Searching for identification : 140 results found | RSS Feed for this search

1 2 3 4 5 6

24.500 Topics in Philosophy of Mind: Self-Knowledge (MIT) 24.500 Topics in Philosophy of Mind: Self-Knowledge (MIT)

Description

This is a seminar on "self-knowledge" -- knowledge of one's own mental states. In addition to reading some of the classic papers on self-knowledge, we will look at some very recent work on the topic. There will be no lectures. Each week I will spend half an hour or so introducing the assigned reading, and the rest of the time will be devoted to discussion. This is a seminar on "self-knowledge" -- knowledge of one's own mental states. In addition to reading some of the classic papers on self-knowledge, we will look at some very recent work on the topic. There will be no lectures. Each week I will spend half an hour or so introducing the assigned reading, and the rest of the time will be devoted to discussion.

Subjects

Philosophy | Philosophy | transparency | transparency | mind | mind | self-knowledge | self-knowledge | mental states | mental states | externalist | externalist | individualism | individualism | warrant transmission | warrant transmission | misidentification | misidentification | self-identification | self-identification | expressivism | expressivism | neo-expressivism | neo-expressivism

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-24.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Atlas Details: Antenna TIAS Installation; Back View Date: 02/07/1968 Atlas Details: Antenna TIAS Installation; Back View Date: 02/07/1968

Description

Subjects

airplane | airplane | aircraft | aircraft | aviation | aviation | ibm | ibm | ew | ew | a6 | a6 | intruder | intruder | militaryaviation | militaryaviation | pw | pw | radome | radome | tias | tias | navalaviation | navalaviation | prattwhitney | prattwhitney | sead | sead | internationalbusinessmachines | internationalbusinessmachines | electronicwarfare | electronicwarfare | ironhand | ironhand | j52 | j52 | a6intruder | a6intruder | grummana6intruder | grummana6intruder | a6b | a6b | suppressionofenemyairdefenses | suppressionofenemyairdefenses | aps118 | aps118 | grummanintruder | grummanintruder | grummana6 | grummana6 | prattwhitneyj52 | prattwhitneyj52 | grummana6bintruder | grummana6bintruder | a6bintruder | a6bintruder | pwj52 | pwj52 | grummana6b | grummana6b | aps118tias | aps118tias | aps118targetidentificationacquisitionsystem | aps118targetidentificationacquisitionsystem | ibmaps118 | ibmaps118 | targetidentificationacquisitionsystem | targetidentificationacquisitionsystem

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=49487266@N07&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT) 6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment. 6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | network | computer security | computer security | security | security | cryptography | cryptography | secret-key | secret-key | public-key | public-key | digital signature | digital signature | authentication | authentication | identification | identification | intrusion detection | intrusion detection | virus | virus | operating system | operating system | software | software | protection | protection | electronic mail | electronic mail | email | email | electronic commerce | electronic commerce | electronic cash | electronic cash | firewall | firewall | computer | computer | digital | digital | signature | signature | electronic | electronic | cash | cash | commerce | commerce | mail | mail | operating | operating | system | system | intrustion | intrustion | detection | detection | distributed | distributed | physical | physical | discretionary | discretionary | mandatory | mandatory | access | access | control | control | biometrics | biometrics | information | information | flow | flow | models | models | covert | covert | channels | channels | integrity | integrity | logic | logic | voting | voting | risk | risk | assessment | assessment | secure | secure | web | web | browsers | browsers | architecture | architecture | engineering | engineering | certificates | certificates | multi-user computer systems | multi-user computer systems | distributed computer systems | distributed computer systems | physical security | physical security | discretionary access control | discretionary access control | mandatory access control | mandatory access control | information-flow models | information-flow models | covert channels | covert channels | integrity models | integrity models | elementary cryptography | elementary cryptography | authentication logic;electronic cash | authentication logic;electronic cash | viruses | viruses | firewalls | firewalls | electronic voting | electronic voting | risk assessment | risk assessment | secure web browsers | secure web browsers | network security | network security | architecture engineering | architecture engineering | digital signatures | digital signatures | authentication schemes | authentication schemes | identification schemes | identification schemes | formal models | formal models | secure operating systems | secure operating systems | software protection | software protection | electronic mail security | electronic mail security | World Wide Web | World Wide Web | ecommerce | ecommerce | email security | email security | www | www | payment protocols | payment protocols | authentication logic | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

2.160 Identification, Estimation, and Learning (MIT) 2.160 Identification, Estimation, and Learning (MIT)

Description

This course provides a broad theoretical basis for system identification, estimation, and learning. Students will study least squares estimation and its convergence properties, Kalman filters, noise dynamics and system representation, function approximation theory, neural nets, radial basis functions, wavelets, Volterra expansions, informative data sets, persistent excitation, asymptotic variance, central limit theorems, model structure selection, system order estimate, maximum likelihood, unbiased estimates, Cramer-Rao lower bound, Kullback-Leibler information distance, Akaike's information criterion, experiment design, and model validation. This course provides a broad theoretical basis for system identification, estimation, and learning. Students will study least squares estimation and its convergence properties, Kalman filters, noise dynamics and system representation, function approximation theory, neural nets, radial basis functions, wavelets, Volterra expansions, informative data sets, persistent excitation, asymptotic variance, central limit theorems, model structure selection, system order estimate, maximum likelihood, unbiased estimates, Cramer-Rao lower bound, Kullback-Leibler information distance, Akaike's information criterion, experiment design, and model validation.

Subjects

system identification; estimation; least squares estimation; Kalman filter; noise dynamics; system representation; function approximation theory; neural nets; radial basis functions; wavelets; volterra expansions; informative data sets; persistent excitation; asymptotic variance; central limit theorem; model structure selection; system order estimate; maximum likelihood; unbiased estimates; Cramer-Rao lower bound; Kullback-Leibler information distance; Akaike?s information criterion; experiment design; model validation. | system identification; estimation; least squares estimation; Kalman filter; noise dynamics; system representation; function approximation theory; neural nets; radial basis functions; wavelets; volterra expansions; informative data sets; persistent excitation; asymptotic variance; central limit theorem; model structure selection; system order estimate; maximum likelihood; unbiased estimates; Cramer-Rao lower bound; Kullback-Leibler information distance; Akaike?s information criterion; experiment design; model validation. | system identification | system identification | estimation | estimation | least squares estimation | least squares estimation | Kalman filter | Kalman filter | noise dynamics | noise dynamics | system representation | system representation | function approximation theory | function approximation theory | neural nets | neural nets | radial basis functions | radial basis functions | wavelets | wavelets | volterra expansions | volterra expansions | informative data sets | informative data sets | persistent excitation | persistent excitation | asymptotic variance | asymptotic variance | central limit theorem | central limit theorem | model structure selection | model structure selection | system order estimate | system order estimate | maximum likelihood | maximum likelihood | unbiased estimates | unbiased estimates | Cramer-Rao lower bound | Cramer-Rao lower bound | Kullback-Leibler information distance | Kullback-Leibler information distance | Akaike?s information criterion | Akaike?s information criterion | experiment design | experiment design | model validation | model validation

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

16.888 Multidisciplinary System Design Optimization (MIT) 16.888 Multidisciplinary System Design Optimization (MIT)

Description

This course is mainly focused on the quantitative aspects of design and presents a unifying framework called "Multidisciplinary System Design Optimization" (MSDO). The objective of the course is to present tools and methodologies for performing system optimization in a multidisciplinary design context, focusing on three aspects of the problem: (i) The multidisciplinary character of engineering systems, (ii) design of these complex systems, and (iii) tools for optimization. There is a version of this course (16.60s) offered through the MIT Professional Institute, targeted at professional engineers. This course is mainly focused on the quantitative aspects of design and presents a unifying framework called "Multidisciplinary System Design Optimization" (MSDO). The objective of the course is to present tools and methodologies for performing system optimization in a multidisciplinary design context, focusing on three aspects of the problem: (i) The multidisciplinary character of engineering systems, (ii) design of these complex systems, and (iii) tools for optimization. There is a version of this course (16.60s) offered through the MIT Professional Institute, targeted at professional engineers.

Subjects

optimization | optimization | multidisciplinary design optimization | multidisciplinary design optimization | MDO | MDO | subsystem identification | subsystem identification | interface design | interface design | linear constrained optimization fomulation | linear constrained optimization fomulation | non-linear constrained optimization formulation | non-linear constrained optimization formulation | scalar optimization | scalar optimization | vector optimization | vector optimization | systems engineering | systems engineering | complex systems | complex systems | heuristic search methods | heuristic search methods | tabu search | tabu search | simulated annealing | simulated annealing | genertic algorithms | genertic algorithms | sensitivity | sensitivity | tradeoff analysis | tradeoff analysis | goal programming | goal programming | isoperformance | isoperformance | pareto optimality | pareto optimality | flowchart | flowchart | design vector | design vector | simulation model | simulation model | objective vector | objective vector | input | input | discipline | discipline | output | output | coupling | coupling | multiobjective optimization | multiobjective optimization | optimization algorithms | optimization algorithms | tradespace exploration | tradespace exploration | numerical techniques | numerical techniques | direct methods | direct methods | penalty methods | penalty methods | heuristic techniques | heuristic techniques | SA | SA | GA | GA | approximation methods | approximation methods | sensitivity analysis | sensitivity analysis | isoperformace | isoperformace | output evaluation | output evaluation | MSDO framework | MSDO framework

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allpersiancourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

SP.776 Design for Demining (MIT) SP.776 Design for Demining (MIT)

Description

Humanitarian Demining is the process of detecting, removing and disposing of landmines. Millions of landmines are buried in more than 80 countries resulting in 20,000 civilian victims every year. MIT Design for Demining is a design course that spans the entire product design and development process from identification of needs and idea generation to prototyping and blast testing to manufacture and deployment. Technical, business and customer aspects are addressed. Students learn about demining while they design, develop and deliver devices to aid the demining community. Past students have invented or improved hand tools, protective gear, safety equipment, educational graphics and teaching materials. Some tools designed in previous years are in use worldwide in the thousands. Course work is Humanitarian Demining is the process of detecting, removing and disposing of landmines. Millions of landmines are buried in more than 80 countries resulting in 20,000 civilian victims every year. MIT Design for Demining is a design course that spans the entire product design and development process from identification of needs and idea generation to prototyping and blast testing to manufacture and deployment. Technical, business and customer aspects are addressed. Students learn about demining while they design, develop and deliver devices to aid the demining community. Past students have invented or improved hand tools, protective gear, safety equipment, educational graphics and teaching materials. Some tools designed in previous years are in use worldwide in the thousands. Course work is

Subjects

humanitarian demining | humanitarian demining | landmines | landmines | landmine detection | landmine detection | landmine removal | landmine removal | landmine disposal | landmine disposal | landmines in 80 countries | landmines in 80 countries | 20 | 000 civilian victims per year | 20 | 000 civilian victims per year | MIT Design for Demining | MIT Design for Demining | product design | product design | development process | development process | identification of needs | identification of needs | idea generation | idea generation | prototyping | prototyping | blast testing | blast testing | manufacture | manufacture | deployment | deployment | demining community | demining community | hand tools | hand tools | protective gear | protective gear | safety equipment | safety equipment | educational graphics | educational graphics | teaching materials | teaching materials | field trip | field trip | US Army base | US Army base | demining training | demining training

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

2.160 Identification, Estimation, and Learning (MIT)

Description

This course provides a broad theoretical basis for system identification, estimation, and learning. Students will study least squares estimation and its convergence properties, Kalman filters, noise dynamics and system representation, function approximation theory, neural nets, radial basis functions, wavelets, Volterra expansions, informative data sets, persistent excitation, asymptotic variance, central limit theorems, model structure selection, system order estimate, maximum likelihood, unbiased estimates, Cramer-Rao lower bound, Kullback-Leibler information distance, Akaike's information criterion, experiment design, and model validation.

Subjects

system identification; estimation; least squares estimation; Kalman filter; noise dynamics; system representation; function approximation theory; neural nets; radial basis functions; wavelets; volterra expansions; informative data sets; persistent excitation; asymptotic variance; central limit theorem; model structure selection; system order estimate; maximum likelihood; unbiased estimates; Cramer-Rao lower bound; Kullback-Leibler information distance; Akaike?s information criterion; experiment design; model validation. | system identification | estimation | least squares estimation | Kalman filter | noise dynamics | system representation | function approximation theory | neural nets | radial basis functions | wavelets | volterra expansions | informative data sets | persistent excitation | asymptotic variance | central limit theorem | model structure selection | system order estimate | maximum likelihood | unbiased estimates | Cramer-Rao lower bound | Kullback-Leibler information distance | Akaike?s information criterion | experiment design | model validation

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

14.385 Nonlinear Econometric Analysis (MIT) 14.385 Nonlinear Econometric Analysis (MIT)

Description

This course presents micro-econometric models, including large sample theory for estimation and hypothesis testing, generalized method of moments (GMM), estimation of censored and truncated specifications, quantile regression, structural estimation, nonparametric and semiparametric estimation, treatment effects, panel data, bootstrapping, simulation methods, and Bayesian methods. The methods are illustrated with economic applications. This course presents micro-econometric models, including large sample theory for estimation and hypothesis testing, generalized method of moments (GMM), estimation of censored and truncated specifications, quantile regression, structural estimation, nonparametric and semiparametric estimation, treatment effects, panel data, bootstrapping, simulation methods, and Bayesian methods. The methods are illustrated with economic applications.

Subjects

nonlinear | nonlinear | econometric | econometric | analysis | analysis | generalized method of moments | generalized method of moments | GMM | GMM | maximum likelihood estimation | maximum likelihood estimation | MLE | MLE | minimum distance | minimum distance | extremum | extremum | large sample theory | large sample theory | asymptotic theory | asymptotic theory | discrete choice | discrete choice | censoring | censoring | sample selection | sample selection | bootstrap | bootstrap | subsampling | subsampling | finite-sample methods | finite-sample methods | quantile regression | quantile regression | QR | QR | distributional methods | distributional methods | Bayesian methods | Bayesian methods | quasi-Bayesian methods | quasi-Bayesian methods | bounds | bounds | partial identification | partial identification | weak instruments | weak instruments | many instruments | many instruments | instrumental variables | instrumental variables | nonparametric estimation | nonparametric estimation | semiparametric estimation | semiparametric estimation | treatment effects | treatment effects | nonlinear models | nonlinear models | panel data | panel data | economic modeling | economic modeling

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

HMS Sparrowhawk at sea HMS Sparrowhawk at sea

Description

Subjects

sea | sea | chimney | chimney | sky | sky | cloud | cloud | industry | industry | daylight | daylight | interesting | interesting | wire | wire | construction | construction | industrial | industrial | ship | ship | unitedkingdom | unitedkingdom | britain | britain | mark | mark | label | label | flag | flag | smoke | smoke | letters | letters | pipe | pipe | grain | grain | rail | rail | vessel | vessel | rope | rope | pole | pole | destroyer | destroyer | deck | deck | crew | crew | maritime | maritime | transportation | transportation | cylinder | cylinder | archives | archives | unusual | unusual | identification | identification | ww1 | ww1 | launch | launch | float | float | striking | striking | naval | naval | greatwar | greatwar | tyneside | tyneside | firstworldwar | firstworldwar | sinking | sinking | warship | warship | fascinating | fascinating | digitalimage | digitalimage | collision | collision | rivertyne | rivertyne | shipbuilding | shipbuilding | royalnavy | royalnavy | tyneandwear | tyneandwear | industrialheritage | industrialheritage | swanhunter | swanhunter | blackandwhitephotograph | blackandwhitephotograph | navalhistory | navalhistory | shipbuildingheritage | shipbuildingheritage | maritimeheritage | maritimeheritage | battleofjutland | battleofjutland | c1913 | c1913 | swanhunterwighamrichardson | swanhunterwighamrichardson | wallsendyard | wallsendyard | 1june1916 | 1june1916 | hmsbroke | hmsbroke | thebattleofjutland | thebattleofjutland | hmssparrowhawk | hmssparrowhawk | 12october1912 | 12october1912 | royalnavalvessel | royalnavalvessel | acastaclassdestroyer | acastaclassdestroyer

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=29295370@N07&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

4.366 Advanced Projects in the Visual Arts: Personal Narrative (MIT) 4.366 Advanced Projects in the Visual Arts: Personal Narrative (MIT)

Description

This advanced video class serves goes into greater depth on the topics covered in 4.351 , Introduction to Video. It also will explore the nature and function of narrative in cinema and video through exercises and screenings culminating in a final project. Starting with a brief introduction to the basic principles of classical narrative cinema, we will proceed to explore strategies designed to test the elements of narrative: story trajectory, character development, verisimilitude, time-space continuity, viewer identification, suspension of disbelief, and closure. This advanced video class serves goes into greater depth on the topics covered in 4.351 , Introduction to Video. It also will explore the nature and function of narrative in cinema and video through exercises and screenings culminating in a final project. Starting with a brief introduction to the basic principles of classical narrative cinema, we will proceed to explore strategies designed to test the elements of narrative: story trajectory, character development, verisimilitude, time-space continuity, viewer identification, suspension of disbelief, and closure.

Subjects

movies | movies | filmmaking | filmmaking | digital video | digital video | storytelling | storytelling | modern art | modern art | media | media | computerized editing | computerized editing | personal story | personal story | emotional art | emotional art | Fluxus | Fluxus | Bill Viola | Bill Viola | digital representation | digital representation | story trajectory | story trajectory | character development | character development | verisimilitude | verisimilitude | time-space continuity | time-space continuity | viewer identification | viewer identification | suspension of disbelief | suspension of disbelief | closure | closure | narrative cinema | narrative cinema | speculative biography | speculative biography | conceptual video | conceptual video | the fake | the fake | the remake | the remake | domestic ethnography | domestic ethnography

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

24.120 Moral Psychology (MIT) 24.120 Moral Psychology (MIT)

Description

This course is an examination of philosophical theories of action and motivation in the light of empirical findings from social psychology, sociology, and neuroscience. Topics include belief, desire, and moral motivation; sympathy and empathy; intentions and other committing states; strength of will and weakness of will; free will; addiction and compulsion; guilt, shame and regret; evil; self-knowledge and self-deception; and, virtues and character traits. This course is a CI-M course. This course is an examination of philosophical theories of action and motivation in the light of empirical findings from social psychology, sociology, and neuroscience. Topics include belief, desire, and moral motivation; sympathy and empathy; intentions and other committing states; strength of will and weakness of will; free will; addiction and compulsion; guilt, shame and regret; evil; self-knowledge and self-deception; and, virtues and character traits. This course is a CI-M course.

Subjects

action | action | motivation | motivation | social psychology | social psychology | sociology | sociology | belief | belief | desire | desire | moral motivation | moral motivation | sympathy | sympathy | empathy | empathy | intention | intention | will | will | addiction | addiction | resolution | resolution | rationality | rationality | identification | identification | autonomy | autonomy | egoism | egoism | altruism | altruism | intentions | intentions | Humean theory of motivation | Humean theory of motivation | willing | willing | wanting | wanting | waiting | waiting | weakness | weakness | Akrasia | Akrasia | self-control | self-control | temptation | temptation | self-regulation | self-regulation | free will | free will | self-deception | self-deception | moral psychology | moral psychology | empirical work | empirical work | autism | autism | ethical judgment | ethical judgment | moral luck | moral luck | virtue | virtue

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-24.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Trolleybus heading past Grey's Monument Trolleybus heading past Grey's Monument

Description

Subjects

newcastleupontyne | newcastleupontyne | 1960s | 1960s | tyneside | tyneside | northeastengland | northeastengland | cars | cars | greysmonument | greysmonument | traffic | traffic | architecture | architecture | historic | historic | interesting | interesting | bus | bus | trolleybus | trolleybus | streetscene | streetscene | blackandwhitephotograph | blackandwhitephotograph | digitalimage | digitalimage | industry | industry | industrialheritage | industrialheritage | city | city | buildings | buildings | monument | monument | scenicviewsofnewcastle | scenicviewsofnewcastle | fantastic | fantastic | unusual | unusual | fascinating | fascinating | impressive | impressive | roundabout | roundabout | road | road | daylight | daylight | vehicles | vehicles | reflection | reflection | body | body | glass | glass | wheel | wheel | seat | seat | driver | driver | pot | pot | plants | plants | debris | debris | letters | letters | signage | signage | sky | sky | cloud | cloud | land | land | ground | ground | turnersltd | turnersltd | photography | photography | localbusinesses | localbusinesses | premises | premises | services | services | economy | economy | consumerism | consumerism | transportation | transportation | archives | archives | northeastofengland | northeastofengland | unitedkingdom | unitedkingdom | pedestrian | pedestrian | wire | wire | post | post | street | street | door | door | wall | wall | roof | roof | heritage | heritage | curve | curve | light | light | turning | turning | movement | movement | number | number | identification | identification | destination | destination | dirt | dirt | disguise | disguise | rider | rider | plate | plate | construction | construction

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=29295370@N07&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.034 Artificial Intelligence (MIT) 6.034 Artificial Intelligence (MIT)

Description

This course introduces students to the basic knowledge representation, problem solving, and learning methods of  artificial intelligence. Upon completion of 6.034, students should be able to: develop intelligent systems by assembling solutions to concrete computational problems, understand the role of knowledge representation, problem solving, and learning in intelligent-system engineering, and appreciate the role of problem solving, vision, and language in understanding human intelligence from a computational perspective.Technical RequirementsJava® plug-in software is required to run the .jar files found on this course site.Java® is a trademark or registered trademark of Sun Microsystems, Inc. in the United States and other countries. This course introduces students to the basic knowledge representation, problem solving, and learning methods of  artificial intelligence. Upon completion of 6.034, students should be able to: develop intelligent systems by assembling solutions to concrete computational problems, understand the role of knowledge representation, problem solving, and learning in intelligent-system engineering, and appreciate the role of problem solving, vision, and language in understanding human intelligence from a computational perspective.Technical RequirementsJava® plug-in software is required to run the .jar files found on this course site.Java® is a trademark or registered trademark of Sun Microsystems, Inc. in the United States and other countries.

Subjects

artificial intelligence | artificial intelligence | applied systems | applied systems | rule chaining | rule chaining | heuristic search | heuristic search | constraint propagation | constraint propagation | constrained search | constrained search | inheritance | inheritance | identification trees | identification trees | neural nets | neural nets | genetic algorithms | genetic algorithms | human intelligence | human intelligence | knowledge representation | knowledge representation | intelligent systems | intelligent systems

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Mooring the tanker 'Spinanger' after launch Mooring the tanker 'Spinanger' after launch

Description

Subjects

roof | roof | chimney | chimney | sky | sky | cloud | cloud | building | building | men | men | industry | industry | window | window | glass | glass | hat | hat | metal | metal | stone | stone | wall | wall | standing | standing | river | river | boat | boat | cabin | cabin | iron | iron | industrial | industrial | ship | ship | hand | hand | arm | arm | crane | crane | head | head | timber | timber | steel | steel | parts | parts | flag | flag | coat | coat | debris | debris | pipe | pipe | platform | platform | bank | bank | rail | rail | plate | plate | vessel | vessel | rope | rope | cargo | cargo | structure | structure | riverwear | riverwear | pole | pole | suit | suit | deck | deck | soil | soil | crew | crew | pile | pile | frame | frame | porthole | porthole | mooring | mooring | letter | letter | trousers | trousers | mast | mast | identification | identification | shipyard | shipyard | waving | waving | attentive | attentive | tanker | tanker | fascinating | fascinating | digitalimage | digitalimage | sunderland | sunderland | bending | bending | shipbuilding | shipbuilding | moored | moored | shiplaunch | shiplaunch | wearside | wearside | unsual | unsual | blackandwhitephotograph | blackandwhitephotograph | northeastofengland | northeastofengland | maritimeheritage | maritimeheritage | northsands | northsands | northsandsshipyard | northsandsshipyard | jlthompsonsonsltd | jlthompsonsonsltd | northsandssunderland | northsandssunderland | spinanger | spinanger | 22october1957 | 22october1957

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=29295370@N07&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Side Tank Engine for the Lagos Railway, Nigeria Side Tank Engine for the Lagos Railway, Nigeria

Description

Subjects

roof | roof | chimney | chimney | industry | industry | window | window | wheel | wheel | metal | metal | train | train | vent | vent | interesting | interesting | construction | construction | cabin | cabin | industrial | industrial | carriage | carriage | body | body | mark | mark | parts | parts | debris | debris | letters | letters | grain | grain | engineering | engineering | rail | rail | railway | railway | structure | structure | steam | steam | number | number | piston | piston | doorway | doorway | engines | engines | transportation | transportation | bolt | bolt | cylinder | cylinder | nigeria | nigeria | locomotive | locomotive | unusual | unusual | identification | identification | railways | railways | locomotives | locomotives | manufactured | manufactured | newcastleupontyne | newcastleupontyne | fascinating | fascinating | digitalimage | digitalimage | tankengine | tankengine | industrialheritage | industrialheritage | forthbanks | forthbanks | stationaryengines | stationaryengines | neutralbackground | neutralbackground | sepiaphotograph | sepiaphotograph | locomotiveengine | locomotiveengine | hawthornleslie | hawthornleslie | crownagents | crownagents | roberthawthorn | roberthawthorn | williamhawthorn | williamhawthorn | november1910 | november1910 | hawthornleslielocomotives | hawthornleslielocomotives | forthbanksworks | forthbanksworks | lagosrailway | lagosrailway | sidetankengines | sidetankengines | hawthornleslielocomotiveworks | hawthornleslielocomotiveworks | southnigeria | southnigeria

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=29295370@N07&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

24.120 Moral Psychology (MIT) 24.120 Moral Psychology (MIT)

Description

The course is an examination of philosophical theories of action and motivation in the light of empirical findings from social psychology, sociology and neuroscience. Topics include belief, desire, and moral motivation; sympathy and empathy; intentions and other committing states; strength of will and weakness of will; free will; addiction and compulsion; guilt, shame and regret; evil; self-knowledge and self-deception; virtues and character traits. The course is an examination of philosophical theories of action and motivation in the light of empirical findings from social psychology, sociology and neuroscience. Topics include belief, desire, and moral motivation; sympathy and empathy; intentions and other committing states; strength of will and weakness of will; free will; addiction and compulsion; guilt, shame and regret; evil; self-knowledge and self-deception; virtues and character traits.

Subjects

action | action | motivation | motivation | social psychology | social psychology | sociology | sociology | beleif | beleif | desire | desire | moral motivation | moral motivation | sympathy | sympathy | empathy | empathy | intention | intention | will | will | addiction | addiction | resolution | resolution | rationality | rationality | identification | identification | autonomy | autonomy

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

SP.601J Feminist Theory (MIT) SP.601J Feminist Theory (MIT)

Description

This course focuses on a range of theories of gender in modern life. In recent years, feminist scholars in a range of disciplines have challenged previously accepted notions of political theory such as the distinctions between public and private, the definitions of politics itself, the nature of citizenship, and the roles of women in civil society. In this course, we will examine different aspects of women's lives through the life cycle as seen from the vantage point of feminist theory. In addition, we will consider different ways of looking at power and political culture in modern societies, issues of race and class, poverty and welfare, and sexuality and morality. Acknowledgements The instructor would like to thank Lara Yeo for capturing notes and discussion questions in class. This course focuses on a range of theories of gender in modern life. In recent years, feminist scholars in a range of disciplines have challenged previously accepted notions of political theory such as the distinctions between public and private, the definitions of politics itself, the nature of citizenship, and the roles of women in civil society. In this course, we will examine different aspects of women's lives through the life cycle as seen from the vantage point of feminist theory. In addition, we will consider different ways of looking at power and political culture in modern societies, issues of race and class, poverty and welfare, and sexuality and morality. Acknowledgements The instructor would like to thank Lara Yeo for capturing notes and discussion questions in class.

Subjects

Men | Men | Women | Women | Gender | Gender | Feminists | Feminists | Feminist Theory | Feminist Theory | Prostitution | Prostitution | Morality | Morality | Chromosomes | Chromosomes | gender identification | gender identification | work and family | work and family | welfare reform | welfare reform | paternity | paternity | maternity | maternity | divorce | divorce | globalization of women's labor | globalization of women's labor | pornography | pornography | internet | internet | military service | military service | race | race | class | class | 2008 election campaigns | 2008 election campaigns | body image | body image | discrimination | discrimination | date rape | date rape | rape | rape | domestic violence | domestic violence | females in sports | females in sports | embodied knowledge | embodied knowledge | sexuality | sexuality | politics of consent | politics of consent | international economics | international economics | exile and pride | exile and pride | curious feminist | curious feminist | don't call us out of name | don't call us out of name | theorizing feminisms | theorizing feminisms | undoing the silence | undoing the silence | sneaker production | sneaker production | intersectionality | intersectionality | contextualize | contextualize | historicize | historicize

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

ESD.77 Multidisciplinary System Design Optimization (MIT) ESD.77 Multidisciplinary System Design Optimization (MIT)

Description

There is need for a rigorous, quantitative multidisciplinary design methodology that works with the non-quantitative and creative side of the design process in engineering systems. The goal of multidisciplinary systems design optimization is to create advanced and complex engineering systems that must be competitive not only in terms of performance, but also in terms of life-cycle value. The objective of the course is to present tools and methodologies for performing system optimization in a multidisciplinary design context. Focus will be equally strong on all three aspects of the problem: (i) the multidisciplinary character of engineering systems, (ii) design of these complex systems, and (iii) tools for optimization. There is need for a rigorous, quantitative multidisciplinary design methodology that works with the non-quantitative and creative side of the design process in engineering systems. The goal of multidisciplinary systems design optimization is to create advanced and complex engineering systems that must be competitive not only in terms of performance, but also in terms of life-cycle value. The objective of the course is to present tools and methodologies for performing system optimization in a multidisciplinary design context. Focus will be equally strong on all three aspects of the problem: (i) the multidisciplinary character of engineering systems, (ii) design of these complex systems, and (iii) tools for optimization.

Subjects

systems engineering | systems engineering | optimization | optimization | product design | product design | multidisciplinary design optimization | multidisciplinary design optimization | subsystem identification | subsystem identification | heuristic search methods | heuristic search methods | genetic algorithms | genetic algorithms | simulated annealing | simulated annealing | Pareto optimality | Pareto optimality | design for value | design for value

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-ESD.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

ESD.71 Engineering Systems Analysis for Design (MIT) ESD.71 Engineering Systems Analysis for Design (MIT)

Description

Engineering systems design must have the flexibility to take advantage of new opportunities while avoiding disasters. This subject develops "real options" analysis to create design flexibility and measure its value so that it can be incorporated into system optimization. It builds on essential concepts of system models, decision analysis, and financial concepts. Emphasis is placed on calculating value of real options with special attention given to efficient analysis and practical applications. The material is organized and presented to deal with the contextual reality of technological systems, that substantially distinguishes the analysis of real options in engineering systems from that of financial options. Note This MIT OpenCourseWare site is based on the materials from Profes Engineering systems design must have the flexibility to take advantage of new opportunities while avoiding disasters. This subject develops "real options" analysis to create design flexibility and measure its value so that it can be incorporated into system optimization. It builds on essential concepts of system models, decision analysis, and financial concepts. Emphasis is placed on calculating value of real options with special attention given to efficient analysis and practical applications. The material is organized and presented to deal with the contextual reality of technological systems, that substantially distinguishes the analysis of real options in engineering systems from that of financial options. Note This MIT OpenCourseWare site is based on the materials from Profes

Subjects

real options | real options | flexibility | flexibility | flexible design | flexible design | engineering systems | engineering systems | complex projects | complex projects | evaluation over time | evaluation over time | risk | risk | uncertainty | uncertainty | valuation | valuation | timing | timing | uncertainty modeling | uncertainty modeling | flexibility valuation | flexibility valuation | methods | methods | design analysis | design analysis | lattice analysis | lattice analysis | monte carlo simulation | monte carlo simulation | flexibility identification. | flexibility identification.

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-ESD.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Essentials of Medical Microbiology III - Part 1 of 2

Description

This presentation deals with the bacterial identification and provides an introduction into epidemiology. It provides information on the identification of bacteria including identification by physical attributes and the use of classical biochemical and staining techniques. This is concluded with a generalised introduction into epidemiology. A help file is included and should be read first.

Subjects

microbiology | bacterial identification | epidemiology | bacilli | cocci | ziehl neelson stain | spores | fastidious bacteria | antibiotic resistance | identification | bacterial metabolism | catalase test | coagulase test | oxidase test | antigenic structure | genetic fingerprinting | strain differentiation | bioukoer | ukoer | Biological sciences | C000

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

EC.S06 Design for Demining (MIT) EC.S06 Design for Demining (MIT)

Description

Humanitarian Demining is the process of detecting, removing and disposing of landmines. Millions of landmines are buried in more than 80 countries resulting in more than 10,000 civilian victims every year. MIT Design for Demining is a design course that spans the entire product design and development process from identification of needs and idea generation to prototyping and blast testing to manufacture and deployment. Technical, business and customer aspects are addressed. Students learn about demining while they design, develop and deliver devices to aid the demining community. Past students have invented or improved hand tools, protective gear, safety equipment, educational graphics and teaching materials. Some tools designed in previous years are in use worldwide in the thousands. Cour Humanitarian Demining is the process of detecting, removing and disposing of landmines. Millions of landmines are buried in more than 80 countries resulting in more than 10,000 civilian victims every year. MIT Design for Demining is a design course that spans the entire product design and development process from identification of needs and idea generation to prototyping and blast testing to manufacture and deployment. Technical, business and customer aspects are addressed. Students learn about demining while they design, develop and deliver devices to aid the demining community. Past students have invented or improved hand tools, protective gear, safety equipment, educational graphics and teaching materials. Some tools designed in previous years are in use worldwide in the thousands. Cour

Subjects

SP.776 | SP.776 | SP.786 | SP.786 | humanitarian demining | humanitarian demining | landmines | landmines | landmine detection | landmine detection | landmine removal | landmine removal | landmine disposal | landmine disposal | landmines in 80 countries | landmines in 80 countries | 20 | 000 civilian victims per year | 20 | 000 civilian victims per year | MIT Design for Demining | MIT Design for Demining | product design | product design | development process | development process | identification of needs | identification of needs | idea generation | idea generation | prototyping | prototyping | blast testing | blast testing | manufacture | manufacture | deployment | deployment | demining community | demining community | hand tools | hand tools | protective gear | protective gear | safety equipment | safety equipment | educational graphics | educational graphics | teaching materials | teaching materials | field trip | field trip | US Army base | US Army base | demining training | demining training

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.034 Artificial Intelligence (MIT) 6.034 Artificial Intelligence (MIT)

Description

This course introduces representations, techniques, and architectures used to build applied systems and to account for intelligence from a computational point of view. This course also explores applications of rule chaining, heuristic search, logic, constraint propagation, constrained search, and other problem-solving paradigms. In addition, it covers applications of decision trees, neural nets, SVMs and other learning paradigms. This course introduces representations, techniques, and architectures used to build applied systems and to account for intelligence from a computational point of view. This course also explores applications of rule chaining, heuristic search, logic, constraint propagation, constrained search, and other problem-solving paradigms. In addition, it covers applications of decision trees, neural nets, SVMs and other learning paradigms.

Subjects

Introduces representations | techniques | and architectures used to build applied systems | Introduces representations | techniques | and architectures used to build applied systems | computational intelligence | computational intelligence | rule chaining | rule chaining | heuristic search | heuristic search | constraint propagation | constraint propagation | constrained search | constrained search | inheritance | inheritance | problem-solving paradigms | problem-solving paradigms | identification trees | identification trees | neural nets | neural nets | genetic algorithms | genetic algorithms | learning paradigms | learning paradigms | Speculations on the contributions of human vision and language systems to human intelligence | Speculations on the contributions of human vision and language systems to human intelligence | Meets with HST.947 spring only | Meets with HST.947 spring only | 4 Engineering Design Points | 4 Engineering Design Points

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-6.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

HST.947 Medical Artificial Intelligence (MIT) HST.947 Medical Artificial Intelligence (MIT)

Description

This course provides an intensive introduction to artificial intelligence and its applications to problems of medical diagnosis, therapy selection, and monitoring and learning from databases. It meets with lectures and recitations of 6.034 Artificial Intelligence, whose material is supplemented by additional medical-specific readings in a weekly discussion session. Students are responsible for completing all homework assignments in 6.034 and for additional problems and/or papers. This course provides an intensive introduction to artificial intelligence and its applications to problems of medical diagnosis, therapy selection, and monitoring and learning from databases. It meets with lectures and recitations of 6.034 Artificial Intelligence, whose material is supplemented by additional medical-specific readings in a weekly discussion session. Students are responsible for completing all homework assignments in 6.034 and for additional problems and/or papers.

Subjects

Introduces representations | techniques | and architectures used to build applied systems | Introduces representations | techniques | and architectures used to build applied systems | computational intelligence | computational intelligence | rule chaining | rule chaining | heuristic search | heuristic search | constraint propagation | constraint propagation | constrained search | constrained search | inheritance | inheritance | problem-solving paradigms | problem-solving paradigms | identification trees | identification trees | neural nets | neural nets | genetic algorithms | genetic algorithms | learning paradigms | learning paradigms | Speculations on the contributions of human vision and language systems to human intelligence | Speculations on the contributions of human vision and language systems to human intelligence | Meets with HST.947 spring only | Meets with HST.947 spring only | 4 Engineering Design Points | 4 Engineering Design Points | artificial intelligence | artificial intelligence | applied systems | applied systems | human intelligence | human intelligence | knowledge representation | knowledge representation | intelligent systems | intelligent systems | diagnosis | diagnosis | clinical simulation | clinical simulation | genomics | genomics | proteomics | proteomics | bioinformatics | bioinformatics

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-HST.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata