13,648 research outputs found
Recommended from our members
Ensuring Access to Safe and Nutritious Food for All Through the Transformation of Food Systems
Grasping nothing: a study of minimal ontologies and the sense of music
If music were to have a proper sense – one in which it is truly given – one might reasonably place this in sound and aurality. I contend, however, that no such sense exists; rather, the sense of music takes place, and it does so with the impossible. To this end, this thesis – which is a work of philosophy and music – advances an ontology of the impossible (i.e., it thinks the being of what, properly speaking, can have no being) and considers its implications for music, articulating how ontological aporias – of the event, of thinking the absolute, and of sovereignty’s dismemberment – imply senses of music that are anterior to sound. John Cage’s Silent Prayer, a nonwork he never composed, compels a rerethinking of silence on the basis of its contradictory status of existence; Florian Hecker et al.’s Speculative Solution offers a basis for thinking absolute music anew to the precise extent that it is a discourse of meaninglessness; and Manfred Werder’s [yearn] pieces exhibit exemplarily that music’s sense depends on the possibility of its counterfeiting. Inso-much as these accounts produce musical senses that take the place of sound, they are also understood to be performances of these pieces. Here, then, thought is music’s organon and its instrument
Countermeasures for the majority attack in blockchain distributed systems
La tecnologÃa Blockchain es considerada como uno de los paradigmas informáticos más importantes posterior al Internet; en función a sus caracterÃsticas únicas que la hacen ideal para registrar, verificar y administrar información de diferentes transacciones. A pesar de esto, Blockchain se enfrenta a diferentes problemas de seguridad, siendo el ataque del 51% o ataque mayoritario uno de los más importantes. Este consiste en que uno o más mineros tomen el control de al menos el 51% del Hash extraÃdo o del cómputo en una red; de modo que un minero puede manipular y modificar arbitrariamente la información registrada en esta tecnologÃa. Este trabajo se enfocó en diseñar e implementar estrategias de detección y mitigación de ataques mayoritarios (51% de ataque) en un sistema distribuido Blockchain, a partir de la caracterización del comportamiento de los mineros. Para lograr esto, se analizó y evaluó el Hash Rate / Share de los mineros de Bitcoin y Crypto Ethereum, seguido del diseño e implementación de un protocolo de consenso para controlar el poder de cómputo de los mineros. Posteriormente, se realizó la exploración y evaluación de modelos de Machine Learning para detectar software malicioso de tipo Cryptojacking.DoctoradoDoctor en IngenierÃa de Sistemas y Computació
Global Convergence of SGD On Two Layer Neural Nets
In this note we demonstrate provable convergence of SGD to the global minima
of appropriately regularized empirical risk of depth nets -- for
arbitrary data and with any number of gates, if they are using adequately
smooth and bounded activations like sigmoid and tanh. We build on the results
in [1] and leverage a constant amount of Frobenius norm regularization on the
weights, along with sampling of the initial weights from an appropriate
distribution. We also give a continuous time SGD convergence result that also
applies to smooth unbounded activations like SoftPlus. Our key idea is to show
the existence loss functions on constant sized neural nets which are "Villani
Functions". [1] Bin Shi, Weijie J. Su, and Michael I. Jordan. On learning rates
and schr\"odinger operators, 2020. arXiv:2004.06977Comment: 23 pages, 6 figures. Extended abstract accepted at DeepMath 2022. v2
update: New experiments added in Section 3.2 to study the effect of the
regularization value. Statement of Theorem 3.4 about SoftPlus nets has been
improve
Consent and the Construction of the Volunteer: Institutional Settings of Experimental Research on Human Beings in Britain during the Cold War
This study challenges the primacy of consent in the history of human experimentation and argues that privileging the cultural frameworks adds nuance to our understanding of the construction of the volunteer in the period 1945 to 1970. Historians and bio-ethicists have argued that medical ethics codes have marked out the parameters of using people as subjects in medical scientific research and that the consent of the subjects was fundamental to their status as volunteers. However, the temporality of the creation of medical ethics codes means that they need to be understood within their historical context. That medical ethics codes arose from a specific historical context rather than a concerted and conscious determination to safeguard the well-being of subjects needs to be acknowledged. The British context of human experimentation is under-researched and there has been even less focus on the cultural frameworks within which experiments took place. This study demonstrates, through a close analysis of the Medical Research Council's Common Cold Research Unit (CCRU) and the government's military research facility, the Chemical Defence Experimental Establishment, Porton Down (Porton), that the `volunteer' in human experiments was a subjective entity whose identity was specific to the institution which recruited and made use of the subject. By examining representations of volunteers in the British press, the rhetoric of the government's collectivist agenda becomes evident and this fed into the institutional construction of the volunteer at the CCRU. In contrast, discussions between Porton scientists, staff members, and government officials demonstrate that the use of military personnel in secret chemical warfare experiments was far more complex. Conflicting interests of the military, the government and the scientific imperative affected how the military volunteer was perceived
Assessing the Effects of Instream Large Wood on Floodplain Aquifer Recharge and Storage at Indian Creek, Kittitas County, Washington, USA
Numerous stream restoration projects in the Yakima River Basin in Washington have placed large wood (LW) into tributary channels. One intended effect is to divert water onto floodplains to increase groundwater (GW) recharge and seasonal storage in shallow alluvial aquifers during spring high flows with the intention of releasing GW into streams during the drier summer months. Large wood was emplaced in the Indian Creek tributary of the Teanaway River in Kittitas County, Washington beginning in 2016. Potential changes in the groundwater recharge in the adjacent floodplain before and after the LW installation were investigated through stratigraphic analysis, stream-flow modeling, and GW levels in six piezometers installed in 2014 and 2018. Stratigraphic descriptions of the stream banks reveal a ubiquitous silt/clay dominant layer (60-90 cm thick) at a depth of 1 meter or less, overlying a sand and gravel layer (15-50 cm thick), a clay/silt layer (~30 cm thick), and another sand and gravel layer. These relatively continuous clay layers extend at least 2.2 km upstream from the mouth of Indian Creek on both sides of the channel. Similar clay units have been mapped in the region as glacial drift or lacustrine deposits. The measured stream flow and GW levels in the monitoring wells before and after the LW emplacement show no detectable effect of the LW on seasonal or longer-term GW levels. Data loggers show that GW levels return to baseflow within days of monthly precipitation exceeding 70 mm, suggesting GW flow within the permeable sand and gravel layers beneath or between the clay/silt layers. Available data show that the highest spring GW elevations precede peak stream discharge, indicating that the peak streamflow is not a significant source of GW recharge. A 1-dimensional hydraulic model run with and without channel obstructions at spring monthly average discharge and peak discharge suggests that the water surface elevation may increase ~10-50 cm within and upstream of LW. This assessment of stratigraphy coupled with GW data and stream-flow model can provide insight into the effectiveness of GW recharge from LW restoration projects in similar settings within the region
Strategies for Early Learners
Welcome to learning about how to effectively plan curriculum for young children. This textbook will address: • Developing curriculum through the planning cycle • Theories that inform what we know about how children learn and the best ways for teachers to support learning • The three components of developmentally appropriate practice • Importance and value of play and intentional teaching • Different models of curriculum • Process of lesson planning (documenting planned experiences for children) • Physical, temporal, and social environments that set the stage for children’s learning • Appropriate guidance techniques to support children’s behaviors as the self-regulation abilities mature. • Planning for preschool-aged children in specific domains including o Physical development o Language and literacy o Math o Science o Creative (the visual and performing arts) o Diversity (social science and history) o Health and safety • Making children’s learning visible through documentation and assessmenthttps://scholar.utc.edu/open-textbooks/1001/thumbnail.jp
A reinforcement learning approach for transaction scheduling in a shuttle-based storage and retrieval system
With recent Industry 4.0 developments, companies tend to automate their industries. Warehousing companies also take part in this trend. A shuttle-based storage and retrieval system (SBS/RS) is an automated storage and retrieval system technology experiencing recent drastic market growth. This technology is mostly utilized in large distribution centers processing mini-loads. With the recent increase in e-commerce practices, fast delivery requirements with low volume orders have increased. SBS/RS provides ultrahigh-speed load handling due to having an excess amount of shuttles in the system. However, not only the physical design of an automated warehousing technology but also the design of operational system policies would help with fast handling targets. In this work, in an effort to increase the performance of an SBS/RS, we apply a machine learning (ML) (i.e., Q-learning) approach on a newly proposed tier-to-tier SBS/RS design, redesigned from a traditional tier-captive SBS/RS. The novelty of this paper is twofold: First, we propose a novel SBS/RS design where shuttles can travel between tiers in the system; second, due to the complexity of operation of shuttles in that newly proposed design, we implement an ML-based algorithm for transaction selection in that system. The ML-based solution is compared with traditional scheduling approaches: first-in-first-out and shortest process time (i.e., travel) scheduling rules. The results indicate that in most cases, the Q-learning approach performs better than the two static scheduling approaches
- …