Academic literature on the topic 'Hidden transformations'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hidden transformations.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Hidden transformations"

1

Dupuy, Alexander D., I.-Ting Chiu, Padraic Shafer, Elke Arenholz, Yayoi Takamura, and Julie M. Schoenung. "Hidden transformations in entropy-stabilized oxides." Journal of the European Ceramic Society 41, no. 13 (October 2021): 6660–69. http://dx.doi.org/10.1016/j.jeurceramsoc.2021.06.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Memisevic, Roland, and Geoffrey E. Hinton. "Learning to Represent Spatial Transformations with Factored Higher-Order Boltzmann Machines." Neural Computation 22, no. 6 (June 2010): 1473–92. http://dx.doi.org/10.1162/neco.2010.01-09-953.

Full text
Abstract:
To allow the hidden units of a restricted Boltzmann machine to model the transformation between two successive images, Memisevic and Hinton ( 2007 ) introduced three-way multiplicative interactions that use the intensity of a pixel in the first image as a multiplicative gain on a learned, symmetric weight between a pixel in the second image and a hidden unit. This creates cubically many parameters, which form a three-dimensional interaction tensor. We describe a low-rank approximation to this interaction tensor that uses a sum of factors, each of which is a three-way outer product. This approximation allows efficient learning of transformations between larger image patches. Since each factor can be viewed as an image filter, the model as a whole learns optimal filter pairs for efficiently representing transformations. We demonstrate the learning of optimal filter pairs from various synthetic and real image sequences. We also show how learning about image transformations allows the model to perform a simple visual analogy task, and we show how a completely unsupervised network trained on transformations perceives multiple motions of transparent dot patterns in the same way as humans.
APA, Harvard, Vancouver, ISO, and other styles
3

Oh, Sang-Hoon. "Effect of Nonlinear Transformations on Entropy of Hidden Nodes." International Journal of Contents 10, no. 1 (March 28, 2014): 18–22. http://dx.doi.org/10.5392/ijoc.2014.10.1.018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

RODRIGUES, W. A., R. DA ROCHA, and J. VAZ. "HIDDEN CONSEQUENCE OF ACTIVE LOCAL LORENTZ INVARIANCE." International Journal of Geometric Methods in Modern Physics 02, no. 02 (April 2005): 305–57. http://dx.doi.org/10.1142/s0219887805000600.

Full text
Abstract:
In this paper we investigate a hidden consequence of the hypothesis that Lagrangians and field equations must be invariant under active local Lorentz transformations. We show that this hypothesis implies in an equivalence between spacetime structures with several curvature and torsion possibilities.
APA, Harvard, Vancouver, ISO, and other styles
5

Grossman, Robert W. "Discovering Hidden Transformations: Making Science and Other Courses More Learnable." College Teaching 53, no. 1 (January 2005): 33–40. http://dx.doi.org/10.3200/ctch.53.1.33-40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gemello, Roberto, Franco Mana, Stefano Scanzio, Pietro Laface, and Renato De Mori. "Linear hidden transformations for adaptation of hybrid ANN/HMM models." Speech Communication 49, no. 10-11 (October 2007): 827–35. http://dx.doi.org/10.1016/j.specom.2006.11.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

COQUEREAUX, R., R. HÄUßLING, N. A. PAPADOPOULOS, and F. SCHECK. "GENERALIZED GAUGE TRANSFORMATIONS AND HIDDEN SYMMETRY IN THE STANDARD MODEL." International Journal of Modern Physics A 07, no. 12 (May 10, 1992): 2809–24. http://dx.doi.org/10.1142/s0217751x92001265.

Full text
Abstract:
A recently proposed, new construction of the Standard Model based on the graded Lie algebra SU (2|1) is analyzed in some depth. The essential ingredient is an algebraic superconnection which incorporates both the gauge fields and the Higgs fields and whose curvature automatically leads to a spontaneously broken realization of the theory. The mechanism of hiding the original algebraic structure is unorthodox and is due to the specific, "noncommutative" realization of SU (2|1). The model is characterized by a constant background supercurvature which is invariant under arbitrary, constant SU (2|1) gauge transformations. This background field whose effect is analogous to the action of a constant magnetic field on a spherical atom, is traced back to the differential in the space of (super)matrices by means of which the supercurvature is constructed. The same background field is responsible for the fact that the ground state has no more than the U (1) e.m. symmetry of electromagnetism, the SU (2)L × U (1) symmetry of the Standard Model being recovered only after "backshifting" the Higgs fields. Thus, the Higgs mechanism receives a new and geometrical interpretation.
APA, Harvard, Vancouver, ISO, and other styles
8

Meng, Fandong, and Jinchao Zhang. "DTMT: A Novel Deep Transition Architecture for Neural Machine Translation." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 224–31. http://dx.doi.org/10.1609/aaai.v33i01.3301224.

Full text
Abstract:
Past years have witnessed rapid developments in Neural Machine Translation (NMT). Most recently, with advanced modeling and training techniques, the RNN-based NMT (RNMT) has shown its potential strength, even compared with the well-known Transformer (self-attentional) model. Although the RNMT model can possess very deep architectures through stacking layers, the transition depth between consecutive hidden states along the sequential axis is still shallow. In this paper, we further enhance the RNN-based NMT through increasing the transition depth between consecutive hidden states and build a novel Deep Transition RNN-based Architecture for Neural Machine Translation, named DTMT. This model enhances the hidden-to-hidden transition with multiple non-linear transformations, as well as maintains a linear transformation path throughout this deep transition by the well-designed linear transformation mechanism to alleviate the gradient vanishing problem. Experiments show that with the specially designed deep transition modules, our DTMT can achieve remarkable improvements on translation quality. Experimental results on Chinese⇒English translation task show that DTMT can outperform the Transformer model by +2.09 BLEU points and achieve the best results ever reported in the same dataset. On WMT14 English⇒German and English⇒French translation tasks, DTMT shows superior quality to the state-of-the-art NMT systems, including the Transformer and the RNMT+.
APA, Harvard, Vancouver, ISO, and other styles
9

Smith, Michael A., and J. Douglas Crawford. "Distributed Population Mechanism for the 3-D Oculomotor Reference Frame Transformation." Journal of Neurophysiology 93, no. 3 (March 2005): 1742–61. http://dx.doi.org/10.1152/jn.00306.2004.

Full text
Abstract:
Human saccades require a nonlinear, eye orientation–dependent reference frame transformation to transform visual codes to the motor commands for eye muscles. Primate neurophysiology suggests that this transformation is performed between the superior colliculus and brain stem burst neurons, but provides little clues as to how this is done. To understand how the brain might accomplish this, we trained a 3-layer neural net to generate accurate commands for kinematically correct 3-D saccades. The inputs to the network were a 2-D, eye-centered, topographic map of Gaussian visual receptive fields and an efference copy of eye position in 6-dimensional, push–pull “neural integrator” coordinates. The output was an eye orientation displacement command in similar coordinates appropriate to drive brain stem burst neurons. The network learned to generate accurate, kinematically correct saccades, including the eye orientation–dependent tilts in saccade motor error commands required to match saccade trajectories to their visual input. Our analysis showed that the hidden units developed complex, eye-centered visual receptive fields, widely distributed fixed-vector motor commands, and “gain field”–like eye position sensitivities. The latter evoked subtle adjustments in the relative motor contributions of each hidden unit, thereby rotating the population motor vector into the correct correspondence with the visual target input for each eye orientation: a distributed population mechanism for the visuomotor reference frame transformation. These findings were robust; there was little variation across networks with between 9 and 49 hidden units. Because essentially the same observations have been reported in the visuomotor transformations of the real oculomotor system, as well as other visuomotor systems (although interpreted elsewhere in terms of other models) we suggest that the mechanism for visuomotor reference frame transformations identified here is the same solution used in the real brain.
APA, Harvard, Vancouver, ISO, and other styles
10

Lockery, Shawn R., Yan Fang, and Terrence J. Sejnowski. "A Dynamic Neural Network Model of Sensorimotor Transformations in the Leech." Neural Computation 2, no. 3 (September 1990): 274–82. http://dx.doi.org/10.1162/neco.1990.2.3.274.

Full text
Abstract:
Interneurons in leech ganglia receive multiple sensory inputs and make synaptic contacts with many motor neurons. These “hidden” units coordinate several different behaviors. We used physiological and anatomical constraints to construct a model of the local bending reflex. Dynamic networks were trained on experimentally derived input-output patterns using recurrent backpropagation. Units in the model were modified to include electrical synapses and multiple synaptic time constants. The properties of the hidden units that emerged in the simulations matched those in the leech. The model and data support distributed rather than localist representations in the local bending reflex. These results also explain counterintuitive aspects of the local bending circuitry.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Hidden transformations"

1

Leggetter, Christopher John. "Improved acoustic modelling for HMMs using linear transformations." Thesis, University of Cambridge, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.361709.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nivens, Ryan Andrew. "Using Graphing to Reveal the Hidden Transformations in Palindrome (and Other Types of) License Plates." Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etsu-works/291.

Full text
Abstract:
License plates are a useful context to work with numbers, and in this article you will see a range of activities in which to engage your students. Some innovative graphing concepts are presented with license plates that allow students to investigate transformations including translations, reflections, and rotations.
APA, Harvard, Vancouver, ISO, and other styles
3

Kabbara, Yeihya. "Caractérisation des images à Rayon-X de la main par des modèles mathématiques : application à la biométrie." Thesis, Paris Est, 2015. http://www.theses.fr/2015PEST1015/document.

Full text
Abstract:
Dans son contexte spécifique, le terme « biométrie » est souvent associé à l'étude des caractéristiques physiques et comportementales des individus afin de parvenir à leur identification ou à leur vérification. Ainsi, le travail développé dans cette thèse nous a conduit à proposer un algorithme d'identification robuste, en considérant les caractéristiques intrinsèques des phalanges de la main. Considérée comme une biométrie cachée, cette nouvelle approche peut s'avérer intéressante, notamment lorsqu'il est question d'assurer un niveau de sécurité élevé, robuste aux différentes attaques qu'un système biométrique doit contrer. La base des techniques proposées requière trois phases, à savoir: (1) la segmentation des phalanges, (2) l'extraction de leurs caractéristiques par la génération d'une empreinte, appelée « Phalange-Code » et (3) l'identification basée sur la méthode du 1-plus proche voisin ou la vérification basée sur une métrique de similarité. Ces algorithmes opèrent sur des niveaux hiérarchiques permettant l'extraction de certains paramètres, invariants à des transformations géométriques telles que l'orientation et la translation. De plus, nous avons considéré des techniques robustes au bruit, pouvant opérer à différentes résolutions d'images. Plus précisément, nous avons élaboré trois approches de reconnaissance biométrique : la première approche utilise l'information spectrale des contours des phalanges de la main comme signature individuelle, alors que la deuxième approche nécessite l'utilisation des caractéristiques géométriques et morphologiques des phalanges (i.e. surface, périmètre, longueur, largeur, capacité). Enfin, la troisième approche requière la génération d'un nouveau rapport de vraisemblance entre les phalanges, utilisant la théorie de probabilités géométriques. En second lieu, la construction d'une base de données avec la plus faible dose de rayonnement a été l'un des grands défis de notre étude. Nous avons donc procédé par la collecte de 403 images radiographiques de la main, acquises en utilisant la machine Apollo EZ X-Ray. Ces images sont issues de 115 adultes volontaires (hommes et femmes), non pathologiques. L'âge moyen étant de 27.2 ans et l'écart-type est de 8.5. La base de données ainsi construite intègre des images de la main droite et gauche, acquises à des positions différentes et en considérant des résolutions différentes et des doses de rayonnement différentes (i.e. réduction jusqu'à 98 % de la dose standard recommandée par les radiologues « 1 µSv »).Nos expériences montrent que les individus peuvent être distingués par les caractéristiques de leurs phalanges, que ce soit celles de la main droite ou celles de la main gauche. Cette distinction est également valable pour le genre des individus (homme/femme). L'étude menée a montré que l'approche utilisant l'information spectrale des contours des phalanges permet une identification par seulement trois phalanges, à un taux EER (Equal Error Rate) inférieur à 0.24 %. Par ailleurs, il a été constaté « de manière surprenante » que la technique fondée sur les rapports de vraisemblance entre les phalanges permet d'atteindre un taux d'identification de 100 % et un taux d'EER de 0.37 %, avec une seule phalange. Hormis l'aspect identification/authentification, notre étude s'est penchée sur l'optimisation de la dose de rayonnement permettant une identification saine des individus. Ainsi, il a été démontré qu'il était possible d'acquérir plus de 12500/an d'images radiographiques de la main, sans pour autant dépasser le seuil administratif de 0.25 mSv
In its specific context, the term "biometrics" is often associated with the study of the physical and behavioral of individual's characteristics to achieve their identification or verification. Thus, the work developed in this thesis has led us to suggest a robust identification algorithm, taking into account the intrinsic characteristics of the hand phalanges. Considered as hidden biometrics, this new approach can be of high interest, particularly when it comes to ensure a high level of security, robust to various attacks that a biometric system must address. The basis of the proposed techniques requires three phases, namely: (1) the segmentation of the phalanges (2) extracting their characteristics by generating an imprint, called "Phalange-Code" and (3) the identification based on the method of 1-nearest neighbor or the verification based on a similarity metric. This algorithm operates on hierarchical levels allowing the extraction of certain parameters invariant to geometric transformations such as image orientation and translation. Furthermore, the considered algorithm is particularly robust to noise, and can function at different resolutions of images. Thus, we developed three approaches to biometric recognition: the first approach produces individual signature from the spectral information of the contours issued from the hand phalanges, whereas the second approach requires the use of geometric and morphological characteristics of the phalanges (i.e. surface, perimeter, length, width, and capacity). Finally, the third approach requires the generation of a new likelihood ratio between the phalanges, using the geometric probability theory. Furthermore, the construction of a database with the lowest radiation dose was one of the great challenges of our study. We therefore proceeded with the collection of 403 x-ray images of the hand, acquired using the Apollo EZ X-Ray machine. These images are from 115 non-pathological volunteering adult (men and women). The average age is 27.2 years and the standard deviation is 8.5. Thus, the constructed database incorporates images of the right and left hands, acquired at different positions and by considering different resolutions and different radiation doses (i.e. reduced till 98% of the standard dose recommended by radiologists "1 µSv").Our experiments show that individuals can be distinguished by the characteristics of their phalanges, whether those of the right hand or the left hand. This distinction also applies to the kind of individuals (male/female). The study has demonstrated that the approach using the spectral information of the phalanges' contours allows identification by only three phalanges, with an EER (Equal Error Rate) lower than 0.24 %. Furthermore, it was found “Surprisingly” that the technique based on the likelihood ratio between phalanges reaches an identification rate of 100% and an EER of 0.37% with a single phalanx. Apart from the identification/authentication aspect, our study focused on the optimization of the radiation dose in order to offer safe identification of individuals. Thus, it has been shown that it was possible to acquire more than 12,500/year radiographic hand images, without exceeding the administrative control of 0.25 mSv
APA, Harvard, Vancouver, ISO, and other styles
4

Isidoros, Konstantina. "Social transformation among Sahrāwī desert nomads : the hidden logic of Ḥassānīya socio-geographical networks." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:8ace3f92-82d0-4e0a-9dfe-ba96e3dcbc03.

Full text
Abstract:
Scholarship on the Western Sahara conflict has long puzzled over an ‘extraordinary leap’ of Sahrāwī tribes to the status of refugees and citizens of an exiled nation-state. It has glossed over this process as a modernising and civilising act of detribalisation, applauded women’s recent political appearance within a sovereignty-solidarity discourse, yet simultaneously used an insecurity discourse to measure Sahrāwī ‘performance’ hypercritically from inside the nascent state’s corridors. This ethnographic study observes Sahrāwī political action differently, by looking out from inside the tent and through the eyes of women. The thesis re-examines Sahrāwī tribe to state transition using a new framework of women’s tents and circulating, veiled males. Drawing on two years of anthropological fieldwork, the significance of the tent emerges as the decision-making centre for both men and women whereby the domestic is the political. I argue that women must be analytically recognised as political architects, utilising and presiding over tents as a female political economy of affection that casts a centralised political constellation across the Sahara. Not only do these fresh insights of Sahrāwī strategic tribe-state symbiosis and tactical nomadic sedentarisation overturn received anthropological wisdom on the stele of ‘tribe’, but it is women and their tents that can offer explanations for the ‘leap’ from genealogical reckoning to nationalist consciousness. This study presents comparative ethnography to engage critically with anthropology’s ‘great debates’ and popularised tropes regarding veiling, patriarchy, gendered space and power, and ‘tribal’ society. A different analytical light is cast on the gendered use of the exoticised Middle Eastern ḥarīm and of new hybrid forms of human socio-political reorganisation that challenge Western default notions of nation and state to suggest the need to rethink ‘tribe’.
APA, Harvard, Vancouver, ISO, and other styles
5

Korzh, Alla. "Educational inequalities and Ukrainian orphans' future pathways| Social reproduction or transformation through the hidden curriculum?" Thesis, Teachers College, Columbia University, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3590370.

Full text
Abstract:

This qualitative multi-site case study, situated in the context of Ukraine's post-Soviet political economy, examined how orphanage educators' expectations and beliefs about orphans' academic abilities and potential, curriculum, peer relationships, and education policy shaped orphans' post-secondary education decisions and trajectories. Examination of the educational experiences of orphans and children deprived of parental care shed light on socio-economic inequalities confronting these marginalized youth in and beyond state care. This dissertation is informed by critical theories of social and cultural reproduction that examine the relationship between schooling and socio-economic inequalities. I draw mainly on the concepts of the hidden curriculum and forms of capital (cultural, social, and economic).

Research conducted in Ukraine, primarily through quantitative surveys, tends to pathologize orphans and neglects to investigate how their secondary education experiences impact their trajectories post-institutionalization. This study, framed in qualitative methodology, was informed by observations of daily in- and out-of-classroom activities in two orphanages; in-depth, semi-structured interviews and focus groups with Grade 10 and 11 orphanage students, orphanage educators and administrators, and orphanage alumni; and document analysis. I focused on 81 orphanage youth and 41 educators as key participants embedded in the orphanage system.

My findings demonstrated that, despite some institutional changes, the ideologies, regimes, and cultures of Ukrainian orphanages still reflect the Soviet legacy of sequestered institutions providing substandard quality education. My examination of orphanage education revealed that many teachers, informed by genetic deficit ideology, communicated low expectations for student success and implemented an unchallenging curriculum characterized by watered-down teaching and learning materials, oversimplified assignments, canceled classes, and inflated grades. This study uncovered nuanced use of a hidden curriculum that ensured social reproduction and what I term a "transformative hidden curriculum" that fostered student success through art therapy, soft pedagogy, and hard caring.

Furthermore, this study shed light on factors that influenced orphans' complex post-secondary education decision-making processes, including peer pressure to attend vocational school; teacher-directed versus teacher-encouraged decisions; and informed, independent decisions largely thwarted by structural constraints. Lack of cultural and social capital significantly limited orphans' options and disenfranchised them in the labor market, thus perpetuating social reproduction in Ukrainian society.

APA, Harvard, Vancouver, ISO, and other styles
6

Kasinathan, Gokulnath. "Data Transformation Trajectories in Embedded Systems." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-205276.

Full text
Abstract:
Mobile phone tracking is the ascertaining of the position or location of a mobile phone when moving from one place to another place. Location Based Services Solutions include Mobile positioning system that can be used for a wide array of consumer-demand services like search, mapping, navigation, road transport traffic management and emergency-call positioning. The Mobile Positioning System (MPS) supports complementary positioning methods for 2G, 3G and 4G/LTE (Long Term Evolution) networks. Mobile phone is popularly known as an UE (User Equipment) in LTE. A prototype method of live trajectory estimation for massive UE in LTE network has been proposed in this thesis work. RSRP (Reference Signal Received Power) values and TA(Timing Advance) values are part of LTE events for UE. These specific LTE events can be streamed to a system from eNodeB of LTE in real time by activating measurements on UEs in the network. AoA (Angle of Arrival) and TA values are used to estimate the UE position. AoA calculation is performed using RSRP values. The calculated UE positions are filtered using Particle Filter(PF) to estimate trajectory. To obtain live trajectory estimation for massive UEs, the LTE event streamer is modelled to produce several task units with events data for massive UEs. The task level modelled data structures are scheduled across Arm Cortex A15 based MPcore, with multiple threads. Finally, with massive UE live trajectory estimation, IMSI (International mobile subscriber identity) is used to maintain hidden markov requirements of particle filter functionality while maintaining load balance for 4 Arm A15 cores. This is proved by serial and parallel performance engineering. Future work is proposed for Decentralized task level scheduling with hash function for IMSI with extension of cores and Concentric circles method for AoA accuracy.
Mobiltelefoners positionering är välfungerande för positionslokalisering av mobiltelefoner när de rör sig från en plats till en annan. Lokaliseringstjänsterna inkluderar mobil positionering system som kan användas till en mängd olika kundbehovs tjänster som sökning av position, position i kartor, navigering, vägtransporters trafik managering och nödsituationssamtal med positionering. Mobil positions system (MPS) stödjer komplementär positions metoder för 2G, 3G och 4G/LTE (Long Term Evolution) nätverk. Mobiltelefoner är populärt känd som UE (User Equipment) inom LTE. En prototypmetod med verkliga rörelsers estimering för massiv UE i LTE nätverk har blivit föreslagen för detta examens arbete. RSRP (Reference Signal Received Power) värden och TA (Timing Advance) värden är del av LTE händelser för UE. Dessa specifika LTE event kan strömmas till ett system från eNodeB del av LTE, i realtid genom aktivering av mätningar på UEar i nätverk. AoA (Angel of Arrival) och TA värden är använt för att beräkna UEs position. AoA beräkningar är genomförda genom användandet av RSRP värden. Den kalkylerade UE positionen är filtrerad genom användande av Particle Filter (PF) för att estimera rörelsen. För att identifiera verkliga rörelser, beräkningar för massiva UEs, LTE event streamer är modulerad att producera flera uppgifts enheter med event data från massiva UEar. De tasks modulerade data strukturerna är planerade över Arm Cortex A15 baserade MPcore, med multipla trådar. Slutligen, med massiva UE verkliga rörelser, beräkningar med IMSI(International mobile subscriber identity) är använt av den Hidden Markov kraven i Particle Filter’s funktionalitet medans kravet att underhålla last balansen för 4 Arm A15 kärnor. Detta är utfört genom seriell och parallell prestanda teknik. Framtida arbeten för decentraliserade task nivå skedulering med hash funktion för IMSI med utökning av kärnor och Concentric circles metod för AoA noggrannhet.
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Jinyu. "Soft margin estimation for automatic speech recognition." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26613.

Full text
Abstract:
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009.
Committee Chair: Dr. Chin-Hui Lee; Committee Member: Dr. Anthony Joseph Yezzi; Committee Member: Dr. Biing-Hwang (Fred) Juang; Committee Member: Dr. Mark Clements; Committee Member: Dr. Ming Yuan. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
8

Megyesi, Beata. "Data-driven syntactic analysis." Doctoral thesis, KTH, Speech Transmission and Music Acoustics, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-3433.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yeates, Stuart Andrew. "Text Augmentation: Inserting markup into natural language text with PPM Models." The University of Waikato, 2006. http://hdl.handle.net/10289/2600.

Full text
Abstract:
This thesis describes a new optimisation and new heuristics for automatically marking up XML documents, and CEM, a Java implementation, using PPM models. CEM is significantly more general than previous systems, marking up large numbers of hierarchical tags, using n-gram models for large n and a variety of escape methods. Four corpora are discussed, including the bibliography corpus of 14682 bibliographies laid out in seven standard styles using the BibTeX system and marked up in XML with every field from the original BibTeX. Other corpora include the ROCLING Chinese text segmentation corpus, the Computists' Communique corpus and the Reuters' corpus. A detailed examination is presented of the methods of evaluating mark up algorithms, including computation complexity measures and correctness measures from the fields of information retrieval, string processing, machine learning and information theory. A new taxonomy of markup complexities is established and the properties of each taxon are examined in relation to the complexity of marked up documents. The performance of the new heuristics and optimisation are examined using the four corpora.
APA, Harvard, Vancouver, ISO, and other styles
10

Caillat, Isabelle. "Développement d'outils de management et actes de langage dans les entreprises de spectacle vivant." Thesis, Lyon 3, 2011. http://www.theses.fr/2011LYO30052/document.

Full text
Abstract:
Les entreprises de spectacle vivant évoluent dans un contexte de diminution de ressources externes et de modification des modalités d’attribution des subventions par l’application de la LOLF (Loi Organique relative aux Lois de Finances). Leur problématique repose sur les moyens à mettre en œuvre pour faire face à ces contraintes. Nous nous attachons à démontrer que leur développement dépend de l’amélioration de la logique de coopération entre les acteurs à partir du projet artistique et de l’appropriation des contraintes d’évaluation de la LOLF, pour révéler les performances cachées et développer des ressources internes. Cette recherche se construit à partir de l’hypothèse que l’amélioration de la performance globale des organisations dépend d’une action transformative qui opère selon trois axes interdépendants : l’intervention, les outils de management, le langage–acteur. A partir d’une recherche-Intervention dans un théâtre et d’un diagnostic qualitatif dans un autre, nous accompagnons les acteurs dans une conduite de changement et étudions les conditions de développement managérial dans ce type d’organisation. Nous analysons comment l’utilisation du langage dans le cadre de l’Intervention Socio-Economique modifie les représentations et contribue à l’élaboration d’un nouveau dispositif managérial. Nous proposons d’associer les outils de management socio-Économiques, utilisés comme des matrices de lecture de l’organisation, aux critères d’évaluation et de subvention des pouvoirs publics pour en faire des outils de réflexion sur le processus de réalisation et de diffusion de spectacle et construire une représentation partagée entre les différents acteurs
Performing arts companies operate in a context of declining resources and changes in the rules governing the allocation of grants, in accordance with the LOLF (Organic Law relative to the Laws of Finance). Their challenge lies in finding ways to address these constraints. We aim to demonstrate that their development depends on improving the manner in which all parties cooperate, based on the artistic project and taking into account the constraints resulting from the evaluation used by the LOLF, to reveal hidden costs and to develop internal resources. This research is based on the hypothesis that improving the overall performance of organizations depends on a transformative action that operates in three interdependent areas: intervention, management tools, and the speech-Actor. Based on intervention-Research in one theatre and on a qualitative study in another, we have assisted actors in the process of change management and examined the conditions in which managerial development takes place in this type of organization. We analyse how language use in the context of Socio-Economic Intervention modifies the representations and contributes to the elaboration of a new managerial instrument. We propose the use of socio-Economic management tools, serving as a framework for analyzing the organisation, combined with the criteria of evaluation and allocation of public funding as a basis of reflexion on the process of creation and dissemination of shows, as well as a means of building a shared representation between the different actors
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Hidden transformations"

1

Belzebuub. Secret knowledge, hidden wisdom: A journey into spiritual transformation. Emeryville, CA: Absolute Pub. Group, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Belzebuub. Secret knowledge, hidden wisdom: A journey into spiritual transformation. Emeryville, CA: Absolute Pub. Group, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Belzebuub. Secret knowledge, hidden wisdom: A journey into spiritual transformation. Emeryville, CA: Absolute Pub. Group, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Civilization, Canadian Museum of, ed. North American Aboriginal hide tanning: The act of transformation and revival. Gatineau, Québec: Canadian Museum of Civilization, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Haviland-Jones, Jeannette, and Carol Magai. Hidden Genius of Emotion: Lifespan Transformations of Personality. Cambridge University Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

The Hidden Genius of Emotion: Lifespan Transformations of Personality (Studies in Emotion and Social Interaction). Cambridge University Press, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Simul Sanctification: Barth's Hidden Vision for Human Transformation. Pickwick Publications, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Biesalski, Hans Konrad, ed. Hidden Hunger and the Transformation of Food Systems. S. Karger AG, 2020. http://dx.doi.org/10.1159/isbn.978-3-318-06698-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Miller, Jeanne G. Hidden in Pain: A Life Story of Personal Transformation. Tate Publishing & Enterprises, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Manufacturing cost policy deployment (MCPD) transformation: Uncovering hidden reserves of profitability. 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Hidden transformations"

1

Wasshede, Cathrin. "From Hidden Homophiles to Public Rainbows: A Story of Liberation?" In Transformations of the Swedish Welfare State, 215–29. London: Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/9780230363953_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lai, Tyrone. "Cryptanalysis: Uncovering Objective Knowledge of Hidden Realities." In Technological Transformation, 17–32. Dordrecht: Springer Netherlands, 1989. http://dx.doi.org/10.1007/978-94-009-2597-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Grosseck, Gabriela, Laura Maliţa, and Mădălin Bunoiu. "Higher Education Institutions Towards Digital Transformation—The WUT Case." In European Higher Education Area: Challenges for a New Decade, 565–81. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-56316-5_35.

Full text
Abstract:
Abstract New emerging digital technologies such as artificial intelligence, virtual reality, augmented reality, cloud computing, blockchain, robotization, the Internet of Things, big data, etc. have produced a powerful disruptive effect in almost all areas of our existence and have radically changed the way we live, work, learn or relax. Without consciously realizing it, everyone is adapting to the digital era. As nothing “escapes” the all-encompassing digital transformation, higher education follows track too. So, it is natural to ask ourselves: what are the higher education institutions doing to keep up with this rapidly evolving digital world? In this paper, we present the case of West University of Timişoara as an example of good practice in dealing with the effects of digital transformation on the university and its academic community (teachers, students, administrative staff). Our goal is to gain an understanding of what is being proposed through the institutional development strategy, and what is actually happening in our university from the digitalization perspective. Thus, we conduct an exploratory research using a quantitative approach that involves a survey applied to students enrolled in different study programs, at different levels. We focus on their opinion about how our university can prepare and transform in order to adopt an integrated digital approach, looking into topics like: technology-enabled services, digital enrollment of students, digitization of the administrative processes, implementation of digital procedures to offer recommendations or file complains, digital curricula, new modes of digital learning delivery, etc. Our findings reveal that West University of Timişoara must take significant steps towards the implementation of digital transformations, while, however, remaining watchful and cautious of the hidden implications of this process.
APA, Harvard, Vancouver, ISO, and other styles
4

Chenouard, Raphaël, and Frédéric Jouault. "Automatically Discovering Hidden Transformation Chaining Constraints." In Model Driven Engineering Languages and Systems, 92–106. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04425-0_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Oding, Nina. "Labor Market Transformation and Hidden Unemployment in Russia." In Real and Financial Economic Dynamics in Russia and Eastern Europe, 135–58. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-642-55512-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Brunninge, Olof, and Leif Melin. "Continuity in Change — Path Dependence and Transformation in Two Swedish Multinationals." In The Hidden Dynamics of Path Dependence, 94–109. London: Palgrave Macmillan UK, 2010. http://dx.doi.org/10.1057/9780230274075_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Heiser, Franz, Robert Lagerström, and Mattin Addibpour. "Revealing Hidden Structures in Organizational Transformation – A Case Study." In Lecture Notes in Business Information Processing, 327–38. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19243-7_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ying, Xingren. "Linearly Independent Transformation by Hidden Units with Analytic Asymptotic Activation Function." In International Neural Network Conference, 980. Dordrecht: Springer Netherlands, 1990. http://dx.doi.org/10.1007/978-94-009-0643-3_153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nitecki, Elena, and Helge Wasmuth. "GERM and Its Effects on ECEC: Analyzing Unintended Consequences and Hidden Agendas." In Globalization, Transformation, and Cultures in Early Childhood Education and Care, 57–84. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-27119-0_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tanaka, Yasuhiro. "The Japanese psyche reflected in the suppression and transformation of “Hidden Christians” in feudal Japan." In Political Passions and Jungian Psychology, 120–33. Abingdon, Oxon; New York, NY: Routledge, 2021.: Routledge, 2020. http://dx.doi.org/10.4324/9780429291845-15.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Hidden transformations"

1

Valtchev, V., S. Kapadia, and S. J. Young. "Recurrent input transformations for hidden Markov models." In Proceedings of ICASSP '93. IEEE, 1993. http://dx.doi.org/10.1109/icassp.1993.319292.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Carli, Anna C., and Francesca P. Carli. "Nonlinear Transformations of Marginalisation Mappings for Kernels on Hidden Markov Models." In 2011 Tenth International Conference on Machine Learning and Applications (ICMLA). IEEE, 2011. http://dx.doi.org/10.1109/icmla.2011.106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Monroy, Nelson F., and Miguel Altuve. "Hidden Markov model-based heartbeat detector using different transformations of ECG and ABP signals." In 15th International Symposium on Medical Information Processing and Analysis, edited by Jorge Brieva, Eduardo Romero, and Natasha Lepore. SPIE, 2020. http://dx.doi.org/10.1117/12.2546602.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sainath, Tara N., Dimitri Kanevsky, and Bhuvana Ramabhadran. "Broad phonetic class recognition in a Hidden Markov model framework using extended Baum-Welch transformations." In 2007 IEEE Workshop on Automatic Speech Recognition & Understanding (ASRU). IEEE, 2007. http://dx.doi.org/10.1109/asru.2007.4430129.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

WANG, MAOHUA, and HONG MA. "WAVELET TRANSFORMATION ON HIDDEN MARKOV MODELS." In Proceedings of the Third International Conference on WAA. World Scientific Publishing Company, 2003. http://dx.doi.org/10.1142/9789812796769_0057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Orčić, Drago. "How to Detect Hidden Individual Potential (intellectual DNA) of an Entrepreneur." In Organizations at Innovation and Digital Transformation Roundabout. University of Maribor Press, 2020. http://dx.doi.org/10.18690/978-961-286-388-3.41.

Full text
Abstract:
Entrepreneurship is a powerful tool in the value creation function. Contemporary trends indicate that entrepreneurship is not so much a matter of choice but it is increasingly an issue of survival. In the age of knowledge, intellectual potential becomes a key segment of successful entrepreneurship. The discovery, development and management of intellectual potential gives entrepreneurs, in addition to a competitive edge in the modern market, a greater chance of success in developing an entrepreneurial idea. According to research, in the first three years of business, about 90% of start-ups fail. One possible reason is the mismatch of the business strategy, the business idea, with the personal preferences of the entrepreneurs. The theme of the paper is: how to detect an entrepreneur's individual hidden potential (intellectual DNA) ie his natural dominant traits. By "Intellectual DNA" we mean mental, emotional, character, educational, and other conscious and subconscious individual specificities of an individual. Considering that natural personality traits mean interconnected circuits of cognitive, affective, and behavioral functioning, by the term intellectual DNA, we encompass all these characteristics together. Detecting a unique Intellectual DNA gives us a thorough insight into the natural inclinations of a potential entrepreneur. The concept of understanding the unique intellectual DNA of a potential entrepreneur can be very helpful in developing a strategy to materialize a business idea through starting your own business in many ways. First, knowing the entrepreneur's natural preferences, the business strategy can be adapted in an acceptable, natural way. Second, business processes, procedures can be created, modified, aligned to the individual natural preferences of the entrepreneur and thus reduce the risk of potential failure. Third, associates can be selected and placed in the right places according to their personal preferences. In this way, adequate people would perform certain tasks in accordance with their intellectual DNA, in a natural way, which would result in a greater degree of innovation, creativity, productivity, while reducing the degree of risk. We tested this innovative approach on the participants of the training program "What Makes An Adventure Called Entrepreneurship" within the project "Innovation at Work", which was supported by the Cabinet of the Minister for Innovation and Technological Development of the Republic of Serbia, held from 13.11.2019 to 16.12.2019. The results will be presented in the paper.
APA, Harvard, Vancouver, ISO, and other styles
7

Ding Chu, David A. Sheets, Ye Zhao, Yingyu Wu, Jing Yang, Maogong Zheng, and George Chen. "Visualizing Hidden Themes of Taxi Movement with Semantic Transformation." In 2014 IEEE Pacific Visualization Symposium (PacificVis). IEEE, 2014. http://dx.doi.org/10.1109/pacificvis.2014.50.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pacheco-Pena, V., Ruben Alves, and M. Navarro-Cia. "Conformal transformation in bowtie nanoantennas and nanocavities: unveiling hidden symmetries." In 2019 Thirteenth International Congress on Artificial Materials for Novel Wave Phenomena (Metamaterials). IEEE, 2019. http://dx.doi.org/10.1109/metamaterials.2019.8900863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shen, Guangyao, Wenbing Huang, Chuang Gan, Mingkui Tan, Junzhou Huang, Wenwu Zhu, and Boqing Gong. "Facial Image-to-Video Translation by a Hidden Affine Transformation." In MM '19: The 27th ACM International Conference on Multimedia. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3343031.3350981.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Thomas, Likewin, Manoj Kumar M V, and Annappa B. "Discovery of optimal neurons and hidden layers in feed-forward Neural Network." In 2016 IEEE International Conference on Emerging Technologies and Innovative Business Practices for the Transformation of Societies (EmergiTech). IEEE, 2016. http://dx.doi.org/10.1109/emergitech.2016.7737353.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography