Theories on the Origin of Language: Divine, Natural, Physical
The Divine Source
In the Hindu tradition, language came from Sarasvati, wife of Brahma, the creator of the universe.
In the Biblical source, specifically the book of Genesis, God created Adam and “whatsoever Adam called every living creature, that was the name thereof.”
The basic assumption of the Divine Source Theory is that if human infants were allowed to grow up without hearing any language around them, then they would spontaneously begin using the original God-given language.
The Experiment
Read MoreInternet of Things (IoT), Embedded Systems, and Machine Learning Fundamentals
Chapter 1: Internet of Things (IoT)
IoT = Thing + Computational Intelligence + Connection to the Internet -> can produce a lot of data
Uniquely identifiable embedded systems (Things) connected with the internet infrastructure
Node devices (things) collect data from sensors -> data sent to the internet through a gateway
Things and gateways are considered as “edges”
Parts: Microcontroller, Expansion board and battery, Sensors and actuators
Chapter 2: Embedded Systems
Embedded systems are special-
Read MoreFeminist Retelling of Bluebeard in Angela Carter’s ‘The Bloody Chamber’
Angela Carter’s “The Bloody Chamber” is based on the legend of Bluebeard. Carter preserves the legend’s plot, casting the Marquis in the role of Bluebeard, who kills his wives and stores their corpses in a secret chamber. Like Bluebeard, the Marquis entices each new wife to explore the forbidden chamber and then kills her once she has discovered his secret. Carter goes so far as to reference the Bluebeard legend toward the end of “The Bloody Chamber.” When the heroine’s mother storms the Marquis’
Read MoreUnderstanding Additive Models and the Curse of Dimensionality
Curse of Dimensionality
7.0 AM; 7.1 Curse of Dimensionality (Richard Bellman): The problem of estimating f becomes vastly harder as p, the dimension of x, increases.
Nonparametric regression model: y=f(x)+e
Minor assumptions:
- The xi are measured without error.
- The ei are independently and identically distributed (i.i.d.) with mean 0.
- Variance of the ei values = unknown constant σ.
Common assumptions:
- f is in a Sobolev space (functions with bounded derivatives).
- f has a bounded number of discontinuities.
Digital Signal Processing: Functions and Implementations
Impulse Response
n =- 10:1:30; b = [-1 2 3 6 ...]; A = 1, x = zeros (1,41), x (11) = 1, y1 = filter (B, A, x), stem (n, y1), grid;
Zero-Pole Plot (Zerpol)
function [zeros, poles] = zerpol (B, A); bs = roots (B), as = roots (A); zeros = bs; poles = as; polar (angle (bs), abs (as), 'x') hold off;
Frequency Response (Respfrec)
function [module, phase, frequency] = respfrec (B, A, nfrec) linespace frequency = (0,0.5, nfrec), b = B (length (B): -1:1); a = A (length ( A): -1:1); polyval numerator = (b, exp
Computer Systems and Network Security Essentials
Why Aren’t All Computer Systems Secure?
- Cost/Benefit Issues
- Security Costs
- Users perceive no personal threat to themselves
- Ignorance
Legacy and Retrofitting
- We are constrained by legacy issues:
- Core Internet design
- Popular programming languages
- Commercial operating systems
- All developed before security was a concern
- Retrofitting security works poorly
Problems With Patching
- Usually done under pressure:
- So generally quick and dirty
- Tends to deal with obvious and immediate problem:
- Not with underlying cause
- Hard