Spelling suggestions: "subject:"worse core"" "subject:"horse core""
1 |
The construction and evaluation of the International Morse Code Selection Test.Woehlke, Arnold Benjamin January 1956 (has links)
Thesis (Ed.D.)--Boston University.
|
2 |
The effects of reinforcement at high speed in the learning of telegraphic codeBice, Raymond Curtis, January 1954 (has links)
Thesis (Ph. D.)--University of Wisconsin--Madison, 1954. / Typescript. Vita. eContent provider-neutral record in process. Description based on print version record. Includes bibliographical references (leaves 92-95).
|
3 |
Stimulus generalization in Morse code learningPlotkin, Lawrence, January 1943 (has links)
Issued also as Thesis (Ph. D.)--Columbia University. / Bibliography: p. 38.
|
4 |
Morse Code Communication Aid for the HandicappedCallway, E.G. 04 1900 (has links)
<p> A microprocessor driven display was built and programmed for the storage and reproduction of Bliss symbols. An explanation is offered for the success of the symbol language in teaching the handicapped. </p> <p> The hardware was designed to be inexpensive enough for classroom use, but still deliver adequate flexibility and resolution. Due to the complexity and variety of the symbols a method of data compaction was developed to reduce the required storage space. </p> <p> Initial tests are presented and suggestions are made for continuing the work. </p> / Thesis / Master of Engineering (ME)
|
5 |
The Mystery of the “Althorn (Alto Horn) Sonata” (1943) by Paul HindemithHemken, Jennifer Ann 08 1900 (has links)
A unique and significant composition, the Althorn Sonata by Paul Hindemith contains several enigmas and anomalies: details about the premiere remain unknown; scored for the alto horn, a band instrument of the late nineteenth and early twentieth century, the piece seldom finds itself performed on that instrument; although Hindemith composed his instrumental sonatas as composition exercises, for the instruments he intended to use in his large-scale works, his sonata for alto horn marks an unusual exception; the work evolves through Baroque sonata da chiesa form; a Morse code message from a Renaissance painter appears in the second movement, along with references to numerology; and, after the third movement, the horn player and pianist recite a poem, penned by the composer, which becomes musically depicted in the final movement. Hindemith’s apparent fondness, for the art of word play, proves the inspiration for enigmas and anomalies found in this sonata. The key to his mystery lies in plain sight: “Alt” translates as both “alto” and “old.” The purpose of this dissertation is to unveil to the musical world, especially to horn and saxophone players, the several enigmas and anomalies found in Hindemith’s Althorn Sonata. By exposing the nature and depth of this mystery, it will illuminate the intellectual prowess of Paul Hindemith, elevating his Althorn Sonata to a place it deserves in the horn repertoire.
|
6 |
RemnantsSmith, Andrew Martin 15 April 2009 (has links)
No description available.
|
7 |
THE ASSESSMENT AND PROCESSING OF TACTILE SENSORY LEARNINGPassmore, Robert Steven 04 1900 (has links)
<p>This dissertation examined perturbation effects during complex tactile information transmission. The four experiments provide evidence regarding sensory and information processing demands in early stages of complex tactile learning.</p> <p>Experiment 1 established complex tactile learning behavioural performance. Vibrotactile stimuli representing Morse code letters were communicated to participants with or without induced perturbation to the finger of letter reception. Response performance was measured and augmented feedback was provided retroactively. Perturbation conditions lead to poor performance during tactile acquisition, but improved performance during application of knowledge.</p> <p>Experiment 2 determined if the experiment 1 results demonstrated masking or response competition paradigms. Target “masking” is the reduced ability to detect or interpret a stimuli pattern by presentation of other information (Craig, 1985; Verrillo, 1985). Response competition is the competition or distraction from target response generation by secondary stimuli (Craig, 2000; Bolanowski et al., 2000). Experiment 2 tested response competition by spatially separating the perturbation and tactile information delivery sites.</p> <p>Experiments 3 and 4 served to replicate behavioural acquisition data from experiments 1 and 2. They also extended the findings of the first two experiments by introducing neurophysiological measurement to reflect the changes associated with the two perturbation conditions. The study discerned whether the masking and response competition paradigms from experiments 1 and 2 were predominantly impacting the peripheral or central information processing.</p> <p>Results from the four studies collectively demonstrate that increased demands are placed on the sensory system during early stages of complex tactile learning when perturbation is spatially congruent with tactile information delivery. Experiments 1 and 2 revealed that attention does not supersede spatial location of perturbation, and perturbation location is paramount to yield sufficient interference to impede acquisition yet lead to enhanced knowledge retention and transfer. Experiments 3 and 4 determined that cortical information processing associated with complex tactile information acquisition are neurophysiologically differentiated when relative locations of meaningful and perturbation stimuli are congruent or spatially separated. The findings from this dissertation serve as an advancement of our understanding of masking and response competition phenomenon as they pertain to complex tactile learning.</p> / Doctor of Philosophy (PhD)
|
8 |
The Morse Code Room: Applicability of the Chinese Room Argument to Spiking Neural NetworksBrinz, Johannes 24 February 2023 (has links)
The Chinese room argument (CRA) was first stated in 1980. Since then computer technologies have improved and today spiking neural networks (SNNs) are “arguably the only viable option if one wants to understand how the brain computes.” (Tavanei et.al. 2019: 47) SNNs differ in various important respects from the digital computers the CRA was directed against. The objective of the present work is to explore whether the CRA applies to SNNs. In the first chapter I am going to discuss computationalism, the Chinese room argument and give a brief overview over spiking neural networks. The second chapter is going to be considered with five important differences between SNNs and digital computers: (1) Massive parallelism, (2) subsymbolic computation, (3) machine learning, (4) analogue representation and (5) temporal encoding. I am going to finish by concluding that, besides minor limitations, the Chinese room argument can be applied to spiking neural networks.:1 Introduction
2 Theoretical background
2.I Strong AI: Computationalism
2.II The Chinese room argument
2.III Spiking neural networks
3 Applicability to spiking neural networks
3.I Massive parallelism
3.II Subsymbolic computation
3.III Machine learning
3.IV Analogue representation
3.V Temporal encoding
3.VI The Morse code room and its replies
3.VII Some more general considerations regarding hardware
and software
4 Conclusion / Das Argument vom chinesischen Zimmer wurde erstmals 1980 veröffentlicht. Seit dieser Zeit hat sich die Computertechnologie stark weiterentwickelt und die heute viel beachteten gepulsten neuronalen Netze ähneln stark dem Aufbau und der Arbeitsweise biologischer Gehirne. Gepulste neuronale Netze unterscheiden sich in verschiedenen wichtigen Aspekten von den digitalen Computern, gegen die die CRA gerichtet war. Das Ziel der vorliegenden Arbeit ist es, zu untersuchen, ob das Argument vom chinesischen Zimmer auf gepulste neuronale Netze anwendbar ist. Im ersten Kapitel werde ich den Computer-Funktionalismus und das Argument des chinesischen Zimmers erörtern und einen kurzen Überblick über gepulste neuronale Netze geben. Das zweite Kapitel befasst sich mit fünf wichtigen Unterschieden zwischen gepulsten neuronalen Netzen und digitalen Computern: (1) Massive Parallelität, (2) subsymbolische Berechnung, (3) maschinelles Lernen, (4) analoge Darstellung und (5) zeitliche Kodierung. Ich werde schlussfolgern, dass das Argument des chinesischen Zimmers, abgesehen von geringfügigen Einschränkungen, auf gepulste neuronale Netze angewendet werden kann.:1 Introduction
2 Theoretical background
2.I Strong AI: Computationalism
2.II The Chinese room argument
2.III Spiking neural networks
3 Applicability to spiking neural networks
3.I Massive parallelism
3.II Subsymbolic computation
3.III Machine learning
3.IV Analogue representation
3.V Temporal encoding
3.VI The Morse code room and its replies
3.VII Some more general considerations regarding hardware
and software
4 Conclusion
|
Page generated in 0.0653 seconds