• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 246
  • 32
  • 22
  • 18
  • 15
  • 13
  • 6
  • 3
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 458
  • 123
  • 66
  • 59
  • 45
  • 41
  • 41
  • 39
  • 39
  • 39
  • 36
  • 36
  • 35
  • 35
  • 31
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
131

Towards a Bezout-type Theory of Affine Varieties

Mondal, Pinaki 21 April 2010 (has links)
We study projective completions of affine algebraic varieties (defined over an algebraically closed field K) which are given by filtrations, or equivalently, integer valued `degree like functions' on their rings of regular functions. For a polynomial map P := (P_1, ..., P_n): X -> K^n of affine varieties with generically finite fibers, we prove that there are completions of the source such that the intersection of completions of the hypersurfaces {P_j = a_j} for generic (a_1, ..., a_n) in K^n coincides with the respective fiber (in short, the completions `do not add points at infinity' for P). Moreover, we show that there are `finite type' completions with the latter property, i.e. determined by the maximum of a finite number of `semidegrees', by which we mean degree like functions that send products into sums. We characterize the latter type completions as the ones for which ideal I of the `hypersurface at infinity' is radical. Moreover, we establish a one-to-one correspondence between the collection of minimal associated primes of I and the unique minimal collection of semidegrees needed to define the corresponding degree like function. We also prove an `affine Bezout type' theorem for polynomial maps P with finite fibers that admit semidegrees corresponding to completions that do not add points at infinity for P. For a wide class of semidegrees of a `constructive nature' our Bezout-type bound is explicit and sharp.
132

Solution Approaches For Flexible Job Shop Scheduling Problems

Balci, Serife Aytug 01 February 2013 (has links) (PDF)
discrete parts manufacturing industries. We are motivated by the production environment of Roketsan Missiles Industries Incorporation, operating at Turkish defense industry. Our objective is to minimize the total weighted completion times of the jobs in the system. We formulate the problem as a mixed integer linear program and find that our model could find optimal solutions only to small sized problem instances. For medium and large sized problem instances, we develop heuristic algorithms with high quality approximate solutions in reasonable solution time. Our proposed heuristic algorithm has hierarchical approach and benefits from optimization models and priority rules. We improve the heuristic method via best move with non-blocking strategy and design several experiments to test the performances. Our computational results have revealed that proposed heuristic algorithm can find high quality solutions to large sized instances very quickly.
133

Towards a Bezout-type Theory of Affine Varieties

Mondal, Pinaki 21 April 2010 (has links)
We study projective completions of affine algebraic varieties (defined over an algebraically closed field K) which are given by filtrations, or equivalently, integer valued `degree like functions' on their rings of regular functions. For a polynomial map P := (P_1, ..., P_n): X -> K^n of affine varieties with generically finite fibers, we prove that there are completions of the source such that the intersection of completions of the hypersurfaces {P_j = a_j} for generic (a_1, ..., a_n) in K^n coincides with the respective fiber (in short, the completions `do not add points at infinity' for P). Moreover, we show that there are `finite type' completions with the latter property, i.e. determined by the maximum of a finite number of `semidegrees', by which we mean degree like functions that send products into sums. We characterize the latter type completions as the ones for which ideal I of the `hypersurface at infinity' is radical. Moreover, we establish a one-to-one correspondence between the collection of minimal associated primes of I and the unique minimal collection of semidegrees needed to define the corresponding degree like function. We also prove an `affine Bezout type' theorem for polynomial maps P with finite fibers that admit semidegrees corresponding to completions that do not add points at infinity for P. For a wide class of semidegrees of a `constructive nature' our Bezout-type bound is explicit and sharp.
134

Verification of Pipelined Ciphers

Lam, Chiu Hong January 2009 (has links)
The purpose of this thesis is to explore the formal verification technique of completion functions and equivalence checking by verifying two pipelined cryptographic circuits, KASUMI and WG ciphers. Most of current methods of communications either involve a personal computer or a mobile phone. To ensure that the information is exchanged in a secure manner, encryption circuits are used to transform the information into an unintelligible form. To be highly secure, this type of circuits is generally designed such that it is hard to analyze. Due to this fact, it becomes hard to locate a design error in the verification of cryptographic circuits. Therefore, cryptographic circuits pose significant challenges in the area of formal verification. Formal verification use mathematics to formulate correctness criteria of designs, to develop mathematical models of designs, and to verify designs against their correctness criteria. The results of this work can extend the existing collection of verification methods as well as benefiting the area of cryptography. In this thesis, we implemented the KASUMI cipher in VHDL, and we applied the optimization technique of pipelining to create three additional implementations of KASUMI. We verified the three pipelined implementations of KASUMI with completion functions and equivalence checking. During the verification of KASUMI, we developed a methodology to handle the completion functions efficiently based on VHDL generic parameters. We implemented the WG cipher in VHDL, and we applied the optimization techniques of pipelining and hardware re-use to create an optimized implementation of WG. We verified the optimized implementation of WG with completion functions and equivalence checking. During the verification of WG, we developed the methodology of ``skipping" that can decrease the number of verification obligations required to verify the correctness of a circuit. During the verification of WG, we developed a way of applying the completion functions approach such that it can deal with a circuit that has been optimized with hardware re-use.
135

Verification of Pipelined Ciphers

Lam, Chiu Hong January 2009 (has links)
The purpose of this thesis is to explore the formal verification technique of completion functions and equivalence checking by verifying two pipelined cryptographic circuits, KASUMI and WG ciphers. Most of current methods of communications either involve a personal computer or a mobile phone. To ensure that the information is exchanged in a secure manner, encryption circuits are used to transform the information into an unintelligible form. To be highly secure, this type of circuits is generally designed such that it is hard to analyze. Due to this fact, it becomes hard to locate a design error in the verification of cryptographic circuits. Therefore, cryptographic circuits pose significant challenges in the area of formal verification. Formal verification use mathematics to formulate correctness criteria of designs, to develop mathematical models of designs, and to verify designs against their correctness criteria. The results of this work can extend the existing collection of verification methods as well as benefiting the area of cryptography. In this thesis, we implemented the KASUMI cipher in VHDL, and we applied the optimization technique of pipelining to create three additional implementations of KASUMI. We verified the three pipelined implementations of KASUMI with completion functions and equivalence checking. During the verification of KASUMI, we developed a methodology to handle the completion functions efficiently based on VHDL generic parameters. We implemented the WG cipher in VHDL, and we applied the optimization techniques of pipelining and hardware re-use to create an optimized implementation of WG. We verified the optimized implementation of WG with completion functions and equivalence checking. During the verification of WG, we developed the methodology of ``skipping" that can decrease the number of verification obligations required to verify the correctness of a circuit. During the verification of WG, we developed a way of applying the completion functions approach such that it can deal with a circuit that has been optimized with hardware re-use.
136

Cohomology Jumping Loci and the Relative Malcev Completion

Narkawicz, Anthony Joseph 12 December 2007 (has links)
Two standard invariants used to study the fundamental group of the complement X of a hyperplane arrangement are the Malcev completion of its fundamental group G and the cohomology groups of X with coefficients in rank one local systems. In this thesis, we develop a tool that unifies these two approaches. This tool is the Malcev completion S_p of G relative to a homomorphism p from G into (C^*)^N. The relative completion S_p is a prosolvable group that generalizes the classical Malcev completion; when p is the trivial representation, S_p is the Malcev completion of G. The group S_p is tightly controlled by the cohomology groups H^1(X,L_{p^k}) with coefficients in the irreducible local systems L_{p^k} associated to the representation p.The pronilpotent Lie algebra u_p of the prounipotent radical U_p of S_p has been described by Hain. If p is the trivial representation, then u_p is the holonomy Lie algebra, which is well-known to be quadratically presented. In contrast, we show that when X is the complement of the braid arrangement in complex two-space, there are infinitely many representations p from G into (C^*)^2 for which u_p is not quadratically presented.We show that if Y is a subtorus of the character torus T containing the trivial character, then S_p is combinatorially determined for general p in Y. We do not know whether S_p is always combinatorially determined. If S_p is combinatorially determined for all characters p of G, then the characteristic varieties of the arrangement X are combinatorially determined.When Y is an irreducible subvariety of T^N, we examine the behavior of S_p as p varies in Y. We define an affine group scheme S_Y over Y such that if Y = {p}, then S_Y is the relative Malcev completion S_p. For each p in Y, there is a canonical homomorphism of affine group schemes from S_p into the affine group scheme which is the restriction of S_Y to p. This is often an isomorphism. For example, if there exists p in Y whose image is Zariski dense in G_m^N, then this homomorphism is an isomorphism for general p in Y. / Dissertation
137

Non-parametric Bayesian Learning with Incomplete Data

Wang, Chunping January 2010 (has links)
<p>In most machine learning approaches, it is usually assumed that data are complete. When data are partially missing due to various reasons, for example, the failure of a subset of sensors, image corruption or inadequate medical measurements, many learning methods designed for complete data cannot be directly applied. In this dissertation we treat two kinds of problems with incomplete data using non-parametric Bayesian approaches: classification with incomplete features and analysis of low-rank matrices with missing entries.</p><p>Incomplete data in classification problems are handled by assuming input features to be generated from a mixture-of-experts model, with each individual expert (classifier) defined by a local Gaussian in feature space. With a linear classifier associated with each Gaussian component, nonlinear classification boundaries are achievable without the introduction of kernels. Within the proposed model, the number of components is theoretically ``infinite'' as defined by a Dirichlet process construction, with the actual number of mixture components (experts) needed inferred based upon the data under test. With a higher-level DP we further extend the classifier for analysis of multiple related tasks (multi-task learning), where model components may be shared across tasks. Available data could be augmented by this way of information transfer even when tasks are only similar in some local regions of feature space, which is particularly critical for cases with scarce incomplete training samples from each task. The proposed algorithms are implemented using efficient variational Bayesian inference and robust performance is demonstrated on synthetic data, benchmark data sets, and real data with natural missing values.</p><p>Another scenario of interest is to complete a data matrix with entries missing. The recovery of missing matrix entries is not possible without additional assumptions on the matrix under test, and here we employ the common assumption that the matrix is low-rank. Unlike methods with a preset fixed rank, we propose a non-parametric Bayesian alternative based on the singular value decomposition (SVD), where missing entries are handled naturally, and the number of underlying factors is imposed to be small and inferred in the light of observed entries. Although we assume missing at random, the proposed model is generalized to incorporate auxiliary information including missingness features. We also make a first attempt in the matrix-completion community to acquire new entries actively. By introducing a probit link function, we are able to handle counting matrices with the decomposed low-rank matrices latent. The basic model and its extensions are validated on</p><p>synthetic data, a movie-rating benchmark and a new data set presented for the first time.</p> / Dissertation
138

Human resource development of Hispanic students in a large Hispanic-majority community college in south Texas: student entry characteristics as predictors of successful course completion and retention in face-to-face and distance education

Cole, Brenda S. 02 June 2009 (has links)
Hispanic student success within community colleges is critical to our future national economy and as such, was pertinent to this Human Resource Development (HRD) research. In this ex-post-facto study, the researcher examined the student entry characteristics of 2,523 Hispanic entering freshmen enrolled anytime between Fall 2000 and Fall 2005 who attempted History, English Composition, or College Algebra for the first time in either face-to-face or distance education courses at South Texas College. The following student entry characteristics of the Hispanic students in the study population were examined for their impact on successful course completion and retention: age, country of elementary education, custody of minors, disabilities, English as a second language, gender, high school diploma type, high school GPA, hours of employment, income level indicators, intent to continue employment, intent to transfer, intended length of enrollment, marital status, number of credit hours, parents’ education, participation in workforce programs in high school, reason for attending, recent migrant work, resident status, and veteran status. The resulting profile of Hispanic distance education student characteristics was found to be similar to common characteristics noted in the literature for other distance education non-Hispanic populations. Furthermore, the researcher identified significant student entry characteristics for predicting the risk of failing to successfully complete courses or to re-enroll. Finally, the researcher provided suggestions for further research regarding Hispanic student performance and success in higher education as a responsibility of the work of Hispanic human resource development within community colleges. This study provides empirical findings related to the student entry characteristics construct found in current theoretical models of retention in commuter institutions of higher education. The researcher recommends expanding this research to other elements of theoretical models of student departure such as the external environment and the internal campus environment. Doing this will support the further refinement and development of the theory and confirm its applicability to local institutional populations.
139

Approximation and Optimal Algorithms for Scheduling Jobs subject to Release Dates

Yu, Su-Jane 30 July 2003 (has links)
In this dissertation, we study the single machine scheduling problem with an objective of minimizing the total completion time subject to release dates. The problem, denoted 1|rj £UCj ,was known to be strongly NP-hard and both theoretically and practically important. The focus of the research in this dissertation is to develop the efficient algorithms for solving the 1|rj|£UCj problem. This thesis contains two parts. In the first part, the theme concerns the approximation approach. We derive a necessary and sufficient condition for local optimality, which can be implemented as a priority rule and be used to construct three heuristic algorithms with running times of O(n log n). By ¡¨local optimality¡¨, we mean the optimality of all candidates whenever a job is selected in a schedule, without considering the other jobs preceding or following. This is the most broadly considered concepts of locally optimal rule. We also identify a dominant subset which is strictly contained in each of all known dominant subsets, where a dominant subset is a set of solutions containing all optimal schedules. In the second part, we develop our optimality algorithms for the 1|rj |£UCj problem. First, we present a lemma for estimating the sum of delay times of the rest jobs, if the starting time is delayed a period of time in a schedule. Then, using the lemma, partially, we proceed to develop a new partition property and three dominance theorems, that will be used and have improved the branch-and-bound algorithms for our optimization approach. By exploiting the insights gained from our heuristics as a branching scheme and by exploiting our heuristics as an upper bounding procedure, we propose three branch-and-bound algorithms. Our algorithms can optimally solve the problem up to 120 jobs, which is known to be the best till now.
140

AN ADVISORY SYSTEM FOR THE DEVELOPMENT OF UNCONVENTIONAL GAS RESERVOIRS

Wei, Yunan 16 January 2010 (has links)
With the rapidly increasing demand for energy and the increasing prices for oil and gas, the role of unconventional gas reservoirs (UGRs) as energy sources is becoming more important throughout the world. Because of high risks and uncertainties associated with UGRs, their profitable development requires experts to be involved in the most critical development stages, such as drilling, completion, stimulation, and production. However, many companies operating UGRs lack this expertise. The advisory system we developed will help them make efficient decisions by providing insight from analogous basins that can be applied to the wells drilled in target basins. In North America, UGRs have been in development for more than 50 years. The petroleum literature has thousands of papers describing best practices in management of these resources. If we can define the characteristics of the target basin anywhere in the world and find an analogous basin in North America, we should be able to study the best practices in the analogous basin or formation and provide the best practices to the operators. In this research, we have built an advisory system that we call the Unconventional Gas Reservoir (UGR) Advisor. UGR Advisor incorporates three major modules: BASIN, PRISE and Drilling & Completion (D&C) Advisor. BASIN is used to identify the reference basin and formations in North America that are the best analogs to the target basin or formation. With these data, PRISE is used to estimate the technically recoverable gas volume in the target basin. Finally, by analogy with data from the reference formation, we use D&C Advisor to find the best practice for drilling and producing the target reservoir. To create this module, we reviewed the literature and interviewed experts to gather the information required to determine best completion and stimulation practices as a function of reservoir properties. We used these best practices to build decision trees that allow the user to take an elementary data set and end up with a decision that honors the best practices. From the decision trees, we developed simple computer algorithms that streamline the process.

Page generated in 0.0643 seconds