Academic literature on the topic 'Sensitivy analysis'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Sensitivy analysis.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Sensitivy analysis"

1

Anders, Gilberto, and Itamar Borges. "Topological Analysis of the Molecular Charge Density and Impact Sensitivy Models of Energetic Molecules." Journal of Physical Chemistry A 115, no. 32 (August 18, 2011): 9055–68. http://dx.doi.org/10.1021/jp204562d.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rismawati, Rismawati, Lince Bulutoding, and Eka Suhartini. "PENGARUH ORGANIZATIONAL CITIZENSHIP BEHAVIOR, SELF EFFICACY DAN PROFESSIONAL ETHICAL SENSITIVY TERHADAP KINERJA AUDITOR DENGAN EMPLOYEE ENGAGEMENT SEBAGAI MODERASI." ISAFIR: Islamic Accounting and Finance Review 2, no. 1 (June 30, 2021): 98–107. http://dx.doi.org/10.24252/isafir.v2i1.19935.

Full text
Abstract:
Penelitian ini menguji pengaruh Organizational Citizenship Behavior, Self Efficacy, dan Professional Ethical Sensitivity terhadap Kinerja Auditor dengan Employee Engangement sebagai Variabel Moderasi. Penelitian ini merupakan penelitian kuantitatif dengan pendekatan deskriptif dengan populasi berasal dari auditor yang bekerja pada Inspektorat Kota Makassar. Sampel penelitian sebanyak 30 auditor yang mengembalikan kuisioner dari jumlah 35 kuisioner yang disebar. Analisis data yang digunakan adalah analisis regresi berganda dan pemoderasi digunakan uji MRA (Moderated Regression Analysis). Hasil penelitian menunjukkan bahwa berdasarkan uji regresi berganda yang dilakukan membuktikan bahwa Organizational Citizenship Behavior, Self Efficacy, dan Professional Ethical Sensitivity berpengaruh positif dan siginfikan terhadap kinerja auditor. Pada uji regresi moderasi, ditemukan bahwa employee engangement mampu memoderasi pengaruh positif Organizational Citizenship Behavior dan Professional Ethical Sensitivity terhadap Kinerja Auditor, namun tidak mampu memoderasi pengaruh positif self efficacy terhadap Kinerja Auditor.
APA, Harvard, Vancouver, ISO, and other styles
3

Taji, Kouichi, and Keiji Matsumoto. "INVERSE SENSITIVE ANALYSIS OF PAIRWISE COMPARISON MATRICES." Journal of the Operations Research Society of Japan 49, no. 4 (2006): 332–41. http://dx.doi.org/10.15807/jorsj.49.332.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Riveros, Bruno, Mariana Rosim, Gabriel Pedro, Rosa Lucchetta, and Marcelo Nita. "Análise de custo-efetividade e a análise de sensibilidade, um roteiro para execução de uma abordagem probabilística: Introdução à análise de sensibilidade probabilística (Parte I)." Jornal de Assistência Farmacêutica e Farmacoeconomia 1, no. 2 (December 2016): 33–38. http://dx.doi.org/10.22563/2525-7323.2016.v1.n2.p.33-38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

HORVATH, Gabor, and Norbert PATAKI. "IMPROVING THE PRECISION OF FLOW-SENSITIVE LIFETIME ANALYSIS." Acta Electrotechnica et Informatica 20, no. 4 (January 21, 2020): 10–18. http://dx.doi.org/10.15546/aeei-2020-0020.

Full text
Abstract:
Object lifetimes are a common source of bugs in C++ that can cause crashes, unexpected behavior, or even security vulnerabilities. Herb Sutter, the chair of the C++ standard committee proposed a flow-sensitive analysis to catch lifetime errors statically. Sadly, this analysis is prone to false positives unless the author follows some specific guidelines. We developed mitigations to eliminate some classes of false positives to make it easier to write conforming code. The first mitigation fixes a common false positive from a frequently used coding pattern by introducing local path-sensitivity. The second one is a filter based on reaching definitions and dominance algorithms to remove reports that might be the result of analyzing infeasible paths. We tested the effectiveness of the methods on the open source Google Fuchsia project.
APA, Harvard, Vancouver, ISO, and other styles
6

Kucherenko, D. Yu. "APPLICATION OF GLUTAMATE-SENSITIVE BIOSENSOR FOR ANALYSIS OF FOODSTUFF." Biotechnologia Acta 11, no. 4 (August 2018): 57–67. http://dx.doi.org/10.15407/biotech11.04.057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yunanto, Muhamad, and Henny Medyawati. "Fiscal Policy and Monetary Policy: Sensitivity Analysis." International Journal of Trade, Economics and Finance 6, no. 2 (April 2015): 79–84. http://dx.doi.org/10.7763/ijtef.2015.v6.447.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Dragičević, N., B. Karleuša, and N. Ožanić. "Erosion Potential Method (Gavrilović method) sensitivity analysis." Soil and Water Research 12, No. 1 (January 18, 2017): 51–59. http://dx.doi.org/10.17221/27/2016-swr.

Full text
Abstract:
In recent decades, various methods for erosion intensity and sediment production assessment have been developed. The necessity for better model performance has led to the more frequent application of the method sensitivity and uncertainty assessments in order to decrease errors that arise from the model concept and its main assumptions. The analysis presented in this paper refers to the application of the Gavrilović method (Erosion Potential Method), an empirical and semi-quantitative method that can estimate the amount of sediment production and sediment transport as well as the erosion intensity and indicate the areas potentially threatened by erosion. The emphasis in this paper is given upon the method sensitivity analysis that has not previously been conducted for the Gavrilović method. The sensitivity analysis was conducted for fourteen different parameters included in the method, all in relation to different model outputs. Each parameter was perceived and discussed individually in relation to its effect upon the method outputs, and ranked into categories depending on their influence on one or more model outputs. The objective of the analysis was to explore the constraints of the Gavrilović method and the method response to changes deriving from the each individual parameter in an attempt to provide a better understanding of the method, the weight and the contribution of each parameter in the overall method. The parameters that could potentially be used in future research, for method modification and calibration in areas with different catchment characteristics (e.g. climate, geological, etc.) were identified. The most sensitive model parameters resulting from conducted sensitivity analysis for the Gavrilović method are also those considered to be significant in the scientific literature on erosion. The Gavrilović method sensitivity analysis has been done on a case study for the Dubracina catchment area, Croatia.
APA, Harvard, Vancouver, ISO, and other styles
9

Qichang An, Qichang An, Jingxu Zhang Jingxu Zhang, Fei Yang Fei Yang, and Hongchao Zhao Hongchao Zhao. "Normalized point source sensitivity analysis in GSSM prototype." Chinese Optics Letters 15, no. 11 (2017): 111202. http://dx.doi.org/10.3788/col201715.111202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Juhl, C. F. "A Context-Sensitive Liar." Analysis 57, no. 3 (July 1, 1997): 202–4. http://dx.doi.org/10.1093/analys/57.3.202.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Sensitivy analysis"

1

Fruth, Jana. "Sensitivy analysis and graph-based methods for black-box functions with on application to sheet metal forming." Thesis, Saint-Etienne, EMSE, 2015. http://www.theses.fr/2015EMSE0779/document.

Full text
Abstract:
Le domaine général de la thèse est l’analyse de sensibilité de fonctions boîte noire. L’analyse de sensibilité étudie comment la variation d’une sortie peut être reliée à la variation des entrées. C’est un outil important dans la construction, l’analyse et l’optimisation des expériences numériques (computer experiments).Nous présentons tout d’abord l’indice d’interaction total, qui est utile pour le criblage d’interactions. Plusieurs méthodes d’estimation sont proposées. Leurs propriétés sont étudiées au plan théorique et par des simulations.Le chapitre suivant concerne l’analyse de sensibilité pour des modèles avec des entrées fonctionnelles et une sortie scalaire. Une approche séquentielle très économique est présentée, qui permet non seulement de retrouver la sensibilité de entrées fonctionnelles globalement, mais aussi d’identifier les régions d’intérêt dans leur domaine de définition.Un troisième concept est proposé, les support index functions, mesurant la sensibilité d’une entrée sur tout le support de sa loi de probabilité.Finalement les trois méthodes sont appliquées avec succès à l’analyse de sensibilité de modèles d’emboutissage
The general field of the thesis is the sensitivity analysis of black-box functions. Sensitivity analysis studies how the variation of the output can be apportioned to the variation of input sources. It is an important tool in the construction, analysis, and optimization of computer experiments.The total interaction index is presented, which can be used for the screening of interactions. Several variance-based estimation methods are suggested. Their properties are analyzed theoretically as well as on simulations.A further chapter concerns the sensitivity analysis for models that can take functions as input variables and return a scalar value as output. A very economical sequential approach is presented, which not only discovers the sensitivity of those functional variables as a whole but identifies relevant regions in the functional domain.As a third concept, support index functions, functions of sensitivity indices over the input distribution support, are suggested.Finally, all three methods are successfully applied in the sensitivity analysis of sheet metal forming models
APA, Harvard, Vancouver, ISO, and other styles
2

Nilsson, Martina. "Mitochondrial DNA in Sensitive Forensic Analysis." Doctoral thesis, Uppsala : Acta Universitatis Upsaliensis : Univ.-bibl. [distributör], 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-7458.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Galanopoulos, Aristides. "Analysis of frequency sensitive competitive learning /." The Ohio State University, 1996. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487941504294837.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wan, Din Wan Ibrahim. "Sensitivity analysis intolerance allocation." Thesis, Queen's University Belfast, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.675480.

Full text
Abstract:
In Computer Aided Design model the shape is usually defined as a boundary representation, a cell complex of faces, edges, and vertices. The boundary representation is generated from a system of geometric constraints, with parameters as degrees of freedom. The dimensions of the boundary representation are determined by the parameters in the CAD system used to model the part, and every single parametric perturbation may generate different changes in the part model shape and dimensions. Thus, one can compute dimensional sensitivity to parameter perturbations. A "Sensitivity Analysis" method is proposed to automatically quantify the dependencies of the Key Characteristic dimensions on each of the feature parameters in a CAD model. Once the sensitivities of the feature parameters to Key Characteristic dimensions have been determined the appropriate perturbations of each parameter to cause a desired change in critical dimension can be determined. This methodology is then applied to real applications of tolerancing in mechanical assembly models to show the efficiencies of this new developed strategy. The approach can identify where specific tolerances need to be applied to a Key Control Characteristic dimension, the range of part tolerances that could be used to achieve the desired Key Product Characteristic dimension tolerances, and also if existing part tolerances make it impossible to achieve the desired Key Product Characteristic dimension tolerances. This thesis provides an explanation of a novel automated tolerance allocation process for an assembly model based on the parametric CAD sensitivity method. The objective of this research is to expose the relationship between parameters sensitivity of CAD design in mechanical assembly product and tolerance design. This exposes potential new avenues of research in how to develop standard process and methodology for geometrical dimensioning and tolerancing (GD&T) in a digital design tools environment known as Digital MockUp (DMU).
APA, Harvard, Vancouver, ISO, and other styles
5

Munster, Drayton William. "Sensitivity Enhanced Model Reduction." Thesis, Virginia Tech, 2013. http://hdl.handle.net/10919/23169.

Full text
Abstract:
In this study, we numerically explore methods of coupling sensitivity analysis to the reduced model in order to increase the accuracy of a proper orthogonal decomposition (POD) basis across a wider range of parameters. Various techniques based on polynomial interpolation and basis alteration are compared. These techniques are performed on a 1-dimensional reaction-diffusion equation and 2-dimensional incompressible Navier-Stokes equations solved using the finite element method (FEM) as the full scale model. The expanded model formed by expanding the POD basis with the orthonormalized basis sensitivity vectors achieves the best mixture of accuracy and computational efficiency among the methods compared.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
6

Edlund, Hanna. "Sensitive Identification Tools in Forensic DNA Analysis." Doctoral thesis, Uppsala universitet, Institutionen för genetik och patologi, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-131904.

Full text
Abstract:
DNA as forensic evidence is valuable in criminal investigations. Implementation of new, sensitive and fast technologies is an important part of forensic genetic research. This thesis aims to evaluate new sensitive methods to apply in forensic DNA analysis including analysis of old skeletal remains. In Paper I and II, two novel systems for analysis of STRs, based on the Pyrosequencing technology, are presented. In Paper I, Y chromosomal STRs are analysed. Markers on the male specific Y chromosome are especially useful in analysis of DNA mixtures. In Paper II, ten autosomal STRs are genotyped. The systems are based on sequencing of STR loci instead of size determination of STR fragments as in routine analysis. This provides a higher resolution since sequence variants within the repeats can be detected. Determination of alleles is based on a termination recognition base. This is the base in the template strand that is excluded from the dispensation order in the sequencing of the complementary strand and therefore terminates the reaction. Furthermore, skeletal remains are often difficult to analyse, due to damaging effects from the surrounding environment on the DNA and the high risk of exogenous contamination. Analysis of mitochondrial DNA is useful on degraded samples and in Paper III, mtDNA analysis of 700 years old skeletal remains is performed to investigate a maternal relationship. The quantity and quality of DNA are essential in forensic genetics. In Paper IV the efficiency of DNA isolation is investigated. Soaking skeletal remains in bleach is efficient for decontamination but result in a lower DNA yield, especially on pulverised skull samples. In conclusion, this thesis presents novel sequencing systems for accurate and fast analysis of STR loci that can be useful in evaluation of new loci and database assembly as well as the utility of mtDNA in forensic genetics.
APA, Harvard, Vancouver, ISO, and other styles
7

Mazanec, Josef. "Exploratory market structure analysis. Topology-sensitive methodology." SFB Adaptive Information Systems and Modelling in Economics and Management Science, WU Vienna University of Economics and Business, 1999. http://epub.wu.ac.at/928/1/document.pdf.

Full text
Abstract:
Given the recent abundance of brand choice data from scanner panels market researchers have neglected the measurement and analysis of perceptions. Heterogeneity of perceptions is still a largely unexplored issue in market structure and segmentation studies. Over the last decade various parametric approaches toward modelling segmented perception-preference structures such as combined MDS and Latent Class procedures have been introduced. These methods, however, are not taylored for qualitative data describing consumers' redundant and fuzzy perceptions of brand images. A completely different method is based on topology-sensitive vector quantization (VQ) for consumers-by-brands-by-attributes data. It maps the segment-specific perceptual structures into bubble-pie-bar charts with multiple brand positions demonstrating perceptual distinctiveness or similarity. Though the analysis proceeds without any distributional assumptions it allows for significance testing. The application of exploratory and inferential data processing steps to the same data base is statistically sound and particularly attractive for market structure analysts. A brief outline of the VQ method is followed by a sample study with travel market data which proved to be particularly troublesome for conventional processing tools. (author's abstract)
Series: Report Series SFB "Adaptive Information Systems and Modelling in Economics and Management Science"
APA, Harvard, Vancouver, ISO, and other styles
8

Boccardo, Davidson Rodrigo [UNESP]. "Context-sensitive analysis of x86 obfuscated executables." Universidade Estadual Paulista (UNESP), 2009. http://hdl.handle.net/11449/100286.

Full text
Abstract:
Made available in DSpace on 2014-06-11T19:30:32Z (GMT). No. of bitstreams: 0 Previous issue date: 2009-10-09Bitstream added on 2014-06-13T18:40:52Z : No. of bitstreams: 1 boccardo_dr_dr_ilha.pdf: 1178776 bytes, checksum: cdd885f0beff962757e3b9de59ce0832 (MD5)
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Ofusca c~ao de c odigo tem por nalidade di cultar a detec c~ao de propriedades intr nsecas de um algoritmo atrav es de altera c~oes em sua sintaxe, entretanto preservando sua sem antica. Desenvolvedores de software usam ofusca c~ao de c odigo para defender seus programas contra ataques de propriedade intelectual e para aumentar a seguran ca do c odigo. Por outro lado, programadores maliciosos geralmente ofuscam seus c odigos para esconder comportamento malicioso e para evitar detec c~ao pelos anti-v rus. Nesta tese, e introduzido um m etodo para realizar an alise com sensitividade ao contexto em bin arios com ofuscamento de chamada e retorno de procedimento. Para obter sem antica equivalente, estes bin arios utilizam opera c~oes diretamente na pilha ao inv es de instru c~oes convencionais de chamada e retorno de procedimento. No estado da arte atual, a de ni c~ao de sensitividade ao contexto est a associada com opera c~oes de chamada e retorno de procedimento, assim, an alises interprocedurais cl assicas n~ao s~ao con aveis para analisar bin arios cujas opera c~oes n~ao podem ser determinadas. Uma nova de ni c~ao de sensitividade ao contexto e introduzida, baseada no estado da pilha em qualquer instru c~ao. Enquanto mudan cas em contextos a chamada de procedimento s~ao intrinsicamente relacionadas com transfer encia de controle, assim, podendo ser obtidas em termos de caminhos em um grafo de controle de uxo interprocedural, o mesmo n~ao e aplic avel para mudan cas em contextos a pilha. Um framework baseado em interpreta c~ao abstrata e desenvolvido para avaliar contexto baseado no estado da pilha e para derivar m etodos baseado em contextos a chamada de procedimento para uso com contextos baseado no estado da pilha. O metodo proposto n~ao requer o uso expl cito de instru c~oes de chamada e retorno de procedimento, por em depende do...
A code obfuscation intends to confuse a program in order to make it more di cult to understand while preserving its functionality. Programs may be obfuscated to protect intellectual property and to increase security of code. Programs may also be obfuscated to hide malicious behavior and to evade detection by anti-virus scanners. We introduce a method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations. These binaries may use direct stack operators instead of the native call and ret instructions to achieve equivalent behavior. Since de nition of context-sensitivity and algorithms for context-sensitive analysis has thus far been based on the speci c semantics associated to procedure call and return operations, classic interprocedural analyses cannot be used reliably for analyzing programs in which these operations cannot be discerned. A new notion of context-sensitivity is introduced that is based on the state of the stack at any instruction. While changes in calling-context are associated with transfer of control, and hence can be reasoned in terms of paths in an interprocedural control ow graph (ICFG), the same is not true for changes in stackcontext. An abstract interpretation based framework is developed to reason about stackcontext and to derive analogues of call-strings based methods for the context-sensitive analysis using stack-context. This analysis requires the knowledge of how the stack, rather the stack pointer, is represented and on the knowledge of operators that manipulate the stack pointer. The method presented is used to create a context-sensitive version of Venable et al.'s algorithm for detecting obfuscated calls. Experimental results show that the contextsensitive version of the algorithm generates more precise results and is also computationally more e cient than its context-insensitive counterpart.
APA, Harvard, Vancouver, ISO, and other styles
9

Boccardo, Davidson Rodrigo. "Context-Sensitive Analysis of x86 Obfuscated Executables." Ilha Solteira : [s.n.], 2009. http://hdl.handle.net/11449/100286.

Full text
Abstract:
Orientador: Aleardo Manacero Junior
Banca: Sergio Azevedo de Oliveira
Banca: Francisco Villarreal Alvarado
Banca: Rodolfo Jardim Azevedo
Banca: André Luiz Moura dos Santos
Resumo: Ofusca c~ao de c odigo tem por nalidade di cultar a detec c~ao de propriedades intr nsecas de um algoritmo atrav es de altera c~oes em sua sintaxe, entretanto preservando sua sem^antica. Desenvolvedores de software usam ofusca c~ao de c odigo para defender seus programas contra ataques de propriedade intelectual e para aumentar a seguran ca do c odigo. Por outro lado, programadores maliciosos geralmente ofuscam seus c odigos para esconder comportamento malicioso e para evitar detec c~ao pelos anti-v rus. Nesta tese, e introduzido um m etodo para realizar an alise com sensitividade ao contexto em bin arios com ofuscamento de chamada e retorno de procedimento. Para obter sem^antica equivalente, estes bin arios utilizam opera c~oes diretamente na pilha ao inv es de instru c~oes convencionais de chamada e retorno de procedimento. No estado da arte atual, a de ni c~ao de sensitividade ao contexto est a associada com opera c~oes de chamada e retorno de procedimento, assim, an alises interprocedurais cl assicas n~ao s~ao con aveis para analisar bin arios cujas opera c~oes n~ao podem ser determinadas. Uma nova de ni c~ao de sensitividade ao contexto e introduzida, baseada no estado da pilha em qualquer instru c~ao. Enquanto mudan cas em contextos a chamada de procedimento s~ao intrinsicamente relacionadas com transfer^encia de controle, assim, podendo ser obtidas em termos de caminhos em um grafo de controle de uxo interprocedural, o mesmo n~ao e aplic avel para mudan cas em contextos a pilha. Um framework baseado em interpreta c~ao abstrata e desenvolvido para avaliar contexto baseado no estado da pilha e para derivar m etodos baseado em contextos a chamada de procedimento para uso com contextos baseado no estado da pilha. O metodo proposto n~ao requer o uso expl cito de instru c~oes de chamada e retorno de procedimento, por em depende do... (Resumo completo, clicar acesso eletrônico abaixo)
Abstract: A code obfuscation intends to confuse a program in order to make it more di cult to understand while preserving its functionality. Programs may be obfuscated to protect intellectual property and to increase security of code. Programs may also be obfuscated to hide malicious behavior and to evade detection by anti-virus scanners. We introduce a method for context-sensitive analysis of binaries that may have obfuscated procedure call and return operations. These binaries may use direct stack operators instead of the native call and ret instructions to achieve equivalent behavior. Since de nition of context-sensitivity and algorithms for context-sensitive analysis has thus far been based on the speci c semantics associated to procedure call and return operations, classic interprocedural analyses cannot be used reliably for analyzing programs in which these operations cannot be discerned. A new notion of context-sensitivity is introduced that is based on the state of the stack at any instruction. While changes in calling-context are associated with transfer of control, and hence can be reasoned in terms of paths in an interprocedural control ow graph (ICFG), the same is not true for changes in stackcontext. An abstract interpretation based framework is developed to reason about stackcontext and to derive analogues of call-strings based methods for the context-sensitive analysis using stack-context. This analysis requires the knowledge of how the stack, rather the stack pointer, is represented and on the knowledge of operators that manipulate the stack pointer. The method presented is used to create a context-sensitive version of Venable et al.'s algorithm for detecting obfuscated calls. Experimental results show that the contextsensitive version of the algorithm generates more precise results and is also computationally more e cient than its context-insensitive counterpart.
Doutor
APA, Harvard, Vancouver, ISO, and other styles
10

Gasparini, Luca. "Severity sensitive norm analysis and decision making." Thesis, University of Aberdeen, 2017. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=231873.

Full text
Abstract:
Normative systems have been proposed as a useful abstraction to represent ideals of behaviour for autonomous agents in a social context. They specify constraints that agents ought to follow, but may sometimes be violated. Norms can increase the predictability of a system and make undesired situations less likely. When designing normative systems, it is important to anticipate the effects of possible violations and understand how robust these systems are to violations. Previous research on robustness analysis of normative systems builds upon simplistic norm formalisms, lacking support for the specification of complex norms that are often found in real world scenarios. Furthermore, existing approaches do not consider the fact that compliance with different norms may be more or less important in preserving some desirable properties of a system; that is, norm violations may vary in severity. In this thesis we propose models and algorithms to represent and reason about complex norms, where their violation may vary in severity. We build upon existing preference-based deontic logics and propose mechanisms to rank the possible states of a system according to what norms they violate, and their severity. Further, we propose mechanisms to analyse the properties of the system under different compliance assumptions, taking into account the severity of norm violations. Our norm formalism supports the specification of norms that regulate temporally extended behaviour and those that regulate situations where other norms have been violated. We then focus on algorithms that allow coalitions of agents to coordinate their actions in order to minimise the risk of severe violations. We propose offline algorithms and heuristics for pre-mission planning in stochastic scenarios where there is uncertainty about the current state of the system. We then develop online algorithms that allow agents to maintain a certain degree of coordination and to use communication to improve their performance.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Sensitivy analysis"

1

Borgonovo, Emanuele. Sensitivity Analysis. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

D, Roberts Gary, Bowles Kenneth J, and United States. National Aeronautics and Space Administration., eds. ICAN sensitivity analysis. [Washington, DC]: National Aeronautics and Space Administration, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sensitivity and uncertainty analysis. Boca Raton, Fla: Chapman & Hall/CRC, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Choi, Kyung K. Structural sensitivity analysis and optimization. New York: Springer Science+Business Media, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chatterjee, Samprit. Sensitivity analysis in linear regression. New York: Wiley, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barrick, Nettie J. OASDI short-range sensitivity analysis. [Washington, D.C.?]: Social Security Administration, Office of the Chief Actuary, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Deif, Assem. Sensitivity Analysis in Linear Systems. Berlin, Heidelberg: Springer Berlin Heidelberg, 1986. http://dx.doi.org/10.1007/978-3-642-82739-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ustinov, Eugene A. Sensitivity Analysis in Remote Sensing. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15841-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yeung, Daniel S., Ian Cloete, Daming Shi, and Wing W. Y. Ng. Sensitivity Analysis for Neural Networks. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-02532-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chatterjee, Samprit, and Ali S. Hadi, eds. Sensitivity Analysis in Linear Regression. Hoboken, NJ, USA: John Wiley & Sons, Inc., 1988. http://dx.doi.org/10.1002/9780470316764.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Sensitivy analysis"

1

Becker, Claudia. "Exploring Sensitive Topics: Sensitivity, Jeopardy, and Cheating." In Studies in Classification, Data Analysis, and Knowledge Organization, 299–305. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-10745-0_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Borgonovo, Emanuele. "Decisions and Sensitivity Analysis." In Sensitivity Analysis, 1–7. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Borgonovo, Emanuele. "What to Use and When." In Sensitivity Analysis, 89–91. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Borgonovo, Emanuele. "Value of Information." In Sensitivity Analysis, 93–100. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Borgonovo, Emanuele. "Local Sensitivity Analysis with Constraints." In Sensitivity Analysis, 101–13. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Borgonovo, Emanuele. "Uncertainty Quantification." In Sensitivity Analysis, 117–27. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Borgonovo, Emanuele. "Global Sensitivity Analysis." In Sensitivity Analysis, 129–38. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Borgonovo, Emanuele. "Variance-Based Methods." In Sensitivity Analysis, 139–62. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Borgonovo, Emanuele. "The $$\delta $$ —Importance Measure." In Sensitivity Analysis, 163–80. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Borgonovo, Emanuele. "CDF-Based Sensitivity Measures." In Sensitivity Analysis, 181–89. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-52259-3_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Sensitivy analysis"

1

SPENCE, ANNE, and ROBERTO CELI. "EFFICIENT SENSITIVY ANALYSIS FOR ROTARI-WING AEROMECHANICAL PROBLEMS." In 34th Structures, Structural Dynamics and Materials Conference. Reston, Virigina: American Institute of Aeronautics and Astronautics, 1993. http://dx.doi.org/10.2514/6.1993-1648.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

He-yi, Zhang, He Xuehua, and Tang Sing Hai. "High Sensitive Laser Spectroscopy For Detect Trace Rare Earth Impurities In YbF3 and CaF 2 : Y b 3 + Crystals." In Laser Applications to Chemical Analysis. Washington, D.C.: Optica Publishing Group, 1990. http://dx.doi.org/10.1364/laca.1990.tuc5.

Full text
Abstract:
The upconversion fluorescence is an interest subject for many applications. But very few papers study the high sensitivity upconversion fluorescence and its application to analytical chemistry. The laser excited high sensitive upconversion fluorescence of YbF3 contain with trace T m 3 + and E r 3 + reported here for first time to our knowledge. Also high sensitive upconversion fluorescence of CaF 2 : Y b 3 + contain with trace T m 3 + and E r 3 + as impurities were studied.
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Haofeng, Jie Lu, Haining Meng, Liqing Cao, Yongheng Huang, Lian Li, and Lin Gao. "Generic sensitivity: customizing context-sensitive pointer analysis for generics." In ESEC/FSE '22: 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3540250.3549122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Veirs, Kirk, Victor K. F. Chia, and Gerd M. Rosenblatt. "Application of Position-Sensitive, Photon-Counting Detectors in Raman Spectroscopy." In Laser Applications to Chemical Analysis. Washington, D.C.: Optica Publishing Group, 1987. http://dx.doi.org/10.1364/laca.1987.wa8.

Full text
Abstract:
Raman spectroscopy has benefited from recent advances in the technology of lasers, optics, thin film interference filters and multichannel detectors. A new generation of imaging detectors based upon microchannel plates with position sensitive anodes may increase the sensitivity of Raman spectroscopy. Such detectors would be particularly useful to Raman spectroscopy without surface enhancement. A position-sensitive detector (PSD) with resolution of 70 microns in both the x and y axis on a 1 inch diameter photocathode with a dark count of 30 counts per second (cps) was used. The signal and signal to noise ratio (SNR) of this detector was compared to the standard intensified photodiode array (IPDA) detector using the Raman spectra of the fundamental vibration of O2 in air.
APA, Harvard, Vancouver, ISO, and other styles
5

Mohammadi, E., and N. Manavizadeh. "Performance and sensitivity analysis of Dual-gated ion sensitive FET." In 2017 Iranian Conference on Electrical Engineering (ICEE). IEEE, 2017. http://dx.doi.org/10.1109/iraniancee.2017.7985490.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sounders, George C., Jomes H. Jett, John C. Martin, and Richard A. Keller. "Flow Cytometric Ultrasensitive Molecular Quantitation Via Antibody-Antigen Interactions." In Laser Applications to Chemical Analysis. Washington, D.C.: Optica Publishing Group, 1987. http://dx.doi.org/10.1364/laca.1987.ma2.

Full text
Abstract:
The traditional domain of flow cytometry has been the measurement of properties of discrete biological particles - primarily cells or chromosomes. Most flow cytometric fluorescence measurements of cell properties are determinations of the amount of a specific type of molecule in a cell, such as DNA or a cell surface antigen. Since the inception of flow cytometry, there has been a continuing guest for more sensitive instruments and for techniques to detect and quantitate low levels of fluorescence. A generally accepted value for the sensitivity of detection of fluorescein on the surface of a cell is 3 000 to 5 000 molecules.
APA, Harvard, Vancouver, ISO, and other styles
7

Vander Wal, R. L., R. L. Farrow, and D. J. Rakestraw. "Investigation of Line Intensities and Collisional Effects in Degenerate Four-Wave Mixing in Nitric Oxide." In Laser Applications to Chemical Analysis. Washington, D.C.: Optica Publishing Group, 1992. http://dx.doi.org/10.1364/laca.1992.tua2.

Full text
Abstract:
The potential of resonant degenerate four-wave mixing (DFWM) as a sensitive, coherent diagnostic probe of combustion species has recently been demonstrated.1,2 Similar to coherent anti-Stokes Raman spectroscopy (CARS), DFWM generates a highly collimated, narrow bandwidth signal beam that allows remote detection, requires minimal optical access, and provides excellent immunity to background luminosity. However, since DFWM is typically performed with resonant radiation, it offers much greater sensitivity than CARS, permitting trace-species detection. While DFWM has been extensively studied in the context of phase conjugation,3 comparatively little has been reported on the development of DFWM for quantitative molecular spectroscopy.
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Lan-Wei, Fuqin Li, Imam Alam, David Jupp, Simon Oliver, and Medhavy Thankappan. "Analysis Ready Data Sensitivity Analyses." In IGARSS 2019 - 2019 IEEE International Geoscience and Remote Sensing Symposium. IEEE, 2019. http://dx.doi.org/10.1109/igarss.2019.8898667.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zayhowski, J. J., and Bernadette Johnson. "Passively Q-Switched Microchip Lasers for Environmental Monitoring." In Laser Applications to Chemical and Environmental Analysis. Washington, D.C.: Optica Publishing Group, 1996. http://dx.doi.org/10.1364/lacea.1996.lwc.2.

Full text
Abstract:
The need exists for sensors capable of measuring soil, groundwater, and airborne pollutants without laborious sample collection and analysis. Single-wavelength transmission, differential absorption, laser-induced fluorescence (LIF), stimulated Raman scattering, and laser-induced breakdown spectroscopy (LIBS) are all highly sensitive methods for providing quantitative values of concentrations of chemical species. These optical techniques have been proven to provide high sensitivity and chemical selectivity for a large number of the materials on the EPA’s priority pollutant list.
APA, Harvard, Vancouver, ISO, and other styles
10

Marr, Andrew J., Bor-Chen Chang, Gregory E. Hall, and Trevor J. Sears. "Near-Infrared Frequency Modulated Detection of Transient Species." In Laser Applications to Chemical and Environmental Analysis. Washington, D.C.: Optica Publishing Group, 1998. http://dx.doi.org/10.1364/lacea.1998.lmc.13.

Full text
Abstract:
Recently, a frequency modulated Ti:sapphire laser was used as a highly sensitive means for detection of transient species (1). In particular it was used to measure spectra of methylene and its halo-derivatives (2,3) and in addition very high signal-to-noise Doppler lineshapes were recorded from which significant dynamical analyses have derived (4). Within the last year we have incorporated the frequency modulation (FM) method into a near-infrared diode laser system which works at wavelengths around 1 μm and this has produced an order of magnitude improvment in signal-to-noise of that system. A further improvement in sensitivity has been achieved by extending the interaction region of the probing laser and the gas sample using a Herriott-type cell. Systems based upon this diode laser spectrometer which is cheap, simple to use and maintain, and relatively compact may provide a sensitive monitor of important gaseous molecules that absorb at similar wavelengths.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Sensitivy analysis"

1

Ralston-Hooper, Kimberly. Hanford Site Composite Analysis: Dose Sensitivity Analyses. Office of Scientific and Technical Information (OSTI), April 2022. http://dx.doi.org/10.2172/1861434.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Flach, G. SENSITIVITY ANALYSIS FOR SALTSTONE DISPOSAL UNIT COLUMN DEGRADATION ANALYSES. Office of Scientific and Technical Information (OSTI), October 2014. http://dx.doi.org/10.2172/1163502.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lombardi, D. D2PC sensitivity analysis. Office of Scientific and Technical Information (OSTI), August 1992. http://dx.doi.org/10.2172/7271811.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Van Buren, Rachel. Railcar Sensitivity Analysis. Fort Belvoir, VA: Defense Technical Information Center, November 2011. http://dx.doi.org/10.21236/ada565001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lehoucq, Richard, Brian Franke, Stephen Bond, and Scott McKinley. Particle Sensitivity Analysis. Office of Scientific and Technical Information (OSTI), September 2020. http://dx.doi.org/10.2172/1669202.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lombardi, D. D2PC sensitivity analysis. Office of Scientific and Technical Information (OSTI), August 1992. http://dx.doi.org/10.2172/10174720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Cheng, J. J., C. Yu, and A. J. Zielen. RESRAD parameter sensitivity analysis. Office of Scientific and Technical Information (OSTI), August 1991. http://dx.doi.org/10.2172/6400651.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Friedman-Hill, Ernest J., Edward L. Hoffman, Marcus J. Gibson, and Robert L. Clay. Integrated Sensitivity Analysis Workflow. Office of Scientific and Technical Information (OSTI), August 2014. http://dx.doi.org/10.2172/1171554.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Horwedel, J. E., R. Q. Wright, and R. E. Maerker. Sensitivity analysis of EQ3. Office of Scientific and Technical Information (OSTI), January 1990. http://dx.doi.org/10.2172/7079359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Keiter, Eric R., Laura Painton Swiler, Thomas V. Russo, and Ian Zachary Wilcox. Sensitivity Analysis in Xyce. Office of Scientific and Technical Information (OSTI), September 2016. http://dx.doi.org/10.2172/1562422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography