11 |
A fuzzy constraint satisfaction approach to achieving stability in dynamic constraint satisfaction problems.January 2001 (has links)
by Wong, Yin Pong Anthony. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2001. / Includes bibliographical references (leaves 101-107). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Constraint Satisfaction Problems --- p.2 / Chapter 1.2 --- Solution Stability in Dynamic Constraint Satisfaction Problems --- p.3 / Chapter 1.3 --- Motivation of the Research --- p.5 / Chapter 1.4 --- Overview of the Thesis --- p.5 / Chapter 2 --- Related Work --- p.7 / Chapter 2.1 --- Complete Search Algorithms --- p.7 / Chapter 2.1.1 --- DnAC-4 --- p.8 / Chapter 2.1.2 --- ac --- p.9 / Chapter 2.1.3 --- DnAC-6 --- p.9 / Chapter 2.2 --- Algorithms for Stability --- p.10 / Chapter 2.2.1 --- Bellicha --- p.10 / Chapter 2.2.2 --- Dynamic Dynamic Backtracking --- p.11 / Chapter 2.2.3 --- Wallace and Freuder --- p.12 / Chapter 2.2.4 --- Unimodular Probing --- p.13 / Chapter 2.2.5 --- Train Rescheduling --- p.14 / Chapter 2.3 --- Constrained Optimization Algorithms --- p.14 / Chapter 2.3.1 --- Guided Local Search --- p.14 / Chapter 2.3.2 --- Anytime CSA with Iterative Deepening --- p.15 / Chapter 2.4 --- A Real-life Application --- p.16 / Chapter 3 --- Background --- p.17 / Chapter 3.1 --- Fuzzy Constraint Satisfaction Problems --- p.17 / Chapter 3.2 --- Fuzzy GENET --- p.19 / Chapter 3.2.1 --- Network Architecture --- p.19 / Chapter 3.2.2 --- Convergence Procedure --- p.21 / Chapter 3.3 --- Deficiency in Fuzzy GENET --- p.24 / Chapter 3.4 --- Rectification of Fuzzy GENET --- p.26 / Chapter 4 --- Using Fuzzy GENET for Solving Stability Problems --- p.30 / Chapter 4.1 --- Modelling Stability Problems as FCSPs --- p.30 / Chapter 4.2 --- Extending Fuzzy GENET for Solving Stability Problems --- p.36 / Chapter 4.3 --- Experiments --- p.38 / Chapter 4.3.1 --- Dynamic CSP Generation --- p.39 / Chapter 4.3.2 --- Problems Using Hamming Distance Function --- p.41 / Chapter 4.3.2.1 --- Variation in Number of Variables --- p.42 / Chapter 4.3.2.2 --- Variation in Domain Size --- p.45 / Chapter 4.3.2.3 --- Variation in Density and Tightness --- p.47 / Chapter 4.3.3 --- Comparison in Using Different Thresholds --- p.47 / Chapter 4.3.4 --- Problems Using Manhattan Distance Function --- p.50 / Chapter 5 --- Enhancement of the Modelling Scheme --- p.56 / Chapter 5.1 --- Distance Bound --- p.56 / Chapter 5.2 --- Enhancement of Convergence Procedure --- p.57 / Chapter 5.3 --- Comparison with Optimal Solutions --- p.60 / Chapter 5.4 --- Comparison with Fuzzy GENET(dcsp) --- p.64 / Chapter 5.4.1 --- Medium-sized Problems --- p.64 / Chapter 5.4.2 --- The 150-10-15-15 Problem --- p.67 / Chapter 5.4.3 --- Variation in Density and Tightness --- p.73 / Chapter 5.4.4 --- Variation in Domain Size --- p.76 / Chapter 5.5 --- Analysis of Fuzzy GENET(dcsp2) --- p.94 / Chapter 6 --- Conclusion --- p.98 / Chapter 6.1 --- Contributions --- p.98 / Chapter 6.2 --- Future Work --- p.99 / Bibliography --- p.101
|
12 |
Model induction: a new source of model redundancy for constraint satisfaction problems.January 2002 (has links)
Law Yat Chiu. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2002. / Includes bibliographical references (leaves 85-89). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 2 --- Related Work --- p.4 / Chapter 2.1 --- Equivalence of CSPs --- p.4 / Chapter 2.2 --- Dual Viewpoint --- p.4 / Chapter 2.3 --- CSP Reformulation --- p.5 / Chapter 2.4 --- Multiple Modeling --- p.5 / Chapter 2.5 --- Redundant Modeling --- p.6 / Chapter 2.6 --- Minimal Combined Model --- p.6 / Chapter 2.7 --- Permutation CSPs and Channeling Constraints --- p.6 / Chapter 3 --- Background --- p.8 / Chapter 3.1 --- From Viewpoints to CSP Models --- p.8 / Chapter 3.2 --- Constraint Satisfaction Techniques --- p.10 / Chapter 3.2.1 --- Backtracking Search --- p.11 / Chapter 3.2.2 --- Consistency Techniques and Constraint Propagation --- p.12 / Chapter 3.2.3 --- Incorporating Consistency Techniques into Backtracking Search --- p.18 / Chapter 4 --- Model Induction --- p.21 / Chapter 4.1 --- Channeling Constraints --- p.21 / Chapter 4.2 --- Induced Models --- p.22 / Chapter 4.3 --- Properties --- p.30 / Chapter 5 --- Exploiting Redundancy from Model Induction --- p.35 / Chapter 5.1 --- Combining Redundant Models --- p.35 / Chapter 5.1.1 --- Model Intersection --- p.36 / Chapter 5.1.2 --- Model Channeling --- p.38 / Chapter 5.2 --- Three New Forms of Model Redundancy --- p.39 / Chapter 5.3 --- Experiments --- p.42 / Chapter 5.3.1 --- Langford's Problem --- p.44 / Chapter 5.3.2 --- Random Permutation CSPs --- p.53 / Chapter 5.3.3 --- Golomb Rulers --- p.72 / Chapter 5.3.4 --- Circular Golomb Rulers --- p.74 / Chapter 5.3.5 --- All-Interval Series Problem --- p.78 / Chapter 6 --- Concluding Remarks --- p.82 / Chapter 6.1 --- Contributions --- p.82 / Chapter 6.2 --- Future Work --- p.83
|
13 |
Modelling goes to museums : experiential consumption, the Theory of Planned Behaviour and old and new museologyDavies, Andrea Jane January 1999 (has links)
This study adopts a two-stage structural equation modelling approach to demonstrate the nomological validity and utility of The Theory of Planned Behaviour to both predict and to explain the visiting intentions of middle-class residents to social history museums within the next 12 months. Working within an 'experience-based management approach' the present study provides both a descriptive contribution, in terms of identifying and providing significant improvements in the measurement of museum anticipated experiences and resource facilitators and constraints, as well as a predictive contribution, in terms of assessing the ability of The Theory of Planned Behaviour, and in particular, the relative contribution of attitudes, subjective norms and perceived behavioural control modelled with complex summated- interactive antecedents, to explain museum visiting intentions. Particular attention is given to the neglected role of belief evaluation in previous museum and heritage studies in describing the structure and structural dynamics of anticipated museum experience opportunities. Furthermore, attention is given to the potential contribution of perceived behavioural control, and an understanding of an individual's resource constraints, to the experience-based management approach. A two-stage development of a summated interactive- complex model is shown to overcome methodological and conceptual deficiencies which have been noted in previous expectancy-value attitude studies. In addition, this study examines the impact of the anticipated interpretative environment (physical designed space) on the museum experiential opportunities, control and social influences perceived by individuals, and compares the interpretative orientation of The New Museology (idea-based museum) to traditional mixes of museum interpretative media (object-based museum) in this respect. A qualitative-quantitative research design was employed. Thirty extended qualitative interviews formed the basis of the study by providing a 'real lived' understanding of common consumption experiences at heritage attractions, the resource problems associated with museum visits and the influences of social referents. Four hundred quantitative interviews with respondents from middle-class households formed the main focus of the study. Interviews were conducted using a systematic random sampling method applied in two spatially and demographically contrasting electoral wards of Edinburgh, Scotland. Across the spatial wards, respondents were randomly divided in two sub-groups (n=200). In each sub-group respondents were asked to evaluate a pictorial collage designed to capture the interpretative orientation of either the New Museology or traditional approach to museum interpretative mixes. The study highlights the superiority of interpretative media mixes common to The New Museology in raising the instrumental and experiential-process value individuals anticipate from this style of museum attraction. In doing so, the study finds support for the continued application of The Manning-Haas Hierarchy of Demand, where the importance of 'setting' in managing the consumption experiences of consumers is explicitly recognised. However, due to the 'egalitarian' objective of The New Museology, and the expected 'levelling' or increasing homogeneity observed between visitors and non-visitors to idea-based (The New Museology) in terms of anticipated experiential benefits and costs perceived in this museum environment, the present study finds the predictive ability of attitudes in The Theory of Planned Behaviour is reduced. For the idea-based museum, these findings raise some questions regarding the ability of the Manning-Haas Hierarchy, which is based on expectancy-value theory, to operate as a predictive modd of motivation as it was intended. However, the present study does support the use of the Manning-Haas Hierarchy as a descriptive heuristic for product development alone. Subjective norms were not found to increase our understanding of museum visiting intentions, while the explanatory ability of perceived behavioural control was limited to idea-based museum attractions. Further, based on the significant contribution for past expereince to explain visiting intentions to the idea based museum, the present study calls for further research to identify potential 'deficiencies' in explanatory variables needed to more fully understand the motivations of individuals to visit idea-based museums associated with The New Museology. Finally, the present study demonstrates the importance of both sub-group analysis in the Theory of Planned Behaviour in order to identify the moderating impact of past experience and gender on the relative impact of attitude, subjective norms and perceived behaviour control on museum visiting intentions.
|
14 |
Propagation redundancy in finite domain constraint satisfaction. / CUHK electronic theses & dissertations collectionJanuary 2005 (has links)
A widely adopted approach to solving constraint satisfaction problems combines backtracking tree search with various degrees of constraint propagation for pruning the search space. One common technique to improve the execution efficiency is to add redundant constraints, which are constraints logically implied by others in the problem model and may offer extra information to enhance constraint propagation. However, some redundant constraints are propagation redundant and hence do not contribute additional propagation information to the constraint solver. In this thesis, we propose propagation rules as a tool to compare the propagation strength of constraints, and establish results relating logical and propagation redundancy. / Redundant constraints arise naturally in the process of redundant modeling, where two models of the same problem are connected and combined through channeling constraints. We characterize channeling constraints in terms of restrictive and unrestrictive channel function and give general theorems for proving propagation redundancy of constraints in the combined model. We illustrate, on problems from CSPLib, how detecting and removing propagation redundant constraints can often significantly speed up constraint-solving. / Choi Chiu Wo. / "September 2005." / Adviser: Jimmy Lee. / Source: Dissertation Abstracts International, Volume: 67-07, Section: B, page: 3890. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2005. / Includes bibliographical references (p. 106-117). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstract in English and Chinese. / School code: 1307.
|
15 |
Tractable projection-safe soft global constraints in weighted constraint satisfaction.January 2011 (has links)
Wu, Yi. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2011. / Includes bibliographical references (p. 74-80). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Constraint Satisfaction Problems --- p.1 / Chapter 1.2 --- Weighted Constraint Satisfaction Problems --- p.3 / Chapter 1.3 --- Motivation and Goal --- p.4 / Chapter 1.4 --- Outline of the Thesis --- p.5 / Chapter 2 --- Background --- p.7 / Chapter 2.1 --- Constraint Satisfaction Problems --- p.7 / Chapter 2.1.1 --- Backtracking Tree search --- p.8 / Chapter 2.1.2 --- Local consistencies in CSP --- p.11 / Chapter 2.2 --- Weighted Constraint Satisfaction Problems --- p.18 / Chapter 2.2.1 --- Branch and Bound Search --- p.20 / Chapter 2.2.2 --- Local Consistencies in WCSP --- p.21 / Chapter 2.3 --- Global Constraints --- p.31 / Chapter 3 --- Tractable Projection-Safety --- p.36 / Chapter 3.1 --- Tractable Projection-Safety: Definition and Analysis --- p.37 / Chapter 3.2 --- Polynomially Decomposable Soft Constraints --- p.42 / Chapter 4 --- Examples of Polynomially Decomposable Soft Global Constraints --- p.48 / Chapter 4.1 --- Soft Among Constraint --- p.49 / Chapter 4.2 --- Soft Regular Constraint --- p.51 / Chapter 4.3 --- Soft Grammar Constraint --- p.54 / Chapter 4.4 --- Max_Weight/Min Weight Constraint --- p.57 / Chapter 5 --- Experiments --- p.61 / Chapter 5.1 --- The car Sequencing Problem --- p.61 / Chapter 5.2 --- The nonogram problem --- p.62 / Chapter 5.3 --- Well-Formed Parenthesis --- p.64 / Chapter 5.4 --- Minimum Energy Broadcasting Problem --- p.64 / Chapter 6 --- Related Work --- p.67 / Chapter 6.1 --- WCSP Consistencies --- p.67 / Chapter 6.2 --- Global Constraints . --- p.68 / Chapter 7 --- Conclusion --- p.71 / Chapter 7.1 --- Contributions --- p.71 / Chapter 7.2 --- Future Work --- p.72 / Bibliography --- p.74
|
16 |
System Validation via Constraint ModelingWaters, Richard C. 01 February 1988 (has links)
Constraint modeling could be a very important system validation method, because its abilities are complementary to both testing and code inspection. In particular, even though the ability of constraint modeling to find errors is limited by the simplifications which are introduced when making a constraint model, constraint modeling can locate important classes of errors which are caused by non-local faults (i.e., are hard to find with code inspection) and manifest themselves as failures only in unusual situations (i.e., are hard to find with testing).
|
17 |
The Authority of Deontic ConstraintsRoss, ANDREW 29 August 2013 (has links)
Non-consequentialists agree that Luke may not kill Lorelai in order to prevent Kirk from killing Richard and Emily. According to this view, Luke faces a deontic constraint: he is forbidden from killing Lorelai, even though doing so will bring about fewer killings overall. The justification of constraints, in my view, faces two challenges. First, constraints must meet the Irrationality Challenge: it needs to be demonstrated that there is nothing inconsistent about the claim that Luke should allow more killings to come about. And, secondly, a successful explanation of constraints must meet the Authority Challenge: we need to know why Luke’s reason not to kill Lorelai is normatively categorical.
This dissertation takes up different aspects of Authority Challenge. The first introductory chapter aims to motivate the question of authority as a pressing challenge to non-consequentialism. I argue that the violation of constraints is not just motivated by the thought that they are rationally inconsistent, but by the claim that their intuitive importance cannot be explained.
Chapters two and three take up the connection between the authority of constraints and their interpersonal character. In chapter two, I argue that Stephen Darwall’s account of the second-person standpoint cannot yield an account of constraints that satisfies the Authority Challenge and that T.M. Scanlon’s contractualism offers us a better way of accounting for the interpersonal significance of constraints. Chapter three argues that Frances Kamm’s inviolability approach cannot be reconciled with the intuitive distinction between acting wrongly and wronging someone. The arguments of this chapter are meant to demonstrate that in order for wronging to carry any normative significance, it must play a foundational role in our account of permissibility.
The fourth chapter argues that Moderate deontologists—those who posit a threshold on the killing of the innocent—cannot make sense of the intuitive authority of deontic constraints. The failure of Moderate deontology, I argue, reveals the overlooked appeal of Absolutism. The fifth chapter argues that the authority of restrictions extends to a prohibition on killing non-responsible threats. I argue that a prohibition on killing non-responsible threats accords with the demands of fairness. / Thesis (Ph.D, Philosophy) -- Queen's University, 2013-08-29 10:37:45.739
|
18 |
Toward an understanding of when and why situational constraints influence performanceHorner, Margaret Tutt 15 May 2009 (has links)
The current study sought to explain when and why situational constraints
negatively influence performance on a complex task. In particular, perceived control
and affective reactions (frustration and satisfaction) were examined as potential
explanatory mechanisms, while ability and motivation were tested as moderators. The
influence of situational constraints on task strategies was also examined and tested for
possible nonlinearity. Finally the extent to which task strategy use moderates the
situational constraint-task performance relationship was investigated. A laboratory
study using 158 undergraduate psychology students was conducted. Three levels of
situational constraints (low, moderate, high) were experimentally manipulated.
Performance on a problem solving execution task, as well as experimenter observations
of strategy use, were used to represent the constructs of interest in the study. Results
indicated that situational constraints were directly related to task satisfaction and
frustration and performance. In addition task strategy use was directly related to
performance. However, there was no evidence for mediation or moderation effects.
Limitations and future directions are discussed.
|
19 |
Synchronizing the 3M Cushion Mount Plus supply chainVonasek, Scott M. January 2000 (has links) (PDF)
Thesis--PlanB (M.S.)--University of Wisconsin--Stout, 2000. / Includes bibliographical references.
|
20 |
Consumption, Income And Liquidity Constraints: The Case Of Turkish EconomyCeritoslu, Evren 01 January 2003 (has links) (PDF)
The aim of this thesis study is to enlighten the economic relationship
among consumption, income and liquidity constraints in Turkish Economy. For
this aim, generalized instrumental variables estimation technique (GIVE) is used to
estimate reduced-form consumption equations derived by Hall (1978) and
improved by Campbell and Mankiw (1989). Estimations are realized for two
separate periods of Turkish Economy. For the sub-period of 1987 to 1995, it is
observed that a significant part of households consume their current disposable
income. It is thought that the presence of liquidity constraints forced households to
determine their consumption simply according to their current disposable income.
However, it is observed that the dependence of households to disposable income
decreased substantially, when analyzed for the overall period of 1987 to 2002.
Financial deepening in the economy and the rise of real credit volume contributed
to the decline of the level of liquidity constraints and enabled households to
allocate their income across subsequent periods evenly. Thus, it is concluded that
private consumption behavior is consistent with the Permanent Income / Life-
Cycle Consumption theory for 1987 to 2002 period in Turkish Economy.
|
Page generated in 0.0581 seconds