873 resultados para Beginning inference


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we consider Preference Inference based on a generalised form of Pareto order. Preference Inference aims at reasoning over an incomplete specification of user preferences. We focus on two problems. The Preference Deduction Problem (PDP) asks if another preference statement can be deduced (with certainty) from a set of given preference statements. The Preference Consistency Problem (PCP) asks if a set of given preference statements is consistent, i.e., the statements are not contradicting each other. Here, preference statements are direct comparisons between alternatives (strict and non-strict). It is assumed that a set of evaluation functions is known by which all alternatives can be rated. We consider Pareto models which induce order relations on the set of alternatives in a Pareto manner, i.e., one alternative is preferred to another only if it is preferred on every component of the model. We describe characterisations for deduction and consistency based on an analysis of the set of evaluation functions, and present algorithmic solutions and complexity results for PDP and PCP, based on Pareto models in general and for a special case. Furthermore, a comparison shows that the inference based on Pareto models is less cautious than some other types of well-known preference model.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

info:eu-repo/semantics/publishedVersion

Relevância:

20.00% 20.00%

Publicador:

Resumo:

info:eu-repo/semantics/publishedVersion

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Vulnerability and sustainability studies of an area help to assess both its level of exposure and capacity to support possible environmental impacts, and it is of primordial importance for proposals of the Legislation on Zoning, Allotment, Land Use/land cover, aiming to stimulate those areas indicated for urban growth, to discourage growth of overcrowded areas, to detect sections with restrictive use, as well as districts for permanent protection. This paper aims to analyze the vulnerability in the Maranhão Ilha, using GIS techniques, geospatial inference intersected with relevant social-environmental indicators.Estudos de vulnerabilidade e de sustentabilidade de uma área ajudam a avaliar o seu grau de exposição e sua capacidade de suporte a possíveis impactos ambientais, sendo fundamental para propostas de Lei de Zoneamento, Parcelamento, Uso e Ocupação do Solo, tendo por finalidade orientar as áreas onde deverá haver estímulo para o crescimento urbano; contenção da malha urbana; detecção de locais com possibilidade de uso restritivo, bem como locais de proteção permanente. Este trabalho propõe analisar o índice de vulnerabilidade a perda de solo da Ilha do Maranhão com base na metodologia proposta por (CREPANI, et al. 2001) e em técnicas de inferência espacial com apoio na AHP (Análise Hierárquica de Processo).

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We generalize the classical notion of Vapnik–Chernovenkis (VC) dimension to ordinal VC-dimension, in the context of logical learning paradigms. Logical learning paradigms encompass the numerical learning paradigms commonly studied in Inductive Inference. A logical learning paradigm is defined as a set W of structures over some vocabulary, and a set D of first-order formulas that represent data. The sets of models of ϕ in W, where ϕ varies over D, generate a natural topology W over W. We show that if D is closed under boolean operators, then the notion of ordinal VC-dimension offers a perfect characterization for the problem of predicting the truth of the members of D in a member of W, with an ordinal bound on the number of mistakes. This shows that the notion of VC-dimension has a natural interpretation in Inductive Inference, when cast into a logical setting. We also study the relationships between predictive complexity, selective complexity—a variation on predictive complexity—and mind change complexity. The assumptions that D is closed under boolean operators and that W is compact often play a crucial role to establish connections between these concepts. We then consider a computable setting with effective versions of the complexity measures, and show that the equivalence between ordinal VC-dimension and predictive complexity fails. More precisely, we prove that the effective ordinal VC-dimension of a paradigm can be defined when all other effective notions of complexity are undefined. On a better note, when W is compact, all effective notions of complexity are defined, though they are not related as in the noncomputable version of the framework.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Australian tourism tertiary education sector operates in a competitive and dynamic environment, which necessitates a market orientation to be successful. Academic staff and management in the sector must regularly assess the perceptions of prospective and current students, and monitor the satisfaction levels of current students. This study is concerned with the setting and monitoring of satisfaction levels of current students, reporting the results of three longitudinal investigations of student satisfaction in a postgraduate unit. The study also addresses a limitation of a university’s generic teaching evaluation instrument. Importance-performance analysis (IPA) has been recommended as a simple but effective tool for overcoming the deficiencies of many student evaluation studies, which have generally measured only attribute importance or importance at the end of a semester. IPA was used to compare student expectations of the unit at the beginning of semester with their perceptions of performance ten weeks later. The first stage documented key benchmarks for which amendments to the unit based on student feedback could be evaluated during subsequent teaching periods.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper presents a novel program annotation mechanism which enables students to obtain feedback from tutors on their programs in a far simpler and more efficient way than is possible with, for example, email. A common scenario with beginning students is to email tutors with copies of their malfunctioning programs. Unfortunately the emailed program often bears little resemblance to the program the student has been trying to make work; often it is incomplete, a different version and corrupted. We propose an annotation mechanism enabling students to simply and easily annotate their programs with comments asking for help. Similarly our mechanism enables tutors to view students’ programs and to reply to their comments in a simple and structured fashion. This means students can get frequent and timely feedback on their programs; tutors can provide such feedback efficiently, and hence students’ learning is greatly improved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The history of the settlement of the province is tied to patterns of exploration and min development. In Northern British Columbia the Cariboo goldfields provided the impetus for settlement of the region and the beginning for mining to extend into the watern and northern regions in a series of minor gold rushes. The northern half of the province has a geological diverse mineral base that supports a wide variety of mining, and a gradual improvement of exploration and mining methods due to scientific knowledge and technology provided opportunities for lode gold and base metal mines to be developed. The success of mining is based on world ore prices and competitive markets that impact the economic viability of developing a mine. Mining faces increasing pressures in the northern half of the province due to other resource values, such as tourism or protected areas, that claim and compete for a similar land base.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Research and innovation in the built environment is increasingly taking on an inter-disciplinary nature. The built environment industry and professional practice have long adopted multi and inter-disciplinary practices. The application of IT in Construction is moving beyond the automation and replication of discrete mono and multi-disciplinary tasks to replicate and model the improved inter-disciplinary processes of modern design and construction practice. A major long-term research project underway at the University of Salford seeks to develop IT modelling capability to support the design of buildings and facilities that are buildable, maintainable, operable, sustainable, accessible, and have properties of acoustic, thermal and business support performance that are of a high standard. Such an IT modelling tool has been the dream of the research community for a long time. Recent advances in technology are beginning to make such a modelling tool feasible.----- Some of the key problems with its further research and development, and with its ultimate implementation, will be the challenges of multiple research and built environment stakeholders sharing a common vision, language and sense of trust. This paper explores these challenges as a set of research issues that underpin the development of appropriate technology to support realisable advances in construction process improvements.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This creative writing work was selected for publication in a bi-lingual anthology, published in China, as suitable to be culturally applicable to both Chinese and Australian social contexts. The poem raises six social/ethical issues and comments on them. It is based on research into Chinese traditional poetry that focuses on an image, and after each image this poem provides an ethical comment. It is based in the ethical hypothesis that moral evaluation of individual and social behaviour can not be achieved without ethical judgement which questions social norms. In particular, the poem questions the validity of fundamentalism – the belief in religious, scientific and moral absolutes. This is a key issue in contemporary research into the effect of religion on politics. It also draws on contemporary psychological theory, especially the concept of narcissism. The sociological basis of the work is in drawing parallels between eastern and western ethical issues, stressing similarity by inference. The imagery on which the poem is based selects objects such a single ‘stone’ that take on symbolic connotations common to both Australian and Chinese readers. This is innovative, since very little creative writing has been dome to address commonalities between Australian and Chinese ethical thinking, especially by adopting Chinese motifs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The role of sustainability in urban design is becoming increasingly important as Australia’s cities continue to grow, putting pressure on existing infrastructure such as water, energy and transport. To optimise an urban design many different aspects such as water, energy, transport, costs need to be taken into account integrally. Integrated software applications assessing urban designs on a large variety of aspects are hardly available. With the upcoming next generation of the Internet often referred to as the Semantic Web, data can become more machine-interpretable by developing ontologies that can support the development of integrated software systems. Software systems can use these ontologies to perform an intelligent task such as assessing an urban design on a particular aspect. When ontologies of different applications are aligned, they can share information resulting in interoperability. Inference such as compliancy checks and classifications can support aligning the ontologies. A proof of concept implementation has been made to demonstrate and validate the usefulness of machine interpretable ontologies for urban designs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sequences of two chloroplast photosystem genes, psaA and psbB, together comprising about 3,500 bp, were obtained for all five major groups of extant seed plants and several outgroups among other vascular plants. Strongly supported, but significantly conflicting, phylogenetic signals were obtained in parsimony analyses from partitions of the data into first and second codon positions versus third positions. In the former, both genes agreed on a monophyletic gymnosperms, with Gnetales closely related to certain conifers. In the latter, Gnetales are inferred to be the sister group of all other seed plants, with gymnosperms paraphyletic. None of the data supported the modern ‘‘anthophyte hypothesis,’’ which places Gnetales as the sister group of flowering plants. A series of simulation studies were undertaken to examine the error rate for parsimony inference. Three kinds of errors were examined: random error, systematic bias (both properties of finite data sets), and statistical inconsistency owing to long-branch attraction (an asymptotic property). Parsimony reconstructions were extremely biased for third-position data for psbB. Regardless of the true underlying tree, a tree in which Gnetales are sister to all other seed plants was likely to be reconstructed for these data. None of the combinations of genes or partitions permits the anthophyte tree to be reconstructed with high probability. Simulations of progressively larger data sets indicate the existence of long-branch attraction (statistical inconsistency) for third-position psbB data if either the anthophyte tree or the gymnosperm tree is correct. This is also true for the anthophyte tree using either psaA third positions or psbB first and second positions. A factor contributing to bias and inconsistency is extremely short branches at the base of the seed plant radiation, coupled with extremely high rates in Gnetales and nonseed plant outgroups. M. J. Sanderson,* M. F. Wojciechowski,*† J.-M. Hu,* T. Sher Khan,* and S. G. Brady

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resulting from a series of student-run 'Edge' conferences that have been held in Australia and New Zealand (beginning at RMIT in 1983), The Mesh Book is a collection of essays grouped into themes of Invisible Infrastructures (systems of belief), Immanent Infrastructures (natural systems) and Present Infrastructures (roads and services). Ranging from esoteric discussions to analytical case studies, the book assembles a broad spectrum of ideas on the landscape within the context of Australia and a contemporary study of place.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Through adolescence, young people are at an exciting point of their maturation. On the whole they are thoughtful, caring and responsible people. In many ways they are just beginning to make valuable contributions to the society they will soon be steering. They are critical and reflective, and they are passionate and energetic. We have discovered in earlier chapters the types of physical and cognitive changes and developments that confront adolescents. In this chapter we will explore emotional and moral development and allied issues of resilience and vulnerability. The emotional dimension of adolescence can tie in with several other issues that extend from aloneness, loneliness and alienation. We will introduce key theory and theorists in the field of emotional and moral development (such as Kohlberg). Some adolescents have a traumatic time (as do people of all ages and phases of life) and this book wouldn’t be whole without a brief discussion of the types of issues that emerge as young people in the throes of developing their moral and emotional perspective of the world are dealt life challenges.