984 resultados para Bayesian decision boundaries
Resumo:
This paper addresses the problem of ensuring compliance of business processes, implemented within and across organisational boundaries, with the constraints stated in related business contracts. In order to deal with the complexity of this problem we propose two solutions that allow for a systematic and increasingly automated support for addressing two specific compliance issues. One solution provides a set of guidelines for progressively transforming contract conditions into business processes that are consistent with contract conditions thus avoiding violation of the rules in contract. Another solution compares rules in business contracts and rules in business processes to check for possible inconsistencies. Both approaches rely on a computer interpretable representation of contract conditions that embodies contract semantics. This semantics is described in terms of a logic based formalism allowing for the description of obligations, prohibitions, permissions and violations conditions in contracts. This semantics was based on an analysis of typical building blocks of many commercial, financial and government contracts. The study proved that our contract formalism provides a good foundation for describing key types of conditions in contracts, and has also given several insights into valuable transformation techniques and formalisms needed to establish better alignment between these two, traditionally separate areas of research and endeavour. The study also revealed a number of new areas of research, some of which we intend to address in near future.
Resumo:
Faced with today’s ill-structured business environment of fast-paced change and rising uncertainty, organizations have been searching for management tools that will perform satisfactorily under such ambiguous conditions. In the arena of managerial decision making, one of the approaches being assessed is the use of intuition. Based on our definition of intuition as a non-sequential information-processing mode, which comprises both cognitive and affective elements and results in direct knowing without any use of conscious reasoning, we develop a testable model of integrated analytical and intuitive decision making and propose ways to measure the use of intuition.
Resumo:
The A(n-1)((1)) trigonometric vertex model with generic non-diagonal boundaries is studied. The double-row transfer matrix of the model is diagonalized by algebraic Bethe ansatz method in terms of the intertwiner and the corresponding face-vertex relation. The eigenvalues and the corresponding Bethe ansatz equations are obtained.
Resumo:
Data mining is the process to identify valid, implicit, previously unknown, potentially useful and understandable information from large databases. It is an important step in the process of knowledge discovery in databases, (Olaru & Wehenkel, 1999). In a data mining process, input data can be structured, seme-structured, or unstructured. Data can be in text, categorical or numerical values. One of the important characteristics of data mining is its ability to deal data with large volume, distributed, time variant, noisy, and high dimensionality. A large number of data mining algorithms have been developed for different applications. For example, association rules mining can be useful for market basket problems, clustering algorithms can be used to discover trends in unsupervised learning problems, classification algorithms can be applied in decision-making problems, and sequential and time series mining algorithms can be used in predicting events, fault detection, and other supervised learning problems (Vapnik, 1999). Classification is among the most important tasks in the data mining, particularly for data mining applications into engineering fields. Together with regression, classification is mainly for predictive modelling. So far, there have been a number of classification algorithms in practice. According to (Sebastiani, 2002), the main classification algorithms can be categorized as: decision tree and rule based approach such as C4.5 (Quinlan, 1996); probability methods such as Bayesian classifier (Lewis, 1998); on-line methods such as Winnow (Littlestone, 1988) and CVFDT (Hulten 2001), neural networks methods (Rumelhart, Hinton & Wiliams, 1986); example-based methods such as k-nearest neighbors (Duda & Hart, 1973), and SVM (Cortes & Vapnik, 1995). Other important techniques for classification tasks include Associative Classification (Liu et al, 1998) and Ensemble Classification (Tumer, 1996).
Resumo:
Power system small signal stability analysis aims to explore different small signal stability conditions and controls, namely: (1) exploring the power system security domains and boundaries in the space of power system parameters of interest, including load flow feasibility, saddle node and Hopf bifurcation ones; (2) finding the maximum and minimum damping conditions; and (3) determining control actions to provide and increase small signal stability. These problems are presented in this paper as different modifications of a general optimization to a minimum/maximum, depending on the initial guesses of variables and numerical methods used. In the considered problems, all the extreme points are of interest. Additionally, there are difficulties with finding the derivatives of the objective functions with respect to parameters. Numerical computations of derivatives in traditional optimization procedures are time consuming. In this paper, we propose a new black-box genetic optimization technique for comprehensive small signal stability analysis, which can effectively cope with highly nonlinear objective functions with multiple minima and maxima, and derivatives that can not be expressed analytically. The optimization result can then be used to provide such important information such as system optimal control decision making, assessment of the maximum network's transmission capacity, etc. (C) 1998 Elsevier Science S.A. All rights reserved.
Resumo:
The metaphor of boundary is ubiquitous and has guided much research on interpersonal and intergroup communication This article explores the metaphor by reviewing the literature on boundaries with a focus on miscommunication and problematic talk. In particular, the tensions around privacy and self-disclosure, and rules about family communication are good examples of communication and miscommunication across interpersonal boundaries. In the intergroup arena, the negotiation of boundaries implicates the sociostructural relations between, groups and the choices individuals make based on the identities that are salient to them in a given context. We argue that miscommunication can best be conceived of as an indicator of tension in negotiating boundaries as they emerge and change in interaction.
Resumo:
Two studies examined relations between groups (humanities and math-science students) that implicitly or explicitly share a common superordinate category (university student). In Experiment 1, 178 participants performed a noninteractive decision-making task during which category salience was manipulated in a 2 (superordinate category salience) x 2 (subordinate category salience) between-groups design. Consistent with the mutual intergroup differentiation model, participants for whom both categories were salient exhibited the lowest levels of bias, whereas bias was strongest when the superordinate category alone was made salient. This pattern of results was replicated in Experiment 2 (N = 135). In addition, Experiment 2 demonstrated that members of subgroups that are nested within a superordinate category are more sensitive to how the superordinate category is represented than are members of subgroups that extend beyond the boundaries of the superordinate category.
Resumo:
Reports a pilot study of the relative importance of import decision variables as rated by Australian managers. A systematic sample qi 104 Australian managers representing different companies participated in the study. Australian importers rated product quality as the most important variable when importing products from overseas followed by long-term suppliers' dependability, product style/feature, price, and timely delivery. Australian managers who import consumer products find the domestic import duties and tariffs to be more important than did those who import industrial products. Larger volume importers regard the product brand name reputation to be more important than did those who import smaller volumes.
Resumo:
Dun1p and Rad53p of the budding yeast Saccharomyces cerevisiae are members of a conserved family of cell cycle checkpoint protein kinases that contain forkhead-associated (FHA) domains. Here, we demonstrate that these FHA domains contain 130-140 residues, and are thus considerably larger than previously predicted by sequence comparisons (55-75 residues), In vivo, expression of the proteolytically defined Dun1p FHA domain, but not a fragment containing only the predicted domain boundaries, inhibited the transcriptional induction of repair genes following replication blocks, This indicates that the non-catalytic FI-IA domain plays an important role in the transcriptional function of the Dun1p protein kinase. (C) 2000 Federation of European Biochemical Societies.
Resumo:
This paper is devoted to the problems of finding the load flow feasibility, saddle node, and Hopf bifurcation boundaries in the space of power system parameters. The first part contains a review of the existing relevant approaches including not-so-well-known contributions from Russia. The second part presents a new robust method for finding the power system load flow feasibility boundary on the plane defined by any three vectors of dependent variables (nodal voltages), called the Delta plane. The method exploits some quadratic and linear properties of the load now equations and state matrices written in rectangular coordinates. An advantage of the method is that it does not require an iterative solution of nonlinear equations (except the eigenvalue problem). In addition to benefits for visualization, the method is a useful tool for topological studies of power system multiple solution structures and stability domains. Although the power system application is developed, the method can be equally efficient for any quadratic algebraic problem.
Resumo:
This study was designed to test the utility of a revised theory of planned behavior in the prediction of intentions to volunteer among older people. Such a perspective allowed for the consideration of a broader range of social and contextual factors than has been examined in previous research on volunteer decision making among older people. The article reports the findings from a study that investigated volunteer intentions and behavior in a random sample of older people aged 65 to 74 years living in an Australian capital city. Results showed that, as predicted by the revised theory of planned behavior, intention to volunteer predicted subsequent reported volunteer behavior. Intention was, in turn, predicted by social norms (both subjective and behavioral), perceived behavioral control, and moral obligation, with the effect of attitude being mediated through moral obligation.