• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 134
  • 42
  • 24
  • 14
  • 14
  • 6
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 288
  • 288
  • 288
  • 63
  • 44
  • 43
  • 42
  • 36
  • 33
  • 33
  • 32
  • 31
  • 31
  • 28
  • 25
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
131

Application of Hidden Markov Model to Auto Telematics Data and the Effect of Universal Demand Law Change on Corporate Risk Taking in the U.S. Property & Casualty Insurance Industry

Jiang, Qiao January 2022 (has links)
There are two themes in this dissertation, that is, the effect of universal demand law change on corporate risk-taking in the U.S. property & casualty insurance industry, and the application of hidden Markov model to auto telematics data. The first chapter presents my study in the first theme and the rest two chapters present the other theme. In Chapter 1, "Does Shareholder Litigation Affect Corporate Risk-Taking? Evidence from the Property-Casualty Insurance Industry", I explore whether shareholder litigation affects corporate risk-taking differently depending on distinct organizational structures. I use a law change, called Universal Demand (UD) Law, as an exogenous shock and develop three risk-taking measures that are unique in the U.S. property-casualty insurance industry: leverage risk, asset risk, and underwriting risk. The insurance industry provides an interesting opportunity for the study as shareholders in mutual insurers are an ambiguous concept in the legal world, as opposed to the common argument in the insurance literature. The results show that along with UD law adoption, insurers increase their risk-taking. After taking organizational structures into account, the impact of the law change differentiates. Stock insurers increase all three risk-taking measures while mutual insurers decrease their Leverage Risk and increase Asset Risk measures. For different time windows, stock insurers respond faster with respect to their Asset Risk compared to mutual insurers. In addition, I proceed to examine the main economic channel for the impact and find that the free cash flow argument is not the main channel. Chapters 2 and 3 present the study in auto telematics data using a proprietary data source. Both studies are based on the application of hidden Markov model (HMM). Specifically, Chapter 2, "Auto Insurance Pricing Using Telematics Data: Application of a Hidden Markov Model", develops an HMM-based clustering framework to predict auto insurance losses using driving characteristics extracted from telematics data. Through a simulation experiment based on a proprietary telematics data set, I show that HMM can effectively classify driving trips using model-implied hidden states, and HMM-based pricing methods provide better predictive power measured by both deviance statistics and mean squared error. Importantly, the proposed framework not only enables us to price usage-based insurances at a granular level, but it is also viable for estimating long-term insurance losses utilizing the limiting properties of HMM. Chapter 3, "Theoretical Framework of a 3-Layer Hidden Markov Model for Auto Insurance Pricing", is a theoretical extension of the second chapter to improve the framework at a more granular level. I develop a 3-layer HMM for risk classification, which links driving behavior characteristics with risk classes and loss estimation. The proposed model presents a direct structure among all variables and utilizes time series data without aggregation. Furthermore, this study provides a theoretical framework to estimate the 3-layer HMM using the Expectation-Maximization (EM) algorithm. The parameters of Bernoulli distributed loss count (per unit of time) and Gamma distributed loss severity can be solved at least numerically, and the negative definite Hessian matrix indicates that the solution of the first-order condition of the log-likelihood function achieves its local maximum. / Business Administration/Risk Management and Insurance
132

Decision Making in Manufacturing Systems: An Integrated Throughput, Quality and Maintenance Model Using HMM

Shadid, Basel 04 1900 (has links)
<p>The decision making processes in today's manufacturing systems represent very complex and challenging tasks. The desired flexibility in terms of the functionality of a machine adds more components to the machine. The real time monitoring and reporting generates large streams of data. However the intelligent and real time processing of this large collection of system data is at the core of the manufacturing decision support tools. </p> <p>This thesis outlines the use of Frequent Episodes in Event Sequences and Hidden Markov Modeling of throughput, quality and maintenance data to model the deterioration of performance in the components that make up the manufacturing system. The thesis also introduces the concept of decision points and outlines how to integrate the total cost function in a business model. </p> This thesis deals with the following three topics: <p>First, the component-based data structure of the manufacturing system is outlined especially throughput, quality and maintenance data. In this approach, the manufacturing system is considered as a group of components that interact with each other and with raw materials to produce the manufactured product. This interaction creates a considerable amount of data which can be associated with the relevant components of the system. The relations between the manufacturing components are established on a physical and logical basis. The components properties are clearly defined in database tables specifically created for this application. The thesis also discusses the web services in manufacturing systems and the portable technologies used in plant decision support tools. </p> <p>Second, the thesis presents a novel application of Frequent Episodes in Event Sequences to identify patterns in the deterioration of performance in a component using frequent episodes of operational failures, quality failures and maintenance activities. A Hidden Markov Model (HMM) is used to model each deterioration episode to estimate the states of performance and the transition rates between the states. The thesis compares the results generated by this model to other existing models of component performance deterioration while emphasizing the benefits ofthe proposed model through the use of the plant data.</p> <p>Finally the thesis presents a methodology usmg HMM probability distributions and Bayesian Decision theory framework to provide a set of decisions and recommendations under the condition of data uncertainty. The results of this analysis are then integrated in the plant maintenance business model.</p> <p>It is worthwhile mentioning that to develop the techniques and validate the results in this research; a Manufacturing Execution System (MES) was developed to operate in an automotive engine plant. All the data and results in this research are based on the plant data. The MES which was developed in this research provided significant benefits in the plant and was adapted by many other GM plants around the world.</p> / Thesis / Doctor of Philosophy (PhD)
133

STUDY ON INFORMATION THEORY: CONNECTION TO CONTROL THEORY, APPROACH AND ANALYSIS FOR COMPUTATION

Theeranaew, Wanchat 09 February 2015 (has links)
No description available.
134

Hierarchical video semantic annotation – the vision and techniques

Li, Honglin January 2003 (has links)
No description available.
135

A HMM Approach to Identifying Distinct DNA Methylation Patterns for Subtypes of Breast Cancers

Xu, Maoxiong 21 July 2011 (has links)
No description available.
136

Estimation of Probability of Failure for Damage-Tolerant Aerospace Structures

Halbert, Keith January 2014 (has links)
The majority of aircraft structures are designed to be damage-tolerant such that safe operation can continue in the presence of minor damage. It is necessary to schedule inspections so that minor damage can be found and repaired. It is generally not possible to perform structural inspections prior to every flight. The scheduling is traditionally accomplished through a deterministic set of methods referred to as Damage Tolerance Analysis (DTA). DTA has proven to produce safe aircraft but does not provide estimates of the probability of failure of future flights or the probability of repair of future inspections. Without these estimates maintenance costs cannot be accurately predicted. Also, estimation of failure probabilities is now a regulatory requirement for some aircraft. The set of methods concerned with the probabilistic formulation of this problem are collectively referred to as Probabilistic Damage Tolerance Analysis (PDTA). The goal of PDTA is to control the failure probability while holding maintenance costs to a reasonable level. This work focuses specifically on PDTA for fatigue cracking of metallic aircraft structures. The growth of a crack (or cracks) must be modeled using all available data and engineering knowledge. The length of a crack can be assessed only indirectly through evidence such as non-destructive inspection results, failures or lack of failures, and the observed severity of usage of the structure. The current set of industry PDTA tools are lacking in several ways: they may in some cases yield poor estimates of failure probabilities, they cannot realistically represent the variety of possible failure and maintenance scenarios, and they do not allow for model updates which incorporate observed evidence. A PDTA modeling methodology must be flexible enough to estimate accurately the failure and repair probabilities under a variety of maintenance scenarios, and be capable of incorporating observed evidence as it becomes available. This dissertation describes and develops new PDTA methodologies that directly address the deficiencies of the currently used tools. The new methods are implemented as a free, publicly licensed and open source R software package that can be downloaded from the Comprehensive R Archive Network. The tools consist of two main components. First, an explicit (and expensive) Monte Carlo approach is presented which simulates the life of an aircraft structural component flight-by-flight. This straightforward MC routine can be used to provide defensible estimates of the failure probabilities for future flights and repair probabilities for future inspections under a variety of failure and maintenance scenarios. This routine is intended to provide baseline estimates against which to compare the results of other, more efficient approaches. Second, an original approach is described which models the fatigue process and future scheduled inspections as a hidden Markov model. This model is solved using a particle-based approximation and the sequential importance sampling algorithm, which provides an efficient solution to the PDTA problem. Sequential importance sampling is an extension of importance sampling to a Markov process, allowing for efficient Bayesian updating of model parameters. This model updating capability, the benefit of which is demonstrated, is lacking in other PDTA approaches. The results of this approach are shown to agree with the results of the explicit Monte Carlo routine for a number of PDTA problems. Extensions to the typical PDTA problem, which cannot be solved using currently available tools, are presented and solved in this work. These extensions include incorporating observed evidence (such as non-destructive inspection results), more realistic treatment of possible future repairs, and the modeling of failure involving more than one crack (the so-called continuing damage problem). The described hidden Markov model / sequential importance sampling approach to PDTA has the potential to improve aerospace structural safety and reduce maintenance costs by providing a more accurate assessment of the risk of failure and the likelihood of repairs throughout the life of an aircraft. / Statistics
137

Hidden Markov models and alert correlations for the prediction of advanced persistent threats

Ghafir, Ibrahim, Kyriakopoulos, K.G., Lambotharan, S., Aparicio-Navarro, F.J., Assadhan, B., Binsalleeh, H., Diab, D.M. 24 January 2020 (has links)
Yes / Cyber security has become a matter of a global interest, and several attacks target industrial companies and governmental organizations. The advanced persistent threats (APTs) have emerged as a new and complex version of multi-stage attacks (MSAs), targeting selected companies and organizations. Current APT detection systems focus on raising the detection alerts rather than predicting APTs. Forecasting the APT stages not only reveals the APT life cycle in its early stages but also helps to understand the attacker's strategies and aims. This paper proposes a novel intrusion detection system for APT detection and prediction. This system undergoes two main phases; the first one achieves the attack scenario reconstruction. This phase has a correlation framework to link the elementary alerts that belong to the same APT campaign. The correlation is based on matching the attributes of the elementary alerts that are generated over a configurable time window. The second phase of the proposed system is the attack decoding. This phase utilizes the hidden Markov model (HMM) to determine the most likely sequence of APT stages for a given sequence of correlated alerts. Moreover, a prediction algorithm is developed to predict the next step of the APT campaign after computing the probability of each APT stage to be the next step of the attacker. The proposed approach estimates the sequence of APT stages with a prediction accuracy of at least 91.80%. In addition, it predicts the next step of the APT campaign with an accuracy of 66.50%, 92.70%, and 100% based on two, three, and four correlated alerts, respectively. / The Gulf Science, Innovation and Knowledge Economy Programme of the U.K. Government under UK-Gulf Institutional Link Grant IL 279339985 and in part by the Engineering and Physical Sciences Research Council (EPSRC), U.K., under Grant EP/R006385/1.
138

Android Application Install-time Permission Validation and Run-time Malicious Pattern Detection

Ma, Zhongmin 31 January 2014 (has links)
The open source structure of Android applications introduces security vulnerabilities that can be readily exploited by third-party applications. We address certain vulnerabilities at both installation and runtime using machine learning. Effective classification techniques with neural networks can be used to verify the application categories on installation. We devise a novel application category verification methodology that involves machine learning the application permissions and estimating the likelihoods of different categories. To detect malicious patterns in runtime, we present a Hidden Markov Model (HMM) method to analyze the activity usage by tracking Intent log information. After applying our technique to nearly 1,700 popular third-party Android applications and malware, we report that a major portion of the category declarations were judged correctly. This demonstrates the effectiveness of neural network decision engines in validating Android application categories. The approach, using HMM to analyze the Intent log for the detection of malicious runtime behavior, is new. The test results show promise with a limited input dataset (69.7% accuracy). To improve the performance, further work will be carried out to: increase the dataset size by adding game applications, to optimize Baum-Welch algorithm parameters, and to balance the size of the Intent sequence. To better emulate the participant's usage, some popular applications can be selected in advance, and the remainder can be randomly chosen. / Master of Science
139

Automatic Phoneme Recognition with Segmental Hidden Markov Models

Baghdasaryan, Areg Gagik 10 March 2010 (has links)
A speaker independent continuous speech phoneme recognition and segmentation system is presented. We discuss the training and recognition phases of the phoneme recognition system as well as a detailed description of the integrated elements. The Hidden Markov Model (HMM) based phoneme models are trained using the Baum-Welch re-estimation procedure. Recognition and segmentation of the phonemes in the continuous speech is performed by a Segmental Viterbi Search on a Segmental Ergodic HMM for the phoneme states. We describe in detail the three phases of the phoneme joint recognition and segmentation system. First, the extraction of the Mel-Frequency Cepstral Coefficients (MFCC) and the corresponding Delta and Delta Log Power coefficients is described. Second, we describe the operation of the Baum-Welch re-estimation procedure for the training of the phoneme HMM models, including the K-Means and the Expectation-Maximization (EM) clustering algorithms used for the initialization of the Baum-Welch algorithm. Additionally, we describe the structural framework of - and the recognition procedure for - the ergodic Segmental HMM for the phoneme segmentation and recognition. We include test and simulation results for each of the individual systems integrated into the phoneme recognition system and finally for the phoneme recognition/segmentation system as a whole. / Master of Science
140

Enhancements in Markovian Dynamics

Ali Akbar Soltan, Reza 12 April 2012 (has links)
Many common statistical techniques for modeling multidimensional dynamic data sets can be seen as variants of one (or multiple) underlying linear/nonlinear model(s). These statistical techniques fall into two broad categories of supervised and unsupervised learning. The emphasis of this dissertation is on unsupervised learning under multiple generative models. For linear models, this has been achieved by collective observations and derivations made by previous authors during the last few decades. Factor analysis, polynomial chaos expansion, principal component analysis, gaussian mixture clustering, vector quantization, and Kalman filter models can all be unified as some variations of unsupervised learning under a single basic linear generative model. Hidden Markov modeling (HMM), however, is categorized as an unsupervised learning under multiple linear/nonlinear generative models. This dissertation is primarily focused on hidden Markov models (HMMs). On the first half of this dissertation we study enhancements on the theory of hidden Markov modeling. These include three branches: 1) a robust as well as a closed-form parameter estimation solution to the expectation maximization (EM) process of HMMs for the case of elliptically symmetrical densities; 2) a two-step HMM, with a combined state sequence via an extended Viterbi algorithm for smoother state estimation; and 3) a duration-dependent HMM, for estimating the expected residency frequency on each state. Then, the second half of the dissertation studies three novel applications of these methods: 1) the applications of Markov switching models on the Bifurcation Theory in nonlinear dynamics; 2) a Game Theory application of HMM, based on fundamental theory of card counting and an example on the game of Baccarat; and 3) Trust modeling and the estimation of trustworthiness metrics in cyber security systems via Markov switching models. As a result of the duration dependent HMM, we achieved a better estimation for the expected duration of stay on each regime. Then by robust and closed form solution to the EM algorithm we achieved robustness against outliers in the training data set as well as higher computational efficiency in the maximization step of the EM algorithm. By means of the two-step HMM we achieved smoother probability estimation with higher likelihood than the standard HMM. / Ph. D.

Page generated in 0.0663 seconds