not matters of chance. In the author's opinion there is no necessary connection between these two statements. Historians often aim at showing that the events they describe are matters of chance. But this does not make explanation in history different from explanation in other (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7. A316, ensicaen à 14h30.Christian Fernandez & Spam Including - 2011 - Comprendre 50.
    No categories
     
    Export citation  
     
    Bookmark  
  8. Prochainement..Christian Fernandez & Spam Including - 2010 - Comprendre 50.
    No categories
     
    Export citation  
     
    Bookmark  
  9.  9
    A practical definition of character.Raymond O. Filter - 1922 - Psychological Review 29 (4):319-324.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10.  53
    A psychologist's prayer.Raymond O. Filter - 1944 - Journal of Philosophy 41 (4):97-103.
    No categories
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  11. Model-induced escape.Barry Smith - 2022 - Facing the Future, Facing the Screen: 10Th Budapest Visual Learning Conference.
    We can illustrate the phenomenon of model-induced escape by examining the phenomenon of spam filters. Spam filter A is, we can assume, very effective at blocking spam. Indeed it is so effective that it motivates the authors of spam to invent new types of spam that will beat the filters of spam filter A. -/- An example of this phenomenon in the realm of philosophy is illustrated in the work of Nyíri on (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  17
    Jonathan I. Israel: Democratic Enlightenment: Philosophy, Revolution, and Human Rights 1750-1790. [REVIEW]Patrick Filter - 2014 - Philosophia: International Journal of Philosophy (Philippine e-journal) 15 (1):121-125.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  13. Jonathan I. Israel: Radical Enlightenment: Philosophy and the Making of Modernity, 1650-1750. [REVIEW]Patrick Filter - 2009 - Philosophia 37 (2).
    his is a book to broaden the mind. It brings the reader into a world only vaguely imaginable and richly enlightens it with extraordinary attention to interesting historical details. It is beautifully written and endlessly interesting.
     
    Export citation  
     
    Bookmark  
  14. Siep Stuurman: Francois Poullain de la Barre and the Invention of Modern Equality. [REVIEW]Patrick Filter - 2010 - Philosophia 38 (2).
     
    Export citation  
     
    Bookmark  
  15. How the machine ‘thinks’: Understanding opacity in machine learning algorithms.Jenna Burrell - 2016 - Big Data and Society 3 (1):205395171562251.
    This article considers the issue of opacity as a problem for socially consequential mechanisms of classification and ranking, such as spam filters, credit card fraud detection, search engines, news trends, market segmentation and advertising, insurance or loan qualification, and credit scoring. These mechanisms of classification all frequently rely on computational algorithms, and in many cases on machine learning algorithms to do this work. In this article, I draw a distinction between three forms of opacity: opacity as intentional corporate or (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   187 citations  
  16.  22
    Are We There Yet?Nello Cristianini - 2010 - Neural Networks 23 (4):466-470.
    Statistical approaches to Artificial Intelligence are behind most success stories of the field in the past decade. The idea of generating non-trivial behaviour by analysing vast amounts of data has enabled recommendation systems, search engines, spam filters, optical character recognition, machine translation and speech recognition, among other things. As we celebrate the spectacular achievements of this line of research, we need to assess its full potential and its limitations. What are the next steps to take towards machine intelligence?
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  17.  13
    Rhythmedia: A Study of Facebook Immune System.Elinor Carmi - 2020 - Theory, Culture and Society 37 (5):119-138.
    This paper examines the politics behind algorithmic ordering in social media, focusing on the advertising logic behind them. This is explored through a practice I call rhythmedia – the way media companies render people, objects and their relations as rhythms and order them for economic purposes. As a case study I examine the way the Facebook Immune System algorithm orchestrates people’s mediated experience towards a desired rhythm while filtering out problematic rhythms. This anti-spam algorithm shows that it is important (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  69
    Code and moral values in cyberspace.Richard A. Spinello - 2001 - Ethics and Information Technology 3 (2):137-150.
    This essay is a critique of LarryLessig's book, Code and other Laws ofCyberspace (Basic Books, 1999). Itsummarizes Lessig's theory of the fourmodalities of regulation in cyberspace: code,law, markets, and norms. It applies thistheory to the topics of privacy and speech,illustrating how code can undermine basicrights or liberties. The review raisesquestions about the role of ethics in thismodel, and it argues that ethical principlesmust be given a privileged position in anytheory that purports to deal with the shapingof behavior in cyberspace. Finally, (...)
    Direct download (11 more)  
     
    Export citation  
     
    Bookmark  
  19.  14
    A Spam e a década de 30.Vera Beccari - 1979 - Discurso 11:131-156.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  16
    Spam, opposite of community: Finn Brunton: SPAM: A shadow history of the internet. Cambridge, MA: MIT Press, 2013, 304pp, $27.95, £19.95 HB.Christopher Kelty - 2014 - Metascience 23 (3):543-546.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21. Filters via Neutrosophic Crisp Sets.A. Salama & Florentin Smarandache - 2013 - Neutrosophic Sets and Systems 1:34-37.
    In this paper we introduce the notion of filter on the neutrosophic crisp set, then we consider a generalization of the filter’s studies. Afterwards, we present the important neutrosophic crisp filters. We also study several relations between different neutrosophic crisp filters and neutrosophic topologies. Possible applications to database systems are touched upon.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   11 citations  
  22.  11
    Spam and the evolution of the fly's eye.Daniel Osorio - 2007 - Bioessays 29 (2):111-115.
    The open rhabdoms of the fly's eye enhance absolute sensitivity but to avoid compromising spatial acuity they require precise optical geometry and neural connections.1 This neural superposition system evolved from the ancestral insect eye, which has fused rhabdoms. A recent paper by Zelhof and co‐workers2 shows that the Drosophila gene spacemaker (spam) is necessary for development of open rhabdoms, and suggests that mutants revert to an ancestral state. Here I outline how open rhabdoms and neural superposition may have evolved (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23. Effective Filtering: Language Comprehension and Testimonial Entitlement.J. P. Grodniewicz - 2022 - Philosophical Quarterly 74 (1):291-311.
    It is often suggested that we are equipped with a set of cognitive tools that help us to filter out unreliable testimony. But are these tools effective? I answer this question in two steps. Firstly, I argue that they are not real-time effective. The process of filtering, which takes place simultaneously with or right after language comprehension, does not prevent a particular hearer on a particular occasion from forming beliefs based on false testimony. Secondly, I argue that they are (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  24. Pop-Ups, Cookies, and Spam: Toward a Deeper Analysis of the Ethical Significance of Internet Marketing Practices.Daniel E. Palmer - 2005 - Journal of Business Ethics 58 (1-3):271-280.
    While e-commerce has grown rapidly in recent years, some of the practices associated with certain aspects of marketing on the Internet, such as pop-ups, cookies, and spam, have raised concerns on the part of Internet users. In this paper I examine the nature of these practices and what I take to be the underlying source of this concern. I argue that the ethical issues surrounding these Internet marketing techniques move us beyond the traditional treatment of the ethics of marketing (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  25. Spam And Terror, An Insulting Comparison: Commentary On Vinod Scaria.Frank Leavitt - 2003 - Eubios Journal of Asian and International Bioethics 13 (3):112-113.
     
    Export citation  
     
    Bookmark  
  26.  50
    Leibniz filters and the strong version of a protoalgebraic logic.Josep Maria Font & Ramon Jansana - 2001 - Archive for Mathematical Logic 40 (6):437-465.
    A filter of a sentential logic ? is Leibniz when it is the smallest one among all the ?-filters on the same algebra having the same Leibniz congruence. This paper studies these filters and the sentential logic ?+ defined by the class of all ?-matrices whose filter is Leibniz, which is called the strong version of ?, in the context of protoalgebraic logics with theorems. Topics studied include an enhanced Correspondence Theorem, characterizations of the weak algebraizability of ?+ (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   20 citations  
  27.  22
    Canjar Filters.Osvaldo Guzmán, Michael Hrušák & Arturo Martínez-Celis - 2017 - Notre Dame Journal of Formal Logic 58 (1):79-95.
    If $\mathcal{F}$ is a filter on $\omega$, we say that $\mathcal{F}$ is Canjar if the corresponding Mathias forcing does not add a dominating real. We prove that any Borel Canjar filter is $F_{\sigma}$, solving a problem of Hrušák and Minami. We give several examples of Canjar and non-Canjar filters; in particular, we construct a $\mathsf{MAD}$ family such that the corresponding Mathias forcing adds a dominating real. This answers a question of Brendle. Then we prove that in all the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  28. Attention SPAM®.Paul Zelevansky - forthcoming - Substance.
     
    Export citation  
     
    Bookmark  
  29.  14
    Attention SPAM registered.Paul Zelevansky - 1997 - Substance 26 (1):135.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30.  27
    Predatory Journals Spamming for Publications: What Should Researchers Do?Aamir Raoof Memon - 2018 - Science and Engineering Ethics 24 (5):1617-1639.
    In the internet era spam has become a big problem. Researchers are troubled with unsolicited or bulk spam emails inviting them to publish. However, this strategy has helped predatory journals hunt their prey and earn money. These journals have grown tremendously during the past few years despite serious efforts by researchers and scholarly organizations to hinder their growth. Predatory journals and publishers are often based in developing countries, and they potentially target researchers from these counties by using different (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  31.  30
    Filter Bubbles, Echo Chambers and Shared Experience.Sebastian Weydner-Volkmann - 2023 - Ruch Filozoficzny 79 (4):29–47.
    This article explores what John Dewey’s political philosophy can offer in regard to the current crisis in digital democracy. It focuses on two digital mechanisms, the “filter bubble” and the “echo chamber”. While there is a prominent, Dewey-inspired debate on “digital publics” in the literature, a reconstruction of the Deweyan concepts of the public and of shared experience shows that it does not adequately reflect the aspect of situated and embodied experience. Based on this, it is shown that digital (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32.  4
    Filters via Neutrosophic Crisp Sets.A. A. Salama & Florentin Smarandache - 2013 - Neutrosophic Sets and Systems 1:34-37.
    In this paper we introduce the notion of filter on the neutrosophic crisp set, then we consider a generalization of the filter’s studies. Afterwards, we present the important neutrosophic crisp filters. We also study several relations between different neutrosophic crisp filters and neutrosophic topologies. Possible applications to database systems are touched upon.
    Direct download  
     
    Export citation  
     
    Bookmark   7 citations  
  33.  20
    The Filter and the Viewer: On Audience Discretion in Film Noir.Steven G. Smith - 2024 - Film-Philosophy 28 (2):375-394.
    To the French critics who originally labelled certain films noir it seemed that a class of Hollywood products had gone darker during the war years – as though a dark filter had been placed over the lens. Films were not designed or marketed as noir, and retrospectively noir's status as a genre is still unsettled. Yet there is widespread interest today in experiencing diverse films as noir, and even in using a Noir Filter in Instagram and video games. (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  34.  49
    Filtering unification and most general unifiers in modal logic.Silvio Ghilardi & Lorenzo Sacchetti - 2004 - Journal of Symbolic Logic 69 (3):879-906.
    We characterize (both from a syntactic and an algebraic point of view) the normal K4-logics for which unification is filtering. We also give a sufficient semantic criterion for existence of most general unifiers, covering natural extensions of K4.2⁺ (i.e., of the modal system obtained from K4 by adding to it, as a further axiom schemata, the modal translation of the weak excluded middle principle).
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  35.  64
    Filter distributive logics.Janusz Czelakowski - 1984 - Studia Logica 43 (4):353 - 377.
    The present paper is thought as a formal study of distributive closure systems which arise in the domain of sentential logics. Special stress is laid on the notion of a C-filter, playing the role analogous to that of a congruence in universal algebra. A sentential logic C is called filter distributive if the lattice of C-filters in every algebra similar to the language of C is distributive. Theorem IV.2 in Section IV gives a method of axiomatization of those (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  36. Filter bubbles, Echo Chambers, and Online Communities.Hanna Gunn - 2021 - In Michael Hannon & Jeroen de Ridder (eds.), The Routledge Handbook of Political Epistemology. New York: Routledge. pp. 192-202.
    In Neal Stephenson’s fictional novel, Diamond Age (1995), the protagonist Nell acquires a prototype of what we might today recognise as a highly sophisticated e-reader with a voice-assistant. This e-reader, the “Young Lady’s Illustrated Primer”, uses artificial intelli- gence to serve as Nell’s personal teacher. What is key to the Primer is how it is designed to respond to Nell. The Primer has a theory of Nell – her needs, her real-world situation, her abilities – and it tailors its lessons (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  39
    Filters on Computable Posets.Steffen Lempp & Carl Mummert - 2006 - Notre Dame Journal of Formal Logic 47 (4):479-485.
    We explore the problem of constructing maximal and unbounded filters on computable posets. We obtain both computability results and reverse mathematics results. A maximal filter is one that does not extend to a larger filter. We show that every computable poset has a \Delta^0_2 maximal filter, and there is a computable poset with no \Pi^0_1 or \Sigma^0_1 maximal filter. There is a computable poset on which every maximal filter is Turing complete. We obtain the reverse (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  38.  40
    Leibniz filters revisited.Ramon Jansana - 2003 - Studia Logica 75 (3):305 - 317.
    Leibniz filters play a prominent role in the theory of protoalgebraic logics. In [3] the problem of the definability of Leibniz filters is considered. Here we study the definability of Leibniz filters with parameters. The main result of the paper says that a protoalgebraic logic S has its strong version weakly algebraizable iff it has its Leibniz filters explicitly definable with parameters.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  39.  8
    Preserving Filtering Unification by Adding Compatible Operations to Some Heyting Algebras.Wojciech Dzik & Sándor Radeleczki - 2016 - Bulletin of the Section of Logic 45 (3/4).
    We show that adding compatible operations to Heyting algebras and to commutative residuated lattices, both satisfying the Stone law ¬x ⋁ ¬¬x = 1, preserves filtering unification, that is, the property that for every two unifiers there is a unifier more general then both of them. Contrary to that, often adding new operations to algebras results in changing the unification type. To prove the results we apply the theorems of [9] on direct products of l-algebras and filtering unification. We consider (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  40.  45
    Probability Filters as a Model of Belief.Catrin Campbell-Moore - 2021 - Proceedings of Machine Learning Research 147:42-50.
    We propose a model of uncertain belief. This models coherent beliefs by a filter, ????, on the set of probabilities. That is, it is given by a collection of sets of probabilities which are closed under supersets and finite intersections. This can naturally capture your probabilistic judgements. When you think that it is more likely to be sunny than rainy, we have{????|????(????????????????????)>????(????????????????????)}∈????. When you think that a gamble ???? is desirable, we have {????|Exp????[????]>0}∈????. It naturally extends the model of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  41.  17
    Saturated filters at successors of singulars, weak reflection and yet another weak club principle.Mirna Džamonja & Saharon Shelah - 1996 - Annals of Pure and Applied Logic 79 (3):289-316.
    Suppose that λ is the successor of a singular cardinal μ whose cofinality is an uncountable cardinal κ. We give a sufficient condition that the club filter of λ concentrating on the points of cofinality κ is not λ+-saturated.1 The condition is phrased in terms of a notion that we call weak reflection. We discuss various properties of weak reflection. We introduce a weak version of the ♣-principle, which we call ♣*−, and show that if it holds on a (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  42.  63
    From filters to fillers: an active inference approach to body image distortion in the selfie era.Simon C. Tremblay, Safae Essafi Tremblay & Pierre Poirier - 2021 - AI and Society (1):33-48.
    Advances in artificial intelligence, as well as its increased presence in everyday life, have brought the emergence of many new phenomena, including an intriguing appearance of what seems to be a variant of body dysmorphic disorder, coined “Snapchat dysmorphia”. Body dysmorphic disorder is a DSM-5 psychiatric disorder defined as a preoccupation with one or more perceived defects or flaws in physical appearance that are not observable or appear slight to others. Snapchat dysmorphia is fueled by automated selfie filters that reflect (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  26
    Filter-linkedness and its effect on preservation of cardinal characteristics.Jörg Brendle, Miguel A. Cardona & Diego A. Mejía - 2021 - Annals of Pure and Applied Logic 172 (1):102856.
    We introduce the property “F-linked” of subsets of posets for a given free filter F on the natural numbers, and define the properties “μ-F-linked” and “θ-F-Knaster” for posets in a natural way. We show that θ-F-Knaster posets preserve strong types of unbounded families and of maximal almost disjoint families. Concerning iterations of such posets, we develop a general technique to construct θ-Fr-Knaster posets (where Fr is the Frechet ideal) via matrix iterations of <θ-ultrafilter-linked posets (restricted to some level of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  61
    Already filtered: Affective immersion and personality differences in accessing present and past.Doris McIlwain - 2006 - Philosophical Psychology 19 (3):381 – 399.
    Schemas contribute to adaptation, filtering novelty though knowledge-expectancy structures, the residue of past contingencies and their consequences. Adaptation requires a balance between flexible, dynamic context-sensitivity and the cognitive efficiency that schemas afford in promoting persistent goal pursuit despite distraction. Affects can form and disrupt schemas. Transient affective experiences systematically alter selectivity of attentiveness to the directly experienced present environment, the internal environment, and to the stored experiences of memory. Enduring personal stylistic predispositions, like implicit motives and affective schemas, influence how (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  45.  28
    Filtering Semantics for Counterfactuals: Bridging Causal Models and Premise Semantics.P. Santorio - unknown
    I argue that classical counterfactual semantics in the style of Stalnaker, Lewis, and Kratzer validates an inference pattern that is disconfirmed in natural language. The solution is to alter the algorithm we use to handle inconsistency in premise sets: rather than checking all maximally consistent fragments of a premise sets, as in Krazter’s semantics, we selectively remove some of the premises. The proposed implementation starts from standard premise semantics and involves a new ‘filtering’ operation that achieves just this removal. The (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  88
    The search query filter bubble: effect of user ideology on political leaning of search results through query selection (2nd edition).A. G. Ekström, Guy Madison, Erik J. Olsson & Melina Tsapos - 2023 - Information, Communication and Society 1:1-17.
    It is commonly assumed that personalization technologies used by Google for the purpose of tailoring search results for individual users create filter bubbles, which reinforce users’ political views. Surprisingly, empirical evidence for a personalization-induced filter bubble has not been forthcoming. Here, we investigate whether filter bubbles may result instead from a searcher’s choice of search queries. In the first experiment, participants rated the left-right leaning of 48 queries (search strings), 6 for each of 8 topics (abortion, benefits, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  18
    Filtering Friendship through Phronesis: ‘One Thought too Many’?Kristján Kristjánsson - 2020 - Philosophy 95 (1):113-137.
    An adequate moral theory must – or so many philosophers have argued – be compatible with the attitudes and practical requirements of deep friendship. Bernard Williams suggested that the decision procedure required by both deontology and consequentialism inserts a fetishising filter between the natural moral motivation of any normal person to prioritise friends and the decision to act on it. But this injects ‘one thought too many’ into the moral reaction mechanism. It is standardly assumed that virtue ethics is (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  48.  48
    A Filter lambda model and the completeness of type assignment.Henk Barendregt, Mario Coppo & Mariangiola Dezani-Ciancaglini - 1983 - Journal of Symbolic Logic 48 (4):931-940.
  49.  10
    Command Filtering and Barrier Lyapunov Function-Based Adaptive Control for PMSMs with Core Losses and All-State Restrictions.Xiaoling Wang & Jinpeng Yu - 2021 - Complexity 2021:1-12.
    With the troubles of core losses and all-state confined to certain limitations which are the innate traits of permanent magnet synchronous motors, this article develops a command filtered adaptive backstepping approach to follow the track of PMSM’s desired rotor position. To begin with, the RBF neural network technique is utilized to get close to the uncharted nonlinear terms which existed in PMSM’s mathematical model. Meanwhile, an advanced adaptive command filter control methodology is constructed to avoid the computing explosion during (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  30
    From filters to fillers: an active inference approach to body image distortion in the selfie era.Simon C. Tremblay, Safae Essafi Tremblay & Pierre Poirier - 2020 - AI and Society (1):1-16.
    Advances in artificial intelligence, as well as its increased presence in everyday life, have brought the emergence of many new phenomena, including an intriguing appearance of what seems to be a variant of body dysmorphic disorder, coined “Snapchat dysmorphia”. Body dysmorphic disorder is a DSM-5 psychiatric disorder defined as a preoccupation with one or more perceived defects or flaws in physical appearance that are not observable or appear slight to others. Snapchat dysmorphia is fueled by automated selfie filters that reflect (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 1000