Approaches to zero

Xem 1-20 trên 43 kết quả Approaches to zero
  • This paper describes our preliminary attempt to automatically recognize zero adnominals, a subgroup of zero pronouns, in Japanese discourse. Based on the corpus study, we define and classify what we call “argument-taking nouns (ATNs),” i.e., nouns that can appear with zero adnominals. We propose an ATN recognition algorithm that consists of lexicon-based heuristics, drawn from the observations of our analysis. We finally present the result of the algorithm evaluation and discuss future directions. sion (Halliday and Hasan, 1976). ...

    pdf8p bunbo_1 17-04-2013 37 1   Download

  • This paper deals with the problem of asymptotic stability for a class of nonlinear discrete-time systems with time-varying delay. The time-varying delay is assumed to be belong to a given interval, in which the lower bound of delay is not restricted to zero. A linear matrix inequality (LMI) approach to asymptotic stability of the system is presented. Based on constructing improved Lyapunov functionals, delay-depenent criteria for the asymptotic stability of the system are established via linear matrix inequalities. A numerical example is given to show the effectiveness of the result..

    pdf5p vision1234 30-06-2018 11 1   Download

  • In this paper, a computational approach for resolving zero-pronouns in Spanish texts is proposed. Our approach has been evaluated with partial parsing of the text and the results obtained show that these pronouns can be resolved using similar techniques that those used for pronominal anaphora. Compared to other well-known baselines on pronominal anaphora resolution, the results obtained with our approach have been consistently better than the rest.

    pdf7p bunrieu_1 18-04-2013 24 2   Download

  • This paper presents a predicate-argument structure analysis that simultaneously conducts zero-anaphora resolution. By adding noun phrases as candidate arguments that are not only in the sentence of the target predicate but also outside of the sentence, our analyzer identifies arguments regardless of whether they appear in the sentence or not. Because we adopt discriminative models based on maximum entropy for argument identification, we can easily add new features. We add language model scores as well as contextual features.

    pdf4p hongphan_1 15-04-2013 37 1   Download

  • After illustrating the benefits of this approach with several examples, we describe the algorithm for compiling zero morphemes into unary rules, which allows us to use zero morphemes more efficiently in natural language processing. 1 Then, we discuss the question of equivalence of a grammar with these unary rules to the original grammar. Lastly, we compare our approach to zero morphemes with possible alternatives. 1.

    pdf6p bungio_1 03-05-2013 36 1   Download

  • EXTERNAL AUDITOR'S EVALUTIONS OF INTERNAL : AUDIT WORK - A CASCADED INFERENCE APPROACH The trends identified in Figures 1.1 and 1.2 are again clear. First, θ is well above zero when δ is small, indicating that the residential housing market mechanism rewards administrators of effective schools with the wealthiest students when parents primarily assess schools by their effectiveness. When δ is large, θ is close to zero for all J, as no district structure creates the desired rewards when parents are largely unconcerned with school effectiveness....

    pdf154p mualan_mualan 25-02-2013 53 11   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article Iterative Approaches to Find Zeros of Maximal Monotone Operators by Hybrid Approximate Proximal Point Methods

    pdf18p sting06 13-02-2012 41 6   Download

  • In this chapter you will learn: Know the content of and differences among strategies, marketing plans, and a marketing program; know how to use S.W.O.T. analysis and other planning approaches to zero in on a marketing strategy that fits the firm's objectives and resources and meets customers' needs; understand why the product classes and typical mixes are a good starting point for planning;...

    ppt8p allbymyself_06 26-01-2016 31 2   Download

  • In this work, we develop CASVM and CANN algorithms for semi-supervised classification problem. The algorithms are based on a combination of ensemble clustering and kernel methods. Probabilistic model of classification with use of cluster ensemble is proposed. Within the model, error probability of CANN is studied. Assumptions that make probability of error converge to zero are formulated. The proposed algorithms are experimentally tested on a hyperspectral image. It is shown that CASVM and CANN are more noise resistant than standard SVM and kNN.

    pdf16p danhnguyentuongvi27 19-12-2018 5 0   Download

  • Benchmaking the Efficiency of Government Warehouse Operations: A Data Enveronment Analysis Approach It similarly seems unlikely that parents have zero concern for peer group. In the presence of direct or indirect peer effects on student learning, parents would be irrational to ignore peer group in their evaluations of schools, and anecdotal evidence suggests that they do not do so.

    pdf147p mualan_mualan 25-02-2013 33 5   Download

  • Given the range of content available to internet users at effectively zero cost compared with those available to purchase through established social networks, a rational, economic decision would be primarily to use the internet to obtain counterfeit digital goods. However, our data shows this is not the case, suggesting that purely economic approaches to the purchase of counterfeit goods have limited value in explaining consumption patterns. Further, accessing illegal content via the internet offers an element of anonymity to users.

    pdf9p nhacchovina 22-03-2013 36 4   Download

  • There are two principal approaches to the modelling of credit-sensitive bond prices. Merton (1977)’s structural approach, recently re-examined by Longstaff and Schwartz (1995), prices corporate bonds as options, given the underlying stochastic process assumed for the value of the firm. On the other hand, the reduced form approach, used in recent work by Duffie and Singleton (1999) and Jarrow, Lando and Turnbull (1997), among others, assumes a stochastic process for the default event and an exogenous recovery rate.

    pdf15p taisaocothedung 12-01-2013 34 2   Download

  • The two approaches to valuing common stocks using fundamental security analysis are: Discounted Cash flow techniques. Attempts to estimate the value of a stock today using a present value analysis. Relative valuation techniques. A stock is valued relative to other stocks based on the basis of ratios.

    ppt101p team4mvc02 12-06-2013 37 2   Download

  • In the paper a technique for determining the coefficients of the linearized equivalent equation based on the Fokker-Piank equation approach is presented. The investigation is then applied to Duffing and Vanderpol oscillations under a zero mean Gaussian white noise.

    pdf6p chikychiky 01-11-2018 7 0   Download

  • Foliar blight is a major biotic constraint to wheat in the Gangetic plains of south Asia, particularly in the rice-wheat system. The disease occurs as a complex of spot blotch and tan spot caused by C. sativus and P. tritici-repentis, respectively. Yield losses reach on average 15% but are variable depending on sowing time, years, locations and stress conditions.

    pdf7p masterbarista 14-01-2019 3 0   Download

  • Landscapes of a New Cultural Economy of Space is the fifth volume of the series. Focusing on the transformations and changes in human life that influence landscape development, the book presents ‘landscape’ as the interface of human-environment interrelationships where the different processes of change are perceived and expressed. Theano Terkenli and Anne-Marie d’Hauteserre use this approach as a way to introduce a collection of contemporary discussions in landscape research and geography which look specifically at the cultural transformation and representation of landscapes.

    pdf257p namde02 08-03-2013 64 13   Download

  • Most books that use MATLAB are aimed at readers who know how to program. This book is for people who have never programmed before. As a result, the order of presentation is unusual. The book starts with scalar values and works up to vectors and matrices very gradually. This approach is good for beginning programmers, because it is hard to understand composite objects until you understand basic programming semantics.

    pdf155p duonghau01 15-05-2012 57 8   Download

  • As with every hypothesis test, inference based on alpha estimates can lead to the detection of a lucky fund, namely a fund with a significant estimated alpha, while its true alpha is equal to zero. The difficulty raised by the standard approach is that it implies a multiple hypothesis test since the null hypothesis of no performance is not tested once, but M times. Accounting for the presence of luck in a multiple testing framework is much more complex, because luck cannot be measured by the significance level applied to each fund.

    pdf83p dangsuynghi 15-03-2013 55 5   Download

  • As with every hypothesis test, inference based on alpha estimates can lead to the detection of a lucky fund, namely a fund with a significant estimated alpha, while its true alpha is equal to zero. When a single performance test is run on the estimated alpha of one fund (or one portfolio of funds1), luck is easily controlled by setting the significance level γ (or alternatively the Size of the test). For instance, if γ is set to 0.05, the probability of finding one lucky fund under the hypothesis that its alpha is zero amounts to 0.05, by construction.

    pdf87p dangsuynghi 15-03-2013 40 5   Download

  • The computation takes a set of input key/value pairs, and produces a set of output key/value pairs. The user of theMapReduce library expresses the computation as two functions: Map and Reduce. Map, written by the user, takes an input pair and pro- duces a set of intermediate key/value pairs. The MapRe- duce library groups together all intermediate values asso- ciated with the same intermediate key I and passes them to the Reduce function. The Reduce function, also written by the user, accepts an intermediate key I and a set of values for that key.

    pdf21p giamdocamnhac 06-04-2013 32 5   Download



p_strKeyword=Approaches to zero

nocache searchPhinxDoc


Đồng bộ tài khoản