• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 885
  • 406
  • 179
  • 124
  • 112
  • 87
  • 77
  • 70
  • 42
  • 40
  • 24
  • 18
  • 16
  • 15
  • 11
  • Tagged with
  • 2356
  • 608
  • 230
  • 159
  • 158
  • 153
  • 136
  • 131
  • 128
  • 123
  • 123
  • 122
  • 122
  • 118
  • 118
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
331

Fault Detection and Diagnosis of Manipulator Based on Probabilistic Production Rule

SUZUKI, Tatsuya, HAYASHI, Koudai, INAGAKI, Shinkichi 01 November 2007 (has links)
No description available.
332

ローカル・ルールによる3次元構造物のデザインについて

斉藤, 大宣, SAITO, Hironobu, 玉城, 龍洋, TAMAKI, Tatsuhiro, 清水, 光輝, SHIMIZU, Hikaru, XIE, Y.M., 北, 英輔, KITA, Eisuke 05 1900 (has links)
No description available.
333

Understanding, Evaluating and Selecting Voting Rules Through Games and Axioms

Santa Cruz Coelho, Danilo 08 November 2004 (has links)
La tesis de doctorado "Understanding, Evaluating and Selecting Voting Rules Through Games and Axioms" de Danilo Santa Cruz Coelho está compuesta de cuatro capítulos. La introducción es el primero y describe brevemente el contenido de los capítulos siguientes. En el Capítulo 2, en el contexto de un modelo de votación probabilística propuesto por Rae (1969), el autor investiga las consecuencias de elegir reglas de votación según el criterio de maximin. En el modelo, una regla de votación es el número mínimo de votantes favorables necesarios a una propuesta para que esta sea aceptada. El autor demuestra que la regla de votación que satisface el criterio de maximin puede ser distinta de la mayoría simple que es la que maximiza la suma de las utilidades esperadas de los votantes. El autor proporciona una caracterización de las reglas de votación que satisfacen el criterio de maximin. En el Capítulo 3, dos juegos que pueden ser inducidos por la regla de los k nombres son propuestos y analizados. El autor proporciona para cada uno de los juegos una caracterización del conjunto de los resultados del equilibrio fuerte de Nash. Estas caracterizaciones permiten al autor discutir las preferencias de los jugadores sobre diferentes variantes de la regla de los k nombres. Una parte importante de la regla de los k nombres es el procedimiento utilizado para seleccionar los k nombres que son propuestos al individuo que toma la decisión final. Seis reglas diferentes de selección que son utilizadas en la realidad por diferentes cuerpos decisorios alrededor del mundo son documentadas. En el Capítulo 4, el autor estudia si estas reglas satisfacen la propiedad de estabilidad. Una regla cumple esta propiedad si esta siempre selecciona un conjunto Weak Condorcet y cuando exista un conjunto con esta característica. El autor demuestra que todas estas seis reglas violan esta propiedad si los votantes no actúan estratégicamente. El autor entonces propone dos reglas estables. Finalmente, él proporciona dos justificaciones para el uso extensivo de las reglas inestables. / The dissertation entitled "Understanding, Evaluating and Selecting Voting Rules Through Games and Axioms" by Danilo Santa Cruz Coelho is composed of four chapters. The introduction is the first one and describes briefly the contents of the following chapters. In Chapter 2, in the context of a probabilistic voting model proposed by Rae (1969), the author investigates the consequences of choosing among threshold voting rules according to the maximin criterion. A threshold voting rule is given by the minimum number of votes needed to approve a proposal of change from the status quo. The author shows that the voting rules that satisfy the maximin criterion are different from the simple majority rule which is the one that maximizes the sum of voter's expected utilities. He provides a characterization of the threshold voting rules that satisfy this criterion as a function of the distribution of voters' probabilities to favour change from the status quo. In Chapter 3, two different game theoretical models that can be induced by the rule of k names are proposed and analysed. A characterization of the set of strong Nash Equilibrium outcomes of each of the games is provided. These characterizations enable the author to discuss the preferences of the players over different variants of the rule of k names. An important part of the rule of k names is the procedure used to screen out the k names to be proposed to the individual who takes the final decision. Six different screening rules which are used in reality by different decision bodies around the world are documented. In Chapter 4, he studies whether these screening rules satisfy stability. A screening rule is stable if it always selects a weak Condorcet set whenever such set exists. He shows that all of the six screening rules violate stability if the voters act not strategically. He then proposes two screening rules which satisfy stability. Finally, he provides two possible justifications for the widespread use of unstable screening rules.
334

Rough Set Based Rule Evaluations and Their Applications

Li, Jiye January 2007 (has links)
Knowledge discovery is an important process in data analysis, data mining and machine learning. Typically knowledge is presented in the form of rules. However, knowledge discovery systems often generate a huge amount of rules. One of the challenges we face is how to automatically discover interesting and meaningful knowledge from such discovered rules. It is infeasible for human beings to select important and interesting rules manually. How to provide a measure to evaluate the qualities of rules in order to facilitate the understanding of data mining results becomes our focus. In this thesis, we present a series of rule evaluation techniques for the purpose of facilitating the knowledge understanding process. These evaluation techniques help not only to reduce the number of rules, but also to extract higher quality rules. Empirical studies on both artificial data sets and real world data sets demonstrate how such techniques can contribute to practical systems such as ones for medical diagnosis and web personalization. In the first part of this thesis, we discuss several rule evaluation techniques that are proposed towards rule postprocessing. We show how properly defined rule templates can be used as a rule evaluation approach. We propose two rough set based measures, a Rule Importance Measure, and a Rules-As-Attributes Measure, %a measure of considering rules as attributes, to rank the important and interesting rules. In the second part of this thesis, we show how data preprocessing can help with rule evaluation. Because well preprocessed data is essential for important rule generation, we propose a new approach for processing missing attribute values for enhancing the generated rules. In the third part of this thesis, a rough set based rule evaluation system is demonstrated to show the effectiveness of the measures proposed in this thesis. Furthermore, a new user-centric web personalization system is used as a case study to demonstrate how the proposed evaluation measures can be used in an actual application.
335

A Puzzle-Based Synthesis Algorithm For a Triple Intersection of Schubert Varieties

Brown, Andrew Alexander Harold 28 January 2010 (has links)
This thesis develops an algorithm for the Schubert calculus of the Grassmanian. Specifically, we state a puzzle-based, synthesis algorithm for a triple intersection of Schubert varieties. Our algorithm is a reformulation of the synthesis algorithm by Bercovici, Collins, Dykema, Li, and Timotin. We replace their combinatorial approach, based on specialized Lebesgue measures, with an approach based on the puzzles of Knutson, Tao and Woodward. The use of puzzles in our algorithm is beneficial for several reasons, foremost among them being the larger body of work exploiting puzzles. To understand the algorithm, we study the necessary Schubert calculus of the Grassmanian to define synthesis. We also discuss the puzzle-based Littlewood-Richardson rule, which connects puzzles to triple intersections of Schubert varieties. We also survey three combinatorial objects related to puzzles in which we include a puzzle-based construction, by King, Tollu, and Toumazet, of the well known Horn inequalities.
336

Rough Set Based Rule Evaluations and Their Applications

Li, Jiye January 2007 (has links)
Knowledge discovery is an important process in data analysis, data mining and machine learning. Typically knowledge is presented in the form of rules. However, knowledge discovery systems often generate a huge amount of rules. One of the challenges we face is how to automatically discover interesting and meaningful knowledge from such discovered rules. It is infeasible for human beings to select important and interesting rules manually. How to provide a measure to evaluate the qualities of rules in order to facilitate the understanding of data mining results becomes our focus. In this thesis, we present a series of rule evaluation techniques for the purpose of facilitating the knowledge understanding process. These evaluation techniques help not only to reduce the number of rules, but also to extract higher quality rules. Empirical studies on both artificial data sets and real world data sets demonstrate how such techniques can contribute to practical systems such as ones for medical diagnosis and web personalization. In the first part of this thesis, we discuss several rule evaluation techniques that are proposed towards rule postprocessing. We show how properly defined rule templates can be used as a rule evaluation approach. We propose two rough set based measures, a Rule Importance Measure, and a Rules-As-Attributes Measure, %a measure of considering rules as attributes, to rank the important and interesting rules. In the second part of this thesis, we show how data preprocessing can help with rule evaluation. Because well preprocessed data is essential for important rule generation, we propose a new approach for processing missing attribute values for enhancing the generated rules. In the third part of this thesis, a rough set based rule evaluation system is demonstrated to show the effectiveness of the measures proposed in this thesis. Furthermore, a new user-centric web personalization system is used as a case study to demonstrate how the proposed evaluation measures can be used in an actual application.
337

A Puzzle-Based Synthesis Algorithm For a Triple Intersection of Schubert Varieties

Brown, Andrew Alexander Harold 28 January 2010 (has links)
This thesis develops an algorithm for the Schubert calculus of the Grassmanian. Specifically, we state a puzzle-based, synthesis algorithm for a triple intersection of Schubert varieties. Our algorithm is a reformulation of the synthesis algorithm by Bercovici, Collins, Dykema, Li, and Timotin. We replace their combinatorial approach, based on specialized Lebesgue measures, with an approach based on the puzzles of Knutson, Tao and Woodward. The use of puzzles in our algorithm is beneficial for several reasons, foremost among them being the larger body of work exploiting puzzles. To understand the algorithm, we study the necessary Schubert calculus of the Grassmanian to define synthesis. We also discuss the puzzle-based Littlewood-Richardson rule, which connects puzzles to triple intersections of Schubert varieties. We also survey three combinatorial objects related to puzzles in which we include a puzzle-based construction, by King, Tollu, and Toumazet, of the well known Horn inequalities.
338

Different Strokes for Different Folks : An intersectional analysis of the political discourse concerning migrant women exposed to domestic violence in Sweden

Littmann, Linnea, Höglund Lindblad, Jenny January 2012 (has links)
The object of this thesis was to deepen the understanding of the contemporary political discourse regarding migrant women exposed to domestic violence. This was conducted by analysing propositions, motions and interpellation debates raising the issue during the years 2000-2012. The method used was inspired by Foucault’s discourse analysis and the traditional hermeneutic approach. The result showed how several different mechanisms work to both include and exclude these women from the Swedish welfare system. By being women they are included in the political debate regarding men’s violence against women, but their migrant status excludes them from it at the same time. When migrant women are exposed to domestic violence it is often seen as an individual problem even though men’s violence against women generally is seen as a structural problem. Several conflicts of interests were also found. One of them being whether migrant women are to be warned if their partners have abused women before. The man’s right to integrity stands against the woman’s right to protection. Another conflict is the fear of the migration right being abused, which is pitted against the migrant women’s rights. To summarize the analysis this thesis has shown how the portraying of migrant women as different in the political discourse plays an important role in creating conflicts of interest and to some extent exclude them from the welfare system. Women’s right seem to apply only to certain women under certain circumstances. An intersectional perspective was necessary for understanding the complexity of the situation, taking into account how different power relations interact and construct the contemporary discourse.
339

Transgression of pleasure:< Les CentVingt journées de Sodome >break the rule¡¦s game

Chen, Ling-hao 06 July 2010 (has links)
none
340

Using JESS for Enforcing Separation of Duties and Binding of Duties in a Web Services-based Workflow

Jang, Yu-Shu 29 July 2010 (has links)
Open distributed environments such as the World Wide Web facilitate information sharing but provide limited support to the protection of sensitive information and resources. Web services have become a part of components for quickly building a business process that satisfies the business goal of an organization, and access control is imperative to prevent the illegal access of sensitive information. In recent years, several researches have investigated the Web services-based workflow access control problem, and selection approaches for choosing the performer for each task so as to satisfy all access control constraints have been proposed. Based on the role-based access control model, we focus on two types of access control: separation of duties and binding of duties. Both role-level and participant-level of SoDs and of BoDs that need to be dynamically enforced are considered in this thesis. While dealing with complex and flexible business logics, we use rule engine to reasons with the business facts to get the result based on business rules. The proposed approach is evaluated by a workflow scenario and is shown to be flexible to develop new process with dynamic access control constraints at the cost of higher execution time.

Page generated in 0.0501 seconds