78 resultados para rule refinement
Resumo:
The last decade has seen an emerging consensus that the rule of law is critical in both domestic and international affairs. ‘Failed’ states generate important issues for both the rule of law and, importantly, for their intersection or interaction. A ‘failed’ state almost inevitably involves a breakdown of the domestic rule of law. When international intervention occurs, it raises concerns over substantive issues. Among these is the application of international law and international norms, including among other, the conventions and treaties, the responsibility to protect and protection of civilians. Where international missions seek to assist the people of ‘failed’ states in rebuilding their nations, establishing the rule of law is often the primary or initial pursuit. Any such international assistance/intervention is more effective if it is clearly subject to the rule of law and provides an exemplar/demonstration of how power should be exercised
Resumo:
In many applications, e.g., bioinformatics, web access traces, system utilisation logs, etc., the data is naturally in the form of sequences. People have taken great interest in analysing the sequential data and finding the inherent characteristics or relationships within the data. Sequential association rule mining is one of the possible methods used to analyse this data. As conventional sequential association rule mining very often generates a huge number of association rules, of which many are redundant, it is desirable to find a solution to get rid of those unnecessary association rules. Because of the complexity and temporal ordered characteristics of sequential data, current research on sequential association rule mining is limited. Although several sequential association rule prediction models using either sequence constraints or temporal constraints have been proposed, none of them considered the redundancy problem in rule mining. The main contribution of this research is to propose a non-redundant association rule mining method based on closed frequent sequences and minimal sequential generators. We also give a definition for the non-redundant sequential rules, which are sequential rules with minimal antecedents but maximal consequents. A new algorithm called CSGM (closed sequential and generator mining) for generating closed sequences and minimal sequential generators is also introduced. A further experiment has been done to compare the performance of generating non-redundant sequential rules and full sequential rules, meanwhile, performance evaluation of our CSGM and other closed sequential pattern mining or generator mining algorithms has also been conducted. We also use generated non-redundant sequential rules for query expansion in order to improve recommendations for infrequently purchased products.
Resumo:
This study examined the psychosocial factors impacting upon the rule-following behaviour of residents of a hostel providing crisis accommodation to women who are homeless. After their arrival, residents of a women’s hostel (N = 83) completed questionnaires assessing the Theory of Planned Behaviour constructs of attitude, subjective norm, perceived behavioural control (PBC), and intentions related to rule-following while residing at the hostel. Perceived resident group norms for rule-following were assessed also. Follow-up staff evaluations of the target behaviour were completed after participants ceased their hostel residence. As expected, attitude, subjective norm, PBC, and group norm significantly predicted intention to follow hostel rules, and intention and PBC predicted rule following behaviour. As rule following is a crucial requirement for continuation of their stay, these findings can inform strategies to improve the experiences and outcomes of women’s short-term hostel stays.
Resumo:
The fundamental personal property rule – no one can transfer a better title to property than they had – is subject to exceptions in the Sale of Goods legislation, which aim to protect innocent buyers who are deceived by a seller’s apparent physical possession of property. These exceptions cover a limited range of transactions and are restrictive in their operation. Australia now has national legislation - the Personal Property Securities Act 2009 (Cth) - which will apply to many transactions outside the scope of the Sale of Goods Act and which includes rules for sales by non-owners which will provide exceptions to the nemo dat quod non habet rule for many common commercial transactions. This article explores the effect of the Personal Property Securities Act 2009 (Cth) on the Sale of Goods exceptions, explains that the new provisions are so wide that there is little continuing relevance for the Sale of Goods Act exceptions, and indicates where they may still apply.
Resumo:
Embedded real-time programs rely on external interrupts to respond to events in their physical environment in a timely fashion. Formal program verification theories, such as the refinement calculus, are intended for development of sequential, block-structured code and do not allow for asynchronous control constructs such as interrupt service routines. In this article we extend the refinement calculus to support formal development of interrupt-dependent programs. To do this we: use a timed semantics, to support reasoning about the occurrence of interrupts within bounded time intervals; introduce a restricted form of concurrency, to model composition of interrupt service routines with the main program they may preempt; introduce a semantics for shared variables, to model contention for variables accessed by both interrupt service routines and the main program; and use real-time scheduling theory to discharge timing requirements on interruptible program code.
Resumo:
Rule extraction from neural network algorithms have been investigated for two decades and there have been significant applications. Despite this level of success, rule extraction from neural network methods are generally not part of data mining tools, and a significant commercial breakthrough may still be some time away. This paper briefly reviews the state-of-the-art and points to some of the obstacles, namely a lack of evaluation techniques in experiments and larger benchmark data sets. A significant new development is the view that rule extraction from neural networks is an interactive process which actively involves the user. This leads to the application of assessment and evaluation techniques from information retrieval which may lead to a range of new methods.
Resumo:
A rule-based approach for classifying previously identified medical concepts in the clinical free text into an assertion category is presented. There are six different categories of assertions for the task: Present, Absent, Possible, Conditional, Hypothetical and Not associated with the patient. The assertion classification algorithms were largely based on extending the popular NegEx and Context algorithms. In addition, a health based clinical terminology called SNOMED CT and other publicly available dictionaries were used to classify assertions, which did not fit the NegEx/Context model. The data for this task includes discharge summaries from Partners HealthCare and from Beth Israel Deaconess Medical Centre, as well as discharge summaries and progress notes from University of Pittsburgh Medical Centre. The set consists of 349 discharge reports, each with pairs of ground truth concept and assertion files for system development, and 477 reports for evaluation. The system’s performance on the evaluation data set was 0.83, 0.83 and 0.83 for recall, precision and F1-measure, respectively. Although the rule-based system shows promise, further improvements can be made by incorporating machine learning approaches.
Resumo:
We present an iterative hierarchical algorithm for multi-view stereo. The algorithm attempts to utilise as much contextual information as is available to compute highly accurate and robust depth maps. There are three novel aspects to the approach: 1) firstly we incrementally improve the depth fidelity as the algorithm progresses through the image pyramid; 2) secondly we show how to incorporate visual hull information (when available) to constrain depth searches; and 3) we show how to simultaneously enforce the consistency of the depth-map by continual comparison with neighbouring depth-maps. We show that this approach produces highly accurate depth-maps and, since it is essentially a local method, is both extremely fast and simple to implement.
Resumo:
Although the Uniform Civil Procedure Rules 1999 (Qld) (UCPR) have always included a power for the court to order a party to pay an amount for costs to be fixed by the court, until recently the power was rarely used in the higher courts. In light of recent practice directions, and the changes to the procedures for assessment of costs contained in the new Chapter 17A of the UCPR, this is no longer the case. The judgment of Mullins J in ASIC v Atlantic 3 Financial (Aust) Pty Ltd [2008] QSC 9 provides some helpful guidance for practitioners about the principles which might be applied.
Resumo:
Please see the updated published version of this work at http://eprints.qut.edu.au/37850/ There is a severe tendency in cyberlaw theory to delegitimize state intervention in the governance of virtual communities. Much of the existing theory makes one of two fundamental flawed assumptions: that communities will always be best governed without the intervention of the state; or that the territorial state can best encourage the development of communities by creating enforceable property rights and allowing the market to resolve any disputes. These assumptions do not ascribe sufficient weight to the value-laden support that the territorial state always provides to private governance regimes, the inefficiencies that will tend to limit the development utopian communities, and the continued role of the territorial state in limiting autonomy in accordance with communal values...