Theories on the Origin of Language: Divine, Natural, Physical

The Divine Source

In the Hindu tradition, language came from Sarasvati, wife of Brahma, the creator of the universe.

In the Biblical source, specifically the book of Genesis, God created Adam and “whatsoever Adam called every living creature, that was the name thereof.”

The basic assumption of the Divine Source Theory is that if human infants were allowed to grow up without hearing any language around them, then they would spontaneously begin using the original God-given language.

The Experiment

Read More

Internet of Things (IoT), Embedded Systems, and Machine Learning Fundamentals

Chapter 1: Internet of Things (IoT)

IoT = Thing + Computational Intelligence + Connection to the Internet -> can produce a lot of data

Uniquely identifiable embedded systems (Things) connected with the internet infrastructure

Node devices (things) collect data from sensors -> data sent to the internet through a gateway

Things and gateways are considered as “edges”

Parts: Microcontroller, Expansion board and battery, Sensors and actuators

Chapter 2: Embedded Systems

Embedded systems are special-

Read More

Feminist Retelling of Bluebeard in Angela Carter’s ‘The Bloody Chamber’

Angela Carter’s “The Bloody Chamber” is based on the legend of Bluebeard. Carter preserves the legend’s plot, casting the Marquis in the role of Bluebeard, who kills his wives and stores their corpses in a secret chamber. Like Bluebeard, the Marquis entices each new wife to explore the forbidden chamber and then kills her once she has discovered his secret. Carter goes so far as to reference the Bluebeard legend toward the end of “The Bloody Chamber.” When the heroine’s mother storms the Marquis’

Read More

Understanding Additive Models and the Curse of Dimensionality

Curse of Dimensionality

7.0 AM; 7.1 Curse of Dimensionality (Richard Bellman): The problem of estimating f becomes vastly harder as p, the dimension of x, increases.

Nonparametric regression model: y=f(x)+e

Minor assumptions:

  1. The xi are measured without error.
  2. The ei are independently and identically distributed (i.i.d.) with mean 0.
  3. Variance of the ei values = unknown constant σ.

Common assumptions:

  1. f is in a Sobolev space (functions with bounded derivatives).
  2. f has a bounded number of discontinuities.
Read More

Digital Signal Processing: Functions and Implementations

Impulse Response

n =- 10:1:30; b = [-1 2 3 6 ...]; A = 1, x = zeros (1,41), x (11) = 1, y1 = filter (B, A, x), stem (n, y1), grid;

Zero-Pole Plot (Zerpol)

function [zeros, poles] = zerpol (B, A); bs = roots (B), as = roots (A); zeros = bs; poles = as; polar (angle (bs), abs (as), 'x') hold off;

Frequency Response (Respfrec)

function [module, phase, frequency] = respfrec (B, A, nfrec) linespace frequency = (0,0.5, nfrec), b = B (length (B): -1:1); a = A (length ( A): -1:1); polyval numerator = (b, exp

Read More

Computer Systems and Network Security Essentials

Why Aren’t All Computer Systems Secure?

  • Cost/Benefit Issues
  • Security Costs
  • Users perceive no personal threat to themselves
  • Ignorance

Legacy and Retrofitting

  • We are constrained by legacy issues:
    • Core Internet design
    • Popular programming languages
    • Commercial operating systems
  • All developed before security was a concern
  • Retrofitting security works poorly

Problems With Patching

  • Usually done under pressure:
    • So generally quick and dirty
  • Tends to deal with obvious and immediate problem:
    • Not with underlying cause
  • Hard
Read More