Dissertations / Theses on the topic 'Chain graph models'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 23 dissertations / theses for your research on the topic 'Chain graph models.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Drton, Mathias. "Maximum likelihood estimation in Gaussian AMP chain graph models and Gaussian ancestral graph models /." Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/8952.
Full textLevitz, Michael. "Separation, completeness, and Markov properties for AMP chain graph models /." Thesis, Connect to this title online; UW restricted, 2000. http://hdl.handle.net/1773/9564.
Full textGastaldello, Mattia. "Enumeration Algorithms and Graph Theoretical Models to Address Biological Problems Related To Symbiosis." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSE1019/document.
Full textIn this thesis, we address two graph theoretical problems connected to two different biological problems both related to symbiosis (two organisms live in symbiosis if they have a close and long term interaction). The first problem is related to the size of a minimum cover by "chain subgraphs" of a bipartite graph. A chain graph is a bipartite graph whose nodes can be ordered by neighbourhood inclusion. In biological terms, the size of a minimum cover by chain subgraphs represents the number of genetic factors involved in the phenomenon of Cytoplasmic Incompatibility (CI) induced by some parasitic bacteria in their insect hosts. CI results in the impossibility to give birth to an healthy offspring when an infected male mates with an uninfected female. In the first half of the thesis we address three related problems. One is the enumeration of all the maximal edge induced chain subgraphs of a bipartite graph G, for which we provide a polynomial delay algorithm with a delay of O(n^2m) where n is the number of nodes and m the number of edges of G. Furthermore, we show that (n/2)! and 2^(\sqrt{m} \log m) bound the number of maximal chain subgraphs of G and use them to establish the input-sensitive complexity of the algorithm. The second problem we treat is finding the minimum number of chain subgraphs needed to cover all the edges of a bipartite graph. To solve this NP-hard problem, we provide an exact exponential algorithm which runs in time O^*((2+c)^m), for every c>0, by a procedure which uses our algorithm and an inclusion-exclusion technique (by O^* we denote standard big O notation but omitting polynomial factors). Notice that, since a cover by chain subgraphs is a family of subsets of edges, the existence of an algorithm whose complexity is close to 2^m is not obvious. Indeed, the basic search space would have size 2^(2^m), which corresponds to all families of subsets of edges of a graph on $m$ edges. The third problem is the enumeration of all minimal covers by chain sugbgraphs. We show that it is possible to enumerate all such minimal covers of G in time O([(M+1)|S|]^[\log((M+1)|S|)]) where S is the number of minimal covers of G and M the maximum number of chain graphs in a minimal cover. We then present the relation between the second problem and the computation of the interval order dimension of a bipartite poset. We give an interpretation of our results in the context of poset and interval poset dimension... [etc]
NICOLUSSI, FEDERICA. "Marginal parametrizations for conditional independence models and graphical models for categorical data." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2013. http://hdl.handle.net/10281/43679.
Full textSonntag, Dag. "Chain Graphs : Interpretations, Expressiveness and Learning Algorithms." Doctoral thesis, Linköpings universitet, Databas och informationsteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-125921.
Full textDi, Natale Anna. "Stochastic models and graph theory for Zipf's law." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/17065/.
Full textMoghadasin, Babak. "An Approach on Learning Multivariate Regression Chain Graphs from Data." Thesis, Linköpings universitet, Databas och informationsteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-94019.
Full textPENNONI, FULVIA. "Metodi statistici multivariati applicati all'analisi del comportamento dei titolari di carta di credito di tipo revolving." Bachelor's thesis, Universita' degli studi di Perugia, 2000. http://hdl.handle.net/10281/50024.
Full textIn this thesis work the use of graphical models is proposed to the analysis of credit scoring. In particular the applied application is related to the behavioural scoring which is defined by Thomas (1999) as ‘the systems and models that allow lenders to make better decisions in managing existing clients by forecasting their future performance’. The multivariate statistical models, named chain graph models, proposed for the application allow us to model in a proper way the relation between the variables describing the behaviour of the holders of the credit card. The proposed models are named chain graph models. They are based on a log-linear expansion of the density function of the variables. They allow to: depict oriented association between subset of variables; to detect the structure which accounts for a parsimonious description of the relations between variables; to model simultaneously more than one response variable. They are useful in particular when there is a partial ordering between variables such that they can be divided into exogenous, intermediate and responses. In the graphical models the independence structure is represented by a graph. The variables are represented by nodes, joint by edges showing the dependence in probability among variables. The missing edge means that two nodes are independent given the other nodes. Such class of models is very useful for the theory which combines them with the expert systems. In fact, once the model has been selected, it is possible to link it to the expert system to model the joint and marginal probability of the variables. The first chapter introduces the most used statistical models for the credit scoring analysis. The second chapter introduces the categorical variables. The information related to the credit card holder are stored in a contingency table. It illustrates also the notion of independence between two variables and conditional independence among more than two variables. The odds ratio is introduced as a measure of association between two variables. It is the base of the model formulation. The third chapter introduces the log-linear and logistic models belonging to the family of generalized linear models. They are multivariate methods allowing to study the association between variables considering them simultaneously. A log-linear parameterization is described in details. Its advantage is also that it allow us to take into account of the ordinal scale on which the categorical variables are measured. This is also useful to find the better categorization of the continuous variables. The results related to the maximum likelihood estimation of the model parameters are mentioned as well as the numerical iterative algorithm which are used to solve the likelihood equations with respect to the unknown parameters. The score test is illustrated to evaluate the goodness of fit of the model to the data. Chapter 4 introduces some main concepts of the graph theory in connection with their properties which allow us to depict the model through the graph, showing the interpretative advantages. The sparsity of the contingency table is also mentioned, when there are many cells. The collapsibility conditions are considered as well. Finally, Chapter 5 illustrates the application of the proposed methodology on a sample composed by 70000 revolving credit card holders. The data are released by a one of biggest Italian financial society working in this sector. The variables are the socioeconomic characteristics of the credit card holder, taken form the form filled by the customer when asking for the credit. Every months the society refines the classification of the customers in active, inactive or asleep according to the balance. The application of the proposed method was devoted to find the existing conditional independences between variables related to the two responses which are the balance of the account at two subsequent dates and therefore to define the profiles of most frequently users of the revolving credit card. The chapter ends with some conclusive remarks. The appendix of the chapter reports the code of the used statistical softwares.
Weng, Huibin. "A Social Interaction Model with Endogenous Network Formation." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin159317152899108.
Full textWang, Yan-Jiang, and yanjiang_wang@tmmu edu cn. "Clearance of amyloid-beta in Alzheimer's disease: To understand the pathogenesis and develop potential therapies in animal models." Flinders University. School of Medicine, 2010. http://catalogue.flinders.edu.au./local/adt/public/adt-SFU20100419.124325.
Full textSadeghi, Kayvan. "Graphical representation of independence structures." Thesis, University of Oxford, 2012. http://ora.ox.ac.uk/objects/uuid:86ff6155-a6b9-48f9-9dac-1ab791748072.
Full textKreacic, Eleonora. "Some problems related to the Karp-Sipser algorithm on random graphs." Thesis, University of Oxford, 2017. http://ora.ox.ac.uk/objects/uuid:3b2eb52a-98f5-4af8-9614-e4909b8b9ffa.
Full textPace, Bruno. "O modelo de Axelrod com tensão superficial." Universidade de São Paulo, 2011. http://www.teses.usp.br/teses/disponiveis/43/43134/tde-26042012-123155/.
Full textAxelrod\'s model for cultural dissemination is a discrete vector representation for modeling social and cultural systems. In this work we have studied it and other related models, and a subtle change in the model\'s rule was proposed. Our slight alterations to the model yielded significant qualitative changes, specifically the emergence of surface tension, driving the system to metastable states. Using concepts from statistical mechanics and extensive numerical simulations, we explored some of the aspects that better describe the rich model devised, such as its transient and stationary behaviour.
Curtis, Andrew B. "Path Planning for Unmanned Air and Ground Vehicles in Urban Environments." Diss., CLICK HERE for online access, 2008. http://contentdm.lib.byu.edu/ETD/image/etd2270.pdf.
Full textCARLI, FEDERICO. "Stratified Staged Trees: Modelling, Software and Applications." Doctoral thesis, Università degli studi di Genova, 2021. http://hdl.handle.net/11567/1057653.
Full textHerman, Joseph L. "Multiple sequence analysis in the presence of alignment uncertainty." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:88a56d9f-a96e-48e3-b8dc-a73f3efc8472.
Full textMercier, Fabien. "Cinq essais dans le domaine monétaire, bancaire et financier." Thesis, Paris 2, 2014. http://www.theses.fr/2014PA020065.
Full textThe thesis studies various themes that are central to modern finance : economic agents rationality and behavioural biases with respect to nominal values, the problem of asset fundamental valuation, the changing landscape of the European post-trade industry catalysed by the Eurosystem project Target 2 Securities, and models of defaults and methods to estimate defaults cycles for a given sector. Techniques employed vary: studies on individual data,econometrics, game theory, graph theory, Monte-Carlo simulations and hidden Markov chains. Concerning monetary illusion, results confirm those of previous study while emphasizing new areas for investigation concerning the interplay of individual characteristics, such as university education, and money illusion. The study of the Fed model shows that the long term relationship assumed between nominal government bond yield and dividend yield is neither robust, nor useful for reduced time horizons. The default model based on hidden Markov chains estimation gives satisfactory results in a European context, and this besides the relative scarcity of data used for its calibration
Todeschini, Adrien. "Probabilistic and Bayesian nonparametric approaches for recommender systems and networks." Thesis, Bordeaux, 2016. http://www.theses.fr/2016BORD0237/document.
Full textWe propose two novel approaches for recommender systems and networks. In the first part, we first give an overview of recommender systems and concentrate on the low-rank approaches for matrix completion. Building on a probabilistic approach, we propose novel penalty functions on the singular values of the low-rank matrix. By exploiting a mixture model representation of this penalty, we show that a suitably chosen set of latent variables enables to derive an expectation-maximization algorithm to obtain a maximum a posteriori estimate of the completed low-rank matrix. The resulting algorithm is an iterative soft-thresholded algorithm which iteratively adapts the shrinkage coefficients associated to the singular values. The algorithm is simple to implement and can scale to large matrices. We provide numerical comparisons between our approach and recent alternatives showing the interest of the proposed approach for low-rank matrix completion. In the second part, we first introduce some background on Bayesian nonparametrics and in particular on completely random measures (CRMs) and their multivariate extension, the compound CRMs. We then propose a novel statistical model for sparse networks with overlapping community structure. The model is based on representing the graph as an exchangeable point process, and naturally generalizes existing probabilistic models with overlapping block-structure to the sparse regime. Our construction builds on vectors of CRMs, and has interpretable parameters, each node being assigned a vector representing its level of affiliation to some latent communities. We develop methods for simulating this class of random graphs, as well as to perform posterior inference. We show that the proposed approach can recover interpretable structure from two real-world networks and can handle graphs with thousands of nodes and tens of thousands of edges
Rusch, Thomas, Marcus Wurzer, and Reinhold Hatzinger. "Chain Graph Models in R: Implementing the Cox-Wermuth Procedure." 2013. http://epub.wu.ac.at/3781/1/psychoco2013_(2).pdf.
Full textGASTALDELLO, MATTIA. "Enumeration algorithms and graph theoretical models to address biological problems related to symbiosis." Doctoral thesis, 2018. http://hdl.handle.net/11573/1072500.
Full textDans cette thèse, nous abordons deux problèmes de théorie des graphes liés à deux problèmes biologiques de symbiose (deux organismes vivent en symbiose s'ils ont une interaction étroite et à long terme). Le premier problème est lié au phénomène de l'Incompatibilité cytoplasmique (IC) induit par certaines bactéries parasites chez leurs hôtes. L'IC se traduit par l'impossibilité de donner naissance à une progéniture saine lorsqu'un mâle infecté s'accouple avec une femelle non infectée. En termes de graphe ce problème peut s’interpréter comme la recherche d'une couverture minimum par des "sous-graphes des chaînes" d'un graphe biparti. Un graphe des chaînes est un graphe biparti dont les nœuds peuvent être ordonnés selon leur voisinage. En terme biologique, la taille minimale représente le nombre de facteurs génétiques impliqués dans le phénomène de l'IC. Dans la première moitié de la thèse, nous abordons trois problèmes connexes à ce modèle de la théorie des graphes. Le premier est l'énumération de tous les graphes des chaînes maximaux arêtes induits d'un graphe biparti G, pour lequel nous fournissons un algorithme en delai polynomial avec un retard de O(n^2m) où n est le nombre de noeuds et m le nombre d'arêtes de G. Dans la même section, nous montrons que (n/2)! et 2^(\sqrt{m}\log m) bornent le nombre de sous-graphes de chaînes maximales de G et nous les utilisons pour établir la complexité "input-sensitive" de notre algorithme. Le deuxième problème que nous traitons est de trouver le nombre minimum de graphes des chaînes nécessaires pour couvrir tous les bords d'un graphe biparti. Pour résoudre ce problème NP-hard, en combinant notre algorithme avec la technique d'inclusion-exclusion, nous fournissons un algorithme exponentiel exact en O^*((2+c)^m), pour chaque c > 0 (par O^* on entend la notation O standard mais en omettant les facteurs polynomiaux). Le troisième problème est l'énumération de toutes les couvertures minimales par des sous-graphes des chaînes. Nous montrons qu'il est possible d'énumérer toutes les couvertures minimales de G en temps O([(M + 1) |S|] ^ [\ log ((M + 1) |S|)]) où S est le nombre de couvertures minimales de G et M le nombre maximum des sous-graphes des chaînes dans une couverture minimale. Nous présentons ensuite la relation entre le second problème et le calcul de la dimension intervallaire d'un poset biparti. Nous donnons une interprétation de nos résultats dans le contexte de la dimension d'ordre et la dimension intervallaire. En effet, nous pouvons calculer la dimension intervallaire d'un poset biparti P en O^*((2+ c)^p) où p est le nombre de de paires incomparables de P. Enfin, nous étendons ces résultats au problème du calcul de la dimension d'ordre. Par un résultat classique en théorie des ordres (l'opération "split" de Trotter), nous obtenons alors une procédure qui résout ce problème dans O^*((2+ c)^(p/2)). Pour améliorer nos résultats sur la dimension d'ordre et faire mieux que O(\sqrt{2}^p), i.e. le temps minimum pour exécuter la formule d'inclusion-exclusion sur laquelle ces résultats sont basés, pour chaque poset nous introduisons un graphe associé GCP, dit "graphe des paires critiques". De cette façon, nous obtenons deux algorithmes, un en espace exponentiel et un en espace polynomial. Ces algorithmes calculent la dimension d'ordre en temps 2^q et O(2.9977^q) respectivement où q est le nombre de paires critiques de P (intuitivement, les paires critiques sont les paires incomparables fondamentales à considérer). Dans la deuxième partie de la thèse, nous traitons du modèle de réconciliation des arbres phylogénétiques et de l'exploration de l'espace de solutions optimales de ces réconciliations. La réconciliation d'arbre phylogénétique est l'approche couramment utilisée pour étudier la coévolution d'ensembles d'organismes tels que les hôtes et les symbiotes. Cette approche consiste à une fonction de l'arbre phylogénétique des symbiotes P sur celui de les hôtes H en respectant quelques contraintes. Selon la function, quatre types d'événements peuvent être identifiés: "cospéciation" (quand l'hôte et le symbiont évoluent ensemble), "duplication" (quand le symbiont évolue en différentes espèces mais pas l'hôte), "perte" (lorsque l'hôte évolue en deux nouvelles espèces mais pas le symbiont, entraînant la perte du symbiont chez l'une des deux nouvelles espèces d'hôtes) et "host switch" (lorsque le symbiont évolue en deux nouvelles espèces dont l'une infecte une autre espèce hôte). Compte tenu d'un coût pour chaque type d'événement, c_c, c_d, c_l, et c_h respectivement, nous pouvons affecter un coût total à chaque réconciliation. Les réconciliations avec minimum coût sont dites "parcimonieuses", et l'ensemble des ces réconciliations de coût minimum est noté Rec(H, P, C), où C = (c_c, c_d, c_l, c_h). Le nombre de réconciliations parcimonieuses peut être souvent énorme et, sans autre information, toute interprétation biologique de la coévolution sous-jacente exigerait que tous les rapprochements parcimonieux soient énumérés et examinés. Cela est toutefois impossible sans fournir une sorte de vue de haut niveau de la situation. Dans cette thèse, nous avons abordé ce problème en introduisant deux relations d'équivalence pour mettre ensemble des réconciliations similaires et réduire les solutions optimales à un plus petit ensemble de représentants de ces classes d'équivalence. Nous avons ensuite introduit une nouvelle distance DH parmi les réconciliations optimales et nous la comparons aux distances déjà présentes dans la littérature. Nous montrons que nous pouvons projeter l'ensemble des rapprochements parcimonieux Rec(H, P, C) dans l'hypercube discret H^k = {0,1}^k et que DH coïncide avec la "Distance de Hamming" sur H^k. Dans cette thèse nous présentons une série de résultats sur les réconciliations basées sur les conditions c_c <= c_d et c_l > 0 qui sont raisonnables et conduisent à prouver que l'ensemble des "host switch" d'une réconciliation caractérise celle-ci. Les relations d'équivalence et la distance introduites sont toutes les trois basées sur les événements de "host switch". Nous présentons aussi quelques résultats expérimentaux pour montrer l'efficacité des deux relations d'équivalence et nous rapportons ces résultats au vecteur de coût choisi. Les meilleurs résultats ont été obtenus dans le cas de l'ensemble de données lié au parasite Wolbachia (une bactérie très présente parmi les insectes avec de nombreuses applications dans le contrôle des épidémies et la reproduction des insectes) où nous passons d'un nombre de réconciliations parcimonieuses de ~ 4.08 x 10^{42} réconciliations à ~ 1.15 x 10^{3} représentants.
Jin, Ick Hoon. "Statistical Inference for Models with Intractable Normalizing Constants." Thesis, 2011. http://hdl.handle.net/1969.1/150938.
Full textChe, Xuan. "Spatial graphical models with discrete and continuous components." Thesis, 2012. http://hdl.handle.net/1957/33644.
Full textGraduation date: 2013
Al-Mohannadi, Hamad, Qublai K. A. Mirza, Anitta P. Namanya, Irfan U. Awan, Andrea J. Cullen, and Disso Jules F. Pagna. "Cyber-Attack Modeling Analysis Techniques: An Overview." 2016. http://hdl.handle.net/10454/10703.
Full textCyber attack is a sensitive issue in the world of Internet security. Governments and business organisations around the world are providing enormous effort to secure their data. They are using various types of tools and techniques to keep the business running, while adversaries are trying to breach security and send malicious software such as botnets, viruses, trojans etc., to access valuable data. Everyday the situation is getting worse because of new types of malware emerging to attack networks. It is important to understand those attacks both before and after they happen in order to provide better security to our systems. Understanding attack models provide more insight into network vulnerability; which in turn can be used to protect the network from future attacks. In the cyber security world, it is difficult to predict a potential attack without understanding the vulnerability of the network. So, it is important to analyse the network to identify top possible vulnerability list, which will give an intuitive idea to protect the network. Also, handling an ongoing attack poses significant risk on the network and valuable data, where prompt action is necessary. Proper utilisation of attack modelling techniques provide advance planning, which can be implemented rapidly during an ongoing attack event. This paper aims to analyse various types of existing attack modelling techniques to understand the vulnerability of the network; and the behaviour and goals of the adversary. The ultimate goal is to handle cyber attack in efficient manner using attack modelling techniques.