Results for 'Aenne Brielmann'

6 found
Order:
  1.  22
    A computational model of aesthetic value.Aenne A. Brielmann & Peter Dayan - 2022 - Psychological Review 129 (6):1319-1337.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  2.  29
    Intense Beauty Requires Intense Pleasure.Aenne A. Brielmann & Denis G. Pelli - 2019 - Frontiers in Psychology 10.
  3.  25
    Aesthetics, Empirical.Aenne Brielmann - 2021 - Internet Encyclopedia of Philosophy.
    Empirical Aesthetics Empirical aesthetics is a research area at the intersection of psychology and neuroscience that aims to understand how people experience, evaluate, and create objects aesthetically. Its central two questions are: How do we experience beauty? How do we experience art? In practice, this means that empirical aesthetics studies prototypically aesthetic responses, such … Continue reading Aesthetics, Empirical →.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4.  2
    Vorwort.Aenne Brelage - 1965 - In Manfred Brelage (ed.), I. studien zur transzendentalphilosophie. De Gruyter.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  26
    Expression of Basic Emotions in Pictures by German and Vietnamese Art Therapy Students – A Comparative, Explorative Study.Alexandra Danner-Weinberger, Katharina Puchner, Margrit Keckeis, Julia Brielmann, Minh Thuy Thi Tri, The Huy Le Hoang, Luan Huynh Nguyen, Nikolai Köppelmann, Edit Rottler, Harald Gündel & Jörn von Wietersheim - 2019 - Frontiers in Psychology 10.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  12
    IoT network security using autoencoder deep neural network and channel access algorithm.Mustafa Musa Jaber, Amer S. Elameer & Saif Mohammed Ali - 2021 - Journal of Intelligent Systems 31 (1):95-103.
    Internet-of-Things (IoT) creates a significant impact in spectrum sensing, information retrieval, medical analysis, traffic management, etc. These applications require continuous information to perform a specific task. At the time, various intermediate attacks such as jamming, priority violation attacks, and spectrum poisoning attacks affect communication because of the open nature of wireless communication. These attacks create security and privacy issues while making data communication. Therefore, a new method autoencoder deep neural network (AENN) is developed by considering exploratory, evasion, causative, and priority (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark