Spelling suggestions: "subject:"enumeration"" "subject:"enumerate""
11 |
A Corpus-Based Analysis of Enumerative Existentials: From Grammatico-Semantic Features to Ariel’s Accessibility TheoryPlitt, Ramona Teresa 18 December 2019 (has links)
Diese Arbeit befasst sich mit den grammatischen und semantischen Kontexten enumerativer 'there-existentials' im Englischen. Mithilfe von Korpusbelegen werden die Auftretenskontexte näher bestimmt. Im Anschluss werden die Ergebnisse anhand Mira Ariels 'Accessibility Theory' gegengeprüft und interpretiert. / This paper seeks to analyze the grammtical and semantic contexts of enumerative 'there-existentials' in English. By using corpus data, the contextual environment of there-extistantials' will be defined more closely. Afterwards, the results will be checked and interpreted againts Mira Ariel's 'Accessibility Theory'.
|
12 |
AXEL : a framework to deal with ambiguity in three-noun compoundsMartinez, Jorge Matadamas January 2010 (has links)
Cognitive Linguistics has been widely used to deal with the ambiguity generated by words in combination. Although this domain offers many solutions to address this challenge, not all of them can be implemented in a computational environment. The Dynamic Construal of Meaning framework is argued to have this ability because it describes an intrinsic degree of association of meanings, which in turn, can be translated into computational programs. A limitation towards a computational approach, however, has been the lack of syntactic parameters. This research argues that this limitation could be overcome with the aid of the Generative Lexicon Theory (GLT). Specifically, this dissertation formulated possible means to marry the GLT and Cognitive Linguistics in a novel rapprochement between the two. This bond between opposing theories provided the means to design a computational template (the AXEL System) by realising syntax and semantics at software levels. An instance of the AXEL system was created using a Design Research approach. Planned iterations were involved in the development to improve artefact performance. Such iterations boosted performance-improving, which accounted for the degree of association of meanings in three-noun compounds. This dissertation delivered three major contributions on the brink of a so-called turning point in Computational Linguistics (CL). First, the AXEL system was used to disclose hidden lexical patterns on ambiguity. These patterns are difficult, if not impossible, to be identified without automatic techniques. This research claimed that these patterns can assist audiences of linguists to review lexical knowledge on a software-based viewpoint. Following linguistic awareness, the second result advocated for the adoption of improved resources by decreasing electronic space of Sense Enumerative Lexicons (SELs). The AXEL system deployed the generation of “at the moment of use” interpretations, optimising the way the space is needed for lexical storage. Finally, this research introduced a subsystem of metrics to characterise an ambiguous degree of association of three-noun compounds enabling ranking methods. Weighing methods delivered mechanisms of classification of meanings towards Word Sense Disambiguation (WSD). Overall these results attempted to tackle difficulties in understanding studies of Lexical Semantics via software tools.
|
13 |
Combinatorics of oriented trees and tree-like structuresOkoth, Isaac Owino 03 1900 (has links)
Thesis (PhD)--Stellenbosch University, 2015. / ENGLISH ABSTRACT : In this thesis, a number of combinatorial objects are enumerated. Du and
Yin as well as Shin and Zeng (by a different approach) proved an elegant
formula for the number of labelled trees with respect to a given in degree
sequence, where each edge is oriented from a vertex of lower label towards
a vertex of higher label. We refine their result to also take the number of
sources (vertices of in degree 0) or sinks (vertices of out degree 0) into account.
We find formulas for the mean and variance of the number of sinks
or sources in these trees. We also obtain a differential equation and a functional
equation satisfied by the generating function for these trees. Analogous
results for labelled trees with two marked vertices, related to functional
digraphs, are also established.
We extend the work to count reachable vertices, sinks and leaf sinks in
these trees. Among other results, we obtain a counting formula for the number
of labelled trees on n vertices in which exactly k vertices are reachable
from a given vertex v and also the average number of vertices that are reachable
from a specified vertex in labelled trees of order n.
In this dissertation, we also enumerate certain families of set partitions
and related tree-like structures. We provide a proof for a formula that counts
connected cycle-free families of k set partitions of {1, . . . , n} satisfying a certain
coherence condition and then establish a bijection between these families and the set of labelled free k-ary cacti with a given vertex-degree distribution.
We then show that the formula also counts coloured Husimi graphs
in which there are no blocks of the same colour that are incident to one another.
We extend the work to count coloured oriented cacti and coloured
cacti.
Noncrossing trees and related tree-like structures are also considered in
this thesis. Specifically, we establish formulas for locally oriented noncrossing
trees with a given number of sources and sinks, and also with given
indegree and outdegree sequences. The work is extended to obtain the average
number of reachable vertices in these trees. We then generalise the
concept of noncrossing trees to find formulas for the number of noncrossing
Husimi graphs, cacti and oriented cacti. The study is further extended
to find formulas for the number of bicoloured noncrossing Husimi graphs
and the number of noncrossing connected cycle-free pairs of set partitions. / AFRIKAANSE OPSOMMING : In hierdie tesis word ’n aantal kombinatoriese objekte geenumereer. Du
en Yin asook Shin en Zeng (deur middel van ’n ander benadering) het ’n
elegante formule vir die aantal geëtiketteerde bome met betrekking tot ’n
gegewe ingangsgraadry, waar elke lyn van die nodus met die kleiner etiket
na die nodus met die groter etiket toe georiënteer word. Ons verfyn hul
resultaat deur ook die aantal bronne (nodusse met ingangsgraad 0) en putte
(nodusse met uitgangsgraad 0) in ag te neem. Ons vind formules vir die gemiddelde
en variansie van die aantal putte of bronne in hierdie bome. Ons
bepaal verder ’n differensiaalvergelyking en ’n funksionaalvergelyking wat
deur die voortbringende funksie van hierdie bome bevredig word. Analoë
resultate vir geëtiketteerde bome met twee gemerkte nodusse (wat verwant
is aan funksionele digrafieke), is ook gevind.
Ons gaan verder voort deur ook bereikbare nodusse, bronne en putte in
hierdie bome at te tel. Onder andere verkry ons ’n formule vir die aantal geëtiketteerde
bome met n nodusse waarin presies k nodusse vanaf ’n gegewe
nodus v bereikbaar is asook die gemiddelde aantal nodusse wat bereikbaar
is vanaf ’n gegewe nodus.
Ons enumereer in hierdie tesis verder sekere families van versamelingsverdelings
en soortgelyke boom-vormige strukture. Ons gee ’n bewys vir ’n
formule wat die aantal van samehangende siklus-vrye families van k versamelingsverdelings
op {1, . . . , n} wat ’n sekere koherensie-vereiste bevredig,
en ons beskryf ’n bijeksie tussen hierdie familie en die versameling van
geëtiketteerde vrye k-êre kaktusse met ’n gegewe nodus-graad-verdeling.
Ons toon ook dat hierdie formule ook gekleurde Husimi-grafieke tel waar
blokke van dieselfde kleur nie insident met mekaar mag wees nie. Ons tel
verder ook gekleurde georiënteerde kaktusse en gekleurde kaktusse.
Nie-kruisende bome en soortgelyke boom-vormige strukture word in
hierdie tesis ook beskou. On bepaal spesifiek formules vir lokaal georiënteerde
nie-kruisende bome wat ’n gegewe aantal bronne en putte het asook
nie-kruisende bome met gegewe ingangs- en uitgangsgraadrye. Ons
gaan voort deur die gemiddelde aantal bereikbare nodusse in hierdie bome
te bepaal. Ons veralgemeen dan die konsep van nie-kruisende bome en
vind formules vir die aantal nie-kruisende Husimi-grafieke, kaktusse en
georiënteerde kaktusse. Laastens vind ons ’n formule vir die aantaal tweegekleurde
nie-kruisende Husimi-grafieke en die aantal nie-kruisende samehangende
siklus-vrye pare van versamelingsverdelings.
|
14 |
Reality and Computation in Schubert CalculusHein, Nickolas Jason 16 December 2013 (has links)
The Mukhin-Tarasov-Varchenko Theorem (previously the Shapiro Conjecture) asserts that a Schubert problem has all solutions distinct and real if the Schubert varieties involved osculate a rational normal curve at real points. When conjectured, it sparked interest in real osculating Schubert calculus, and computations played a large role in developing the surrounding theory. Our purpose is to uncover generalizations of the Mukhin-Tarasov-Varchenko Theorem, proving them when possible. We also improve the state of the art of computationally solving Schubert problems, allowing us to more effectively study ill-understood phenomena in Schubert calculus.
We use supercomputers to methodically solve real osculating instances of Schubert problems. By studying over 300 million instances of over 700 Schubert problems, we amass data significant enough to reveal generalizations of the Mukhin-Tarasov- Varchenko Theorem and compelling enough to support our conjectures. Combining algebraic geometry and combinatorics, we prove some of these conjectures. To improve the efficiency of solving Schubert problems, we reformulate an instance of a Schubert problem as the solution set to a square system of equations in a higher- dimensional space.
During our investigation, we found the number of real solutions to an instance of a symmetrically defined Schubert problem is congruent modulo four to the number of complex solutions. We proved this congruence, giving a generalization of the Mukhin-Tarasov-Varchenko Theorem and a new invariant in enumerative real algebraic geometry. We also discovered a family of Schubert problems whose number of real solutions to a real osculating instance has a lower bound depending only on the number of defining flags with real osculation points.
We conclude that our method of computational investigation is effective for uncovering phenomena in enumerative real algebraic geometry. Furthermore, we point out that our square formulation for instances of Schubert problems may facilitate future experimentation by allowing one to solve instances using certifiable numerical methods in lieu of more computationally complex symbolic methods. Additionally, the methods we use for proving the congruence modulo four and for producing an
|
15 |
Solving Nested Recursions with TreesIsgur, Abraham 19 June 2014 (has links)
This thesis concerns the use of labelled infinite trees to solve families of nested recursions of the form $R(n)=\sum_{i=1}^kR(n-a_i-\sum_{j=1}^{p_i}R(n-b_{ij}))+w$, where $a_i$ is a nonnegative integer, $w$ is any integer, and $b_{ij},k,$ and $p_i$ are natural numbers. We show that the solutions to many families of such nested recursions have an intriguing combinatorial interpretation, namely, they count nodes on the bottom level of labelled infinite trees that correspond to the recursion. Furthermore, we show how the parameters defining these recursion families relate in a natural way to specific structural properties of the corresponding tree families. We introduce a general tree ``pruning" methodology that we use to establish all the required tree-sequence correspondences.
|
16 |
Solving Nested Recursions with TreesIsgur, Abraham 19 June 2014 (has links)
This thesis concerns the use of labelled infinite trees to solve families of nested recursions of the form $R(n)=\sum_{i=1}^kR(n-a_i-\sum_{j=1}^{p_i}R(n-b_{ij}))+w$, where $a_i$ is a nonnegative integer, $w$ is any integer, and $b_{ij},k,$ and $p_i$ are natural numbers. We show that the solutions to many families of such nested recursions have an intriguing combinatorial interpretation, namely, they count nodes on the bottom level of labelled infinite trees that correspond to the recursion. Furthermore, we show how the parameters defining these recursion families relate in a natural way to specific structural properties of the corresponding tree families. We introduce a general tree ``pruning" methodology that we use to establish all the required tree-sequence correspondences.
|
17 |
Variedades Involutivas e Aplicações EnumerativasMedeiros, Rainelly Cunha de 10 August 2012 (has links)
Made available in DSpace on 2015-05-15T11:46:13Z (GMT). No. of bitstreams: 1
arquivototal.pdf: 1484760 bytes, checksum: 5c7fe2297276b2f7b61da870afdcdd22 (MD5)
Previous issue date: 2012-08-10 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES / In this work are introduced the concepts of involutive affine and projective
varieties. Taking into account that every projective variety in P2n-1 has dimension
greater than or equal to n-1 and that every hypersurface is involutive, we put our
focus on the study of involutive curves in P3, noting that a curve in P3 contained
in a plane will be involutive if and only if it is a union of lines passing through the
point associated to the suported by plane the correspondence between points and
planes determined by the standard symplectic form in P3. We started using the
Poisson bracelete invariance of the definition ideal of a varity criterion to determine
the involutive lines and conics in P3. Moreover, we exhibit a family of involutive
twisted curves. Finally, having in mind that the parameters spaces for involutive
lines and conics are 3 and 5 dimensional spaces, respectively. We find how many
involutive lines and conic meet 3 and 5 given lines in P3, respectively. / Neste trabalho são introduzidos os conceitos de variedades involutiva afim e
projetiva. Tendo em consideração que toda variedade projetiva em P2n-1 tem
dimensão maior ou igual a n-1 e que toda hipersuperfície é involutiva, colocamos
nosso foco no estudo das curvas involutivas em P3, destacando que uma curva em
P3 contida em um plano será involutiva se, e somente, se for uma união de retas
passando pelo ponto associado ao plano suporte, pela correspondência entre planos
e pontos determinada pela forma simplética padrão em P3. Começamos utilizando
o critério da invariância do ideal de definição da variedade sob o colchete de Poisson
para determinar as retas e cônicas involutivas em P3. Em seguida, exibimos famílias
de cúbicas reversas involutivas. Finalmente, tendo em consideração que os espaços
de parâmetros determinados para retas e cônicas involutivas tem dimensão 3 e 5,
respectivamente, discutimos o problema de determinar quantas retas (resp. cônicas)
involutivas encontram simultaneamente 3 (resp. 5) retas dadas em P3.
|
18 |
The analysis of enumerative source codes and their use in Burrows‑Wheeler compression algorithmsMcDonald, Andre Martin 10 September 2010 (has links)
In the late 20th century the reliable and efficient transmission, reception and storage of information proved to be central to the most successful economies all over the world. The Internet, once a classified project accessible to a selected few, is now part of the everyday lives of a large part of the human population, and as such the efficient storage of information is an important part of the information economy. The improvement of the information storage density of optical and electronic media has been remarkable, but the elimination of redundancy in stored data and the reliable reconstruction of the original data is still a desired goal. The field of source coding is concerned with the compression of redundant data and its reliable decompression. The arithmetic source code, which was independently proposed by J. J. Rissanen and R. Pasco in 1976, revolutionized the field of source coding. Compression algorithms that use an arithmetic code to encode redundant data are typically more effective and computationally more efficient than compression algorithms that use earlier source codes such as extended Huffman codes. The arithmetic source code is also more flexible than earlier source codes, and is frequently used in adaptive compression algorithms. The arithmetic code remains the source code of choice, despite having been introduced more than 30 years ago. The problem of effectively encoding data from sources with known statistics (i.e. where the probability distribution of the source data is known) was solved with the introduction of the arithmetic code. The probability distribution of practical data is seldomly available to the source encoder, however. The source coding of data from sources with unknown statistics is a more challenging problem, and remains an active research topic. Enumerative source codes were introduced by T. J. Lynch and L. D. Davisson in the 1960s. These lossless source codes have the remarkable property that they may be used to effectively encode source sequences from certain sources without requiring any prior knowledge of the source statistics. One drawback of these source codes is the computationally complex nature of their implementations. Several years after the introduction of enumerative source codes, J. G. Cleary and I. H. Witten proved that approximate enumerative source codes may be realized by using an arithmetic code. Approximate enumerative source codes are significantly less complex than the original enumerative source codes, but are less effective than the original codes. Researchers have become more interested in arithmetic source codes than enumerative source codes since the publication of the work by Cleary and Witten. This thesis concerns the original enumerative source codes and their use in Burrows–Wheeler compression algorithms. A novel implementation of the original enumerative source code is proposed. This implementation has a significantly lower computational complexity than the direct implementation of the original enumerative source code. Several novel enumerative source codes are introduced in this thesis. These codes include optimal fixed–to–fixed length source codes with manageable computational complexity. A generalization of the original enumerative source code, which includes more complex data sources, is proposed in this thesis. The generalized source code uses the Burrows–Wheeler transform, which is a low–complexity algorithm for converting the redundancy of sequences from complex data sources to a more accessible form. The generalized source code effectively encodes the transformed sequences using the original enumerative source code. It is demonstrated and proved mathematically that this source code is universal (i.e. the code has an asymptotic normalized average redundancy of zero bits). AFRIKAANS : Die betroubare en doeltreffende versending, ontvangs en berging van inligting vorm teen die einde van die twintigste eeu die kern van die mees suksesvolle ekonomie¨e in die wˆereld. Die Internet, eens op ’n tyd ’n geheime projek en toeganklik vir slegs ’n klein groep verbruikers, is vandag deel van die alledaagse lewe van ’n groot persentasie van die mensdom, en derhalwe is die doeltreffende berging van inligting ’n belangrike deel van die inligtingsekonomie. Die verbetering van die bergingsdigteid van optiese en elektroniese media is merkwaardig, maar die uitwissing van oortolligheid in gebergde data, asook die betroubare herwinning van oorspronklike data, bly ’n doel om na te streef. Bronkodering is gemoeid met die kompressie van oortollige data, asook die betroubare dekompressie van die data. Die rekenkundige bronkode, wat onafhanklik voorgestel is deur J. J. Rissanen en R. Pasco in 1976, het ’n revolusie veroorsaak in die bronkoderingsveld. Kompressiealgoritmes wat rekenkundige bronkodes gebruik vir die kodering van oortollige data is tipies meer doeltreffend en rekenkundig meer effektief as kompressiealgoritmes wat vroe¨ere bronkodes, soos verlengde Huffman kodes, gebruik. Rekenkundige bronkodes, wat gereeld in aanpasbare kompressiealgoritmes gebruik word, is ook meer buigbaar as vroe¨ere bronkodes. Die rekenkundige bronkode bly na 30 jaar steeds die bronkode van eerste keuse. Die probleem om data wat afkomstig is van bronne met bekende statistieke (d.w.s. waar die waarskynlikheidsverspreiding van die brondata bekend is) doeltreffend te enkodeer is opgelos deur die instelling van rekenkundige bronkodes. Die bronenkodeerder het egter selde toegang tot die waarskynlikheidsverspreiding van praktiese data. Die bronkodering van data wat afkomstig is van bronne met onbekende statistieke is ’n groter uitdaging, en bly steeds ’n aktiewe navorsingsveld. T. J. Lynch and L. D. Davisson het tel–bronkodes in die 1960s voorgestel. Tel– bronkodes het die merkwaardige eienskap dat bronsekwensies van sekere bronne effektief met hierdie foutlose kodes ge¨enkodeer kan word, sonder dat die bronenkodeerder enige vooraf kennis omtrent die statistieke van die bron hoef te besit. Een nadeel van tel–bronkodes is die ho¨e rekenkompleksiteit van hul implementasies. J. G. Cleary en I. H. Witten het verskeie jare na die instelling van tel–bronkodes bewys dat benaderde tel–bronkodes gerealiseer kan word deur die gebruik van rekenkundige bronkodes. Benaderde tel–bronkodes het ’n laer rekenkompleksiteit as tel–bronkodes, maar benaderde tel–bronkodes is minder doeltreffend as die oorspronklike tel–bronkodes. Navorsers het sedert die werk van Cleary en Witten meer belangstelling getoon in rekenkundige bronkodes as tel–bronkodes. Hierdie tesis is gemoeid met die oorspronklike tel–bronkodes en die gebruik daarvan in Burrows–Wheeler kompressiealgoritmes. ’n Nuwe implementasie van die oorspronklike tel–bronkode word voorgestel. Die voorgestelde implementasie het ’n beduidende laer rekenkompleksiteit as die direkte implementasie van die oorspronklike tel–bronkode. Verskeie nuwe tel–bronkodes, insluitende optimale vaste–tot–vaste lengte tel–bronkodes met beheerbare rekenkompleksiteit, word voorgestel. ’n Veralgemening van die oorspronklike tel–bronkode, wat meer komplekse databronne insluit as die oorspronklike tel–bronkode, word voorgestel in hierdie tesis. The veralgemeende tel–bronkode maak gebruik van die Burrows–Wheeler omskakeling. Die Burrows–Wheeler omskakeling is ’n lae–kompleksiteit algoritme wat die oortolligheid van bronsekwensies wat afkomstig is van komplekse databronne omskakel na ’n meer toeganklike vorm. Die veralgemeende bronkode enkodeer die omgeskakelde sekwensies effektief deur die oorspronklike tel–bronkode te gebruik. Die universele aard van hierdie bronkode word gedemonstreer en wiskundig bewys (d.w.s. dit word bewys dat die kode ’n asimptotiese genormaliseerde gemiddelde oortolligheid van nul bisse het). Copyright / Dissertation (MEng)--University of Pretoria, 2010. / Electrical, Electronic and Computer Engineering / unrestricted
|
19 |
Gromov-Witten invariants via localization techniquesDizep, Noah January 2023 (has links)
Gromov-Witten invariants play a crucial role in symplectic- and enumerative Geometry as well as topological String Theory. Essentially, theseinvariants are a count of (pseudo)holomorphic curves of a given genus,going through n-marked points on a symplectic manifold. In the last fewdecades, this has been a huge research topic for both physicists as well asmathematicians, and breakthroughs in calculation techniques have beenmade using Mirror Symmetry. We investigate and explicitly calculateclosed genus zero Gromov-Witten invariants of toric Calabi-Yau threefolds, namely O(−3) → P2 and the resolved conifold. This will be doneby using localization techniques, mirror symmetry and the so called diskpartition function.
|
20 |
On Toric Symmetry of P1 x P2Beckwith, Olivia D 01 May 2013 (has links)
Toric varieties are a class of geometric objects with a combinatorial structure encoded in polytopes. P1 x P2 is a well known variety and its polytope is the triangular prism. Studying the symmetries of the triangular prism and its truncations can lead to symmetries of the variety. Many of these symmetries permute the elements of the cohomology ring nontrivially and induce nontrivial relations. We discuss some toric symmetries of P1 x P2, and describe the geometry of the polytope of the corresponding blowups, and analyze the induced action on the cohomology ring. We exhaustively compute the toric symmetries of P1 x P2.
|
Page generated in 0.0603 seconds