925 resultados para forfeiture rule
Resumo:
Private rule-making is widely discussed as supporting institutional policy making and legislation at EU level. The following argues for a different perspective on private actor rule-making, focusing on the autonomy of social realms within which self-governance may be possible. From this perspective, private actor rule-making is considered as a potential gain in self-determination. Substantive autonomy and enhanced self-determination of all those affected are considered as prerequisites for accepting rules made by private actors. Opening the field for discussion, some manifestations of (envisaged) private rule-making at EU level are explored and discussed as to whether they should be accepted as legitimate forms of self-governance.
Resumo:
Multi-bit trie is a popular approach performing the longest prefix matching for packet classification. However, it requires a long lookup time and inefficiently consumes memory space. This paper presents an in-depth study of different variations of multi-bit trie for IP address lookup. Our main aim is to study a method of data structure which reduces memory space. The proposed approach has been implemented using the label method in two approaches. Both methods present better results regarding lookup speed, update time and memory bit consumptions.
Resumo:
A study of Ireland's border.
Resumo:
Association rule mining is an indispensable tool for discovering
insights from large databases and data warehouses.
The data in a warehouse being multi-dimensional, it is often
useful to mine rules over subsets of data defined by selections
over the dimensions. Such interactive rule mining
over multi-dimensional query windows is difficult since rule
mining is computationally expensive. Current methods using
pre-computation of frequent itemsets require counting
of some itemsets by revisiting the transaction database at
query time, which is very expensive. We develop a method
(RMW) that identifies the minimal set of itemsets to compute
and store for each cell, so that rule mining over any
query window may be performed without going back to the
transaction database. We give formal proofs that the set of
itemsets chosen by RMW is sufficient to answer any query
and also prove that it is the optimal set to be computed
for 1 dimensional queries. We demonstrate through an extensive
empirical evaluation that RMW achieves extremely
fast query response time compared to existing methods, with
only moderate overhead in pre-computation and storage
Resumo:
Book review of Slavery by Any Other Name: African Life under Company Rule in Colonial Mozambique, by Eric Allina, Charlottesville, University of Virginia Press, 2012, 255 pp., £44.50, ISBN 978-0-8139-3272-9.
Resumo:
This paper showcases the weaknesses of EU enlargement law and demonstrates how one Member State – namely, Greece – is notable for abusing this weakness, for harming the candidate countries, the EU, and the institutions alike, for stripping the EU position of its predictability, and for undermining the EU Commission’s efforts. Accordingly, Greece has severely incapacitated the key procedural rule of law component of the EU’s enlargement regulation, turning it into a randomised political game and ignoring any long-term goals of stability, prosperity, and peace that the process is to stand for. Following a walk through Greece’s engagement throughout a number of enlargement rounds, the paper concludes that the duty of loyalty – which is presumably able to discipline Member States that undermine the common effort – should find a new meaning in the context of EU enlargement.
Resumo:
This paper presents a method of using the so-colled "bacterial algorithm" (4,5) for extracting a fuzzy rule base from a training set. The bewly proposed bacterial evolutionary algorithm (BEA) is shown. In our application one bacterium corresponds to a fuzzy rule system.
Resumo:
Several alternative approaches have been discussed: Levenberg-Marquardt - no satisfactory convergence speed + local minimum, Bacterial algorithm - problems with large dimensionality (speed), Clustering - no safe criterion for number of clusters + dimentionality problem.
Resumo:
This article wishes to contribute to the study of the historical processes that have been spotting Muslim populations as favourite targets for political analysis and governance. Focusing on the Portuguese archives, civil as well as military, the article tries to uncover the most conspicuous identity representations (mainly negative or ambivalent) that members of Portuguese colonial apparatus built around Muslim communities living in African colonies, particularly in Guinea-Bissau and Mozambique. The paper shows how these culturally and politically constructed images were related to the more general strategies by which Portuguese imagined their own national identity, both as ‘European’ and as ‘coloniser’ or ‘imperial people’. The basic assumption of this article is that policies enforced in a context of inter-ethnic and religious competition are better understood when linked to the identity strategies inherent to them. These are conceived as strategic constructions aimed at the preservation, the protection and the imaginary expansion of the subject, who looks for groups to be included in and out-groups to reject, exclude, aggress or eliminate. We think that most of the inter-ethnic relationships and conflicts, as well as the very experience of ethnicity, are born from this identity matrix.
Resumo:
In this paper, a linguistically rule-based grapheme-to-phone (G2P) transcription algorithm is described for European Portuguese. A complete set of phonological and phonetic transcription rules regarding the European Portuguese standard variety is presented. This algorithm was implemented and tested by using online newspaper articles. The obtained experimental results gave rise to 98.80% of accuracy rate. Future developments in order to increase this value are foreseen. Our purpose with this work is to develop a module/ tool that can improve synthetic speech naturalness in European Portuguese. Other applications of this system can be expected like language teaching/learning. These results, together with our perspectives of future improvements, have proved the dramatic importance of linguistic knowledge on the development of Text-to-Speech systems (TTS).
Resumo:
Research Masters
Resumo:
Référence bibliographique : Rol, 60754