932 resultados para Sigmoid Formatting Rules
Resumo:
In previous papers, we have presented a logic-based framework based on fusion rules for merging structured news reports. Structured news reports are XML documents, where the textentries are restricted to individual words or simple phrases, such as names and domain-specific terminology, and numbers and units. We assume structured news reports do not require natural language processing. Fusion rules are a form of scripting language that define how structured news reports should be merged. The antecedent of a fusion rule is a call to investigate the information in the structured news reports and the background knowledge, and the consequent of a fusion rule is a formula specifying an action to be undertaken to form a merged report. It is expected that a set of fusion rules is defined for any given application. In this paper we extend the approach to handling probability values, degrees of beliefs, or necessity measures associated with textentries in the news reports. We present the formal definition for each of these types of uncertainty and explain how they can be handled using fusion rules. We also discuss the methods of detecting inconsistencies among sources.
Resumo:
The Zipf curves of log of frequency against log of rank for a large English corpus of 500 million word tokens, 689,000 word types and for a large Spanish corpus of 16 million word tokens, 139,000 word types are shown to have the usual slope close to –1 for rank less than 5,000, but then for a higher rank they turn to give a slope close to –2. This is apparently mainly due to foreign words and place names. Other Zipf curves for highlyinflected Indo-European languages, Irish and ancient Latin, are also given. Because of the larger number of word types per lemma, they remain flatter than the English curve maintaining a slope of –1 until turning points of about ranks 30,000 for Irish and 10,000 for Latin. A formula which calculates the number of tokens given the number of types is derived in terms of the rank at the turning point, 5,000 for both English and Spanish, 30,000 for Irish and 10,000 for Latin.
Resumo:
The possibility of arbitrarily "adding" and "subtracting" single photons to and from a light field may give access to a complete engineering of quantum states and to fundamental quantum phenomena. We experimentally implemented simple alternated sequences of photon creation and annihilation on a thermal field and used quantum tomography to verify the peculiar character of the resulting light states. In particular, as the final states depend on the order in which the two actions are performed, we directly observed the noncommutativity of the creation and annihilation operators, one of the cardinal concepts of quantum mechanics, at the basis of the quantum behavior of light. These results represent a step toward the full quantum control of a field and may provide new resources for quantum information protocols
Resumo:
Aggressive interactions between animals are often settled by the use of repeated signals that reduce the risk of injury from combat but are expected to be costly. The accumulation of lactic acid and the depletion of energy stores may constrain activity rates during and after fights and thus represent significant costs of signalling. We tested this by analysing the concentrations of lactate and glucose in the haemolymph of hermit crabs following agonistic interactions over the ownership of the gastropod shells that they inhabit. Attackers and defenders play distinct roles of sender and receiver that are fixed for the course of the encounter. Attackers perform bouts of 'shell rapping', which vary in vigour between attackers and during the course of the encounter, and are a key predictor of victory. In contrast to the agonistic behaviour of other species, we can quantify the vigour of fighting. We demonstrate, to our knowledge for the first time, an association between the vigour of aggressive activity and a proximate cost of signalling. We show that the lactate concentration in attackers increases with the amount of shell rapping, and that this appears to constrain the vigour of subsequent rapping. Furthermore, attackers, but not defenders, give up when the concentration of lactate is high. Glucose levels in attackers also increase with the amount of rapping they perform, but do not appear to influence their decision to give up. Defenders are more likely to lose when they have particularly low levels of glucose. We conclude that the two roles use different decision rules during these encounters.
Resumo:
We propose some extra rules to add to the well-known Sudoku puzzle and present an argument to justify their inclusion. The rules mean that puzzles can be created with fewer cells completed initially yet which still have only one solution. We have created a Web-based program which can be used to generate and solve both standard and extended (Complete) puzzles.
Resumo:
Agonistic interactions between animals are often settled by the use of repeated signals which advertise the resource-holding potential of the sender. According to the sequential assessment game this repetition increases the accuracy with which receivers may assess the signal, but under the cumulative assessment model the repeated performances accumulate to give a signal of stamina. These models may be distinguished by the temporal pattern of signalling they predict and by the decision rules used by the contestants. Hermit crabs engage in shell fights over possession of the gastropod shells that they inhabit. During these interactions the two roles of signaller and receiver may be examined separately because they are fixed for the duration of the encounter. Attackers rap their shell against that of the defender in a series of bouts whereas defenders remain tightly withdrawn into their shells for the duration of the contest. At the end of a fight the attacker may evict the defender from its shell or decide to give up without first effecting an eviction; the decision for defenders is either to maintain a grip on its shell or to release the shell and allow itself to be evicted. We manipulated fatigue levels separately for attackers and defenders, by varying the oxygen concentration of the water that they are held in prior to fighting, and examined the effects that this has on the likelihood of each decision and on the temporal pattern of rapping. We show that the vigour of rapping and the likelihood of eviction are reduced when the attacker is subjected to low oxygen but that this treatment has no effect on rates of eviction when applied to defenders. We conclude that defenders compare the vigour of rapping with an absolute threshold rather than with a relative threshold when making their decision. The data are compatible with the cumulative assessment model and with the idea that shell rapping signals the stamina of attackers, but do not fit the predictions of the sequential assessment game.
Resumo:
This paper evaluates the desirability of PPP rules vis-á-vis fixed exchange rates both in terms of welfare and stability properties. The analysis is conducted within a small open-economy New Keynesian framework extended to include a cost channel. In terms of stability, we find that while the equilibrium is always unique under fixed exchange rates its uniqueness critically depends upon the presence/absence of the cost channel under a PPP rule. Overall, then, in terms of welfare a fixed exchange rate always outperforms a PPP rule.
Resumo:
In this preliminary case study, we investigate how inconsistency in a network intrusion detection rule set can be measured. To achieve this, we first examine the structure of these rules which incorporate regular expression (Regex) pattern matching. We then identify primitive elements in these rules in order to translate the rules into their (equivalent) logical forms and to establish connections between them. Additional rules from background knowledge are also introduced to make the correlations among rules more explicit. Finally, we measure the degree of inconsistency in formulae of such a rule set (using the Scoring function, Shapley inconsistency values and Blame measure for prioritized knowledge) and compare the informativeness of these measures. We conclude that such measures are useful for the network intrusion domain assuming that incorporating domain knowledge for correlation of rules is feasible.