Search Results

You are looking at 81 - 90 of 2,459 items for :

Clear All
Open access

Zoltán Ádám Mann and Tamás Szép

. 331-337. Davis, M., Logemann, G. and Loveland, D. (1962). A machine program for theorem proving, Communications of the ACM 5(7): 394-397. Davis, M. and Putnam, H. (1960). A computing procedure for quantification theory, Journal of the ACM 7(3): 201-215. Dechter, R. (1990). Enhancement schemes for constraint processing: Backjumping, learning and cutset decomposition, Artificial Intelligence 41(3): 273-312. Dechter, R. (2003). Constraint Processing, Morgan Kaufmann, San Francisco, CA

Open access

Samuel De Haas and Peter Winker

Abstract

Falsified interviews represent a serious threat to empirical research based on survey data. The identification of such cases is important to ensure data quality. Applying cluster analysis to a set of indicators helps to identify suspicious interviewers when a substantial share of all of their interviews are complete falsifications, as shown by previous research. This analysis is extended to the case when only a share of questions within all interviews provided by an interviewer is fabricated. The assessment is based on synthetic datasets with a priori set properties. These are constructed from a unique experimental dataset containing both real and fabricated data for each respondent. Such a bootstrap approach makes it possible to evaluate the robustness of the method when the share of fabricated answers per interview decreases. The results indicate a substantial loss of discriminatory power in the standard cluster analysis if the share of fabricated answers within an interview becomes small. Using a novel cluster method which allows imposing constraints on cluster sizes, performance can be improved, in particular when only few falsifiers are present. This new approach will help to increase the robustness of survey data by detecting potential falsifiers more reliably.

Open access

Krzysztof Janiszowski

Control Error Dynamic Modification as an Efficient Tool for Reduction of Effects Introduced by Actuator Constraints

A modification of digital controller algorithms, based on the introduction of a virtual reference value, which never exceeds active constraints in the actuator output is presented and investigated for some algorithms used in single-loop control systems. This idea, derived from virtual modification of a control error, can be used in digital control systems subjected to both magnitude and rate constraints. The modification is introduced in the form of on-line adaptation to the control task. Hence the design of optimal (in a specified sense) digital controller parameters can be separated from actuator constraints. The adaptation of the control algorithm (to actuator constraints) is performed by the transformation of the control error and is equivalent to the introduction of a new, virtual reference value for the control system. An application of this approach is presented through examples of three digital control algorithms: the PID algorithm, the dead-beat controller and the state space controller. In all cases, clear advantages of transients are observed, which yields some general conclusions to the problem of processing actuator constraints in control.

Open access

Ramatou Seydou, Tarek Raissi, Ali Zolghadri and Denis Efimov

References Akhenak, A., Chadli, M., Maquin, D. and Ragot, J. (2003). Sliding mode multiple observer for fault detection and isolation, 42nd IEEE Conference on Decision and Control, Maui, HI, USA , Vol. 1, pp. 953-958. Arangú, M. and Salido, M. (2011). A fine-grained arc-consistency algorithm for non-normalized constraint satisfaction problems, International Journal of Applied Mathematics and Computer Science 21 (4): 733-744, DOI: 10.2478/v10006-011-0058-2. Berdjag, D., Christophe, C., Cocquempot, V

Open access

Florin-Alexandru Macsim and Florin Oprea

.1016/j.jpolmod.2006.01.004 Canova, F., and Pappa, E., 2006. The elusive costs and immaterial gains of fiscal constraints. Journal of Public Economics, 90(8-9), 1391-1414. DOI: http://dx.doi.org/10.1016/j.jpubeco.2006.01.002 Chatagny, F., 2015. Incentive effects of fiscal rules on the finance minister's behavior: Evidence from revenue projections in Swiss Cantons. European Journal of Political Economy, 39, 184-200. DOI: http:/dx.doi.org/10.1016/j.ejpoleco.2015.04.012 Daniel, B. C., and Shiamptanis, C., 2013. Pushing the

Open access

Hamidreza Mirsafian

(4), 553-562. Ehsani, M. (2007). Level of sport participation for women in iran and leisure constraints. Humanities , 12(3), 15-27.Fathi, S. (2010). Tabeen jame shenakhti mosharekat varzeshi daneshjooyan /A sociological explanation of athletic participation of university students/. Social Sciences Bulletin, 3(4), 145-173. Garcia, D., Devis, J., Sparkes, A. (2009). Sport and physical activity in high security Spanish prison: ethnographic study of multiple meaning. Sport Education and Society, 14(1), 77-96. Gnanendran, A., Pyne, D.B., Fallon, K.E., Fricker, P

Open access

Karim Chabir, Mohamed Amine Sid and Dominique Sauter

Abstract

This paper considers the problem of attitude sensor fault diagnosis in a quadrotor helicopter. The proposed approach is composed of two stages. The first one is the modelling of the system attitude dynamics taking into account the induced communication constraints. Then a robust fault detection and evaluation scheme is proposed using a post-filter designed under a particular design objective. This approach is compared with previous results based on the standard Kalman filter and gives better results for sensor fault diagnosis.

Open access

C. Christober and Asir Rajan

An Evolutionary Programming Based Tabu Search Method for Unit Commitment Problem with Cooling-Banking Constraints

This paper presents a new approach to solve the short-term unit commitment problem using An Evolutionary Programming Based tabu search method with cooling and banking constraints. Numerical results are shown comparing the cost solutions and computation time obtained by using the evolutionary programming method and other conventional methods like dynamic programming, lagrangian relaxation.

Open access

Xulong Wang, Chizhang Chai, Peng Du, Qiyun Lei, Gongming Yin and Yanchou Lu

Abstract

Optically stimulated luminescence (OSL) dating was applied to sediment samples in order to provide age constraints on the palaeo-earthquake events that are recorded in a trench on the Lingwu fault near Yinchuan on the northeastern margin of the Tibetan Plateau, China. Combining seventeen OSL ages with field observations in the trench shows that at least four events took place at this specific site, and that this fault has been active over the past 200 ka.

Open access

Joanna Tokaj

Abstract

The PRO coindexation of converbs and participles in South Asian Languages along with Subject Identity Constraint (Subject Control) violation has been studied by Subbarao (2012) and Murthy (1994). I present the analysis of Medieval Rajasthani data focusing on two construction types - constructions consisting of converbs and participles. I compare my findings on Rajasthani with previous analyses of the Hindi language. I demonstrate that PRO coindexation in Medieval Rajasthani is more strict than in Hindi. Participles are coindexed with a subject or a direct object of the main clause while converbs are most often subject-oriented. Subject Identity Constraint (Subject Control) violation in Medieval Rajasthani (MR) occurs in constructions consisting of participles and converbs. Subject Identity Constraint may be violated in MR in sentences denoting cause and effect and time relation.