Rozprawy doktorskie na temat „Perfect information”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 30 najlepszych rozpraw doktorskich naukowych na temat „Perfect information”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Hummelgren, Lars, i Anton Lyxell. "Using PAQ8L to play games of perfect information". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-229759.
Pełny tekst źródłaEn av de bästa kompressionsalgoritmerna idag med hänsyn till kompressionsgrad är PAQ8L. Den här avhandlingen visar hur PAQ8L kan användas för att förutsäga drag i en fyra gånger fyra variant av luffarschack.Vi definierar tre agenter för att utvärdera PAQ8L. Den första agenten är baserad på memorering, den andra gör slumpmässiga gissningar och den tredje använder PAQ8L för att förutsäga drag. Precisionen hos agenten baserad på PAQ8L överträffar precisionen hos de övriga agenterna. Däremot använder den betydligt mer tid och minne.
Hidalgo, Dario. "Value of perfect information of transportation forecasting models /". The Ohio State University, 1997. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487943341526861.
Pełny tekst źródłaKelmendi, Edon. "Two-Player Stochastic Games with Perfect and Zero Information". Thesis, Bordeaux, 2016. http://www.theses.fr/2016BORD0238/document.
Pełny tekst źródłaWe consider stochastic games that are played on finite graphs. The subject of the first part are two-player stochastic games with perfect information. In such games the two players take turns choosing actions from a finite set, for an infinite duration, resulting in an infinite play. The objective of the game is given by a Borel-measurable and bounded payoff function that maps infinite plays to real numbers. The first player wants to maximize the expected payoff, and the second player has the opposite objective, that of minimizing the expected payoff. We prove that if the payoff function is both shift-invariant and submixing then the game is half-positional. This means that the first player has an optimal strategy that is at the same time pure and memoryless. Both players have perfect information, so the actions are chosen based on the whole history. In the second part we study finite-duration games where the protagonist player has zero information. That is, he gets no feedback from the game and consequently his strategy is a finite word over the set of actions. Probabilistic finite automata can be seen as an example of such a game that has only a single player. First we compare two classes of probabilistic automata: leaktight automata and simple automata, for which the value 1 problem is known to be decidable. We prove that simple automata are a strict subset of leaktight automata. Then we consider half-blind games, which are two player games where the maximizer has zero information and the minimizer is perfectly informed. We define the class of leaktight half-blind games and prove that it has a decidable maxmin reachability problem
Matras, Omolara. "In pursuit of a perfect system : Balancing usability and security in computer system development". Thesis, Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-123737.
Pełny tekst źródłaVårt samhälle är beroende av information och olika tekniker och artefakter som ger oss tillgång till den. Men tekniken vi förlitar oss på i olika aspekter av våra liv är ofullkomliga och under det senaste decenniet, har dessa brister varit föremål för identitetstjuvar, cyberbrottslingar och illvilliga personer inom och utanför organisationen. Dessa illvilliga personer riktar ofta sig till nätverk av organisationer såsom sjukhus, banker och andra finansiella organisationer. Tillgång till dessa nätverk uppnås genom att kringgå säkerhetsmekanismer av datorsystem anslutna till organisationens nätverk. Målet med datorsystemsäkerhet är att förhindra eller upptäcka hot; eller återhämta sig från eventuella attacker. Trots stora investeringar i IT-säkerhet infrastruktur och informationssäkerhet, över 95 % av banker, sjukhus och myndigheter har minst 10 skadliga infektioner kringgå befintliga säkerhetsmekanismer och träda in i sitt nätverk utan att upptäckas. Detta har lett till förlust av värdefulla informationer och stora summor av pengar från banker och andra organisationer över hela världen. Från tidigare forskning inom detta område, har det visat sig att anledningen till att säkerhetsmekanismer misslyckas beror ofta på att den används på ett felaktigt sätt eller används inte alls. I synnerhet menar de flesta användare att säkerhetsmekanismer på sina datorer är alltför komplicerat. Därför har tidigare forskning fokuserat på att göra datorsystemsäkerhet användbar så att den är "mindre komplicerat" för alla typer av användare, i stället för att designa datorer som både är användbara och säkra. Problemet med detta traditionella synsätt är att säkerheten behandlas som ett "tillägg" till en färdig datorsystemdesign. Denna studie är ett försök att ändra det traditionella synsättet genom att justera två faser av en datorsystemdesign modell för att integrera insamlingen av användbarhets- samt säkerhetskrav. Styrd av den explorativ fallstudie forskningsdesignen, fick jag nya insikter i en situation som har gäckat säkerhetsspecialister och organisatoriska aktörer. Denna studie resulterade i skapande av en designmetodik för användbara och säkra datorsystem. Även om denna metod är ännu i sin rudimentära fas, testades den med hjälp av en webbenkät. Data från litteraturstudien sorterades med hjälp av en syntesmatris; och analyserades med kvalitativ innehållsanalys. Några framstående design- och säkerhetsmodeller samt metoder som diskuterades i denna uppsats inkludera Användarcentrerad System Design (UCSD), Ändamålsenligt och Effektivt Vägledning för Informationssäkerhet (AEGIS) och Octave Allegro.
Karlsson, Ann Johansson Susanne. "Den perfekta informationsspridaren? : en komparativ studie av tre organisationers intranätanvändning = [The perfect way to spread information?] : [a comparative study of the use of intranet in three organizations] /". Borås : Högsk. i Borås, Bibliotekshögskolan/Biblioteks- och informationsvetenskap, 2004. http://www.hb.se/bhs/slutversioner/2004/04-08.pdf.
Pełny tekst źródłaCapser, Shawn Patrick Capser. "Assessing the Value of Information for ComparingMultiple, Dependent Design Alternatives". University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1520689318651851.
Pełny tekst źródłaÖberg, Viktor. "EVOLUTIONARY AI IN BOARD GAMES : An evaluation of the performance of an evolutionary algorithm in two perfect information board games with low branching factor". Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-11175.
Pełny tekst źródłaArjonilla, Jérôme. "Sampling-Based Search Algorithms in Games". Electronic Thesis or Diss., Université Paris sciences et lettres, 2024. http://www.theses.fr/2024UPSLD031.
Pełny tekst źródłaAlgorithm research in the context of games is a highly active field. Games are a prime application domain for search algorithms because they allow for the modeling and efficient resolution of complex problems. Many algorithms were first developed for games before being extended to other domains. In this thesis, we focus on heuristic search algorithms in the context of games, particularly heuristic search algorithms based on sampling, such as Monte Carlo Tree Search (MCTS) in perfect information, and based on determinization in imperfect information. We also explore the integration of search algorithms with other types of algorithms, especially reinforcement learning algorithms. We present existing methods as well as several original contributions in this field. The first part of the thesis is dedicated to the study of domain-independent heuristic search algorithms, making them easily testable and applicable in various contexts. Specifically, we focus on games with imperfect information, where players do not know all the details about the game state. In these types of algorithms and games, certain problems arise with existing methods, particularly issues related to strategy fusion and the impact of information revelation. We will discuss these problems in detail and present two original methods to address them. The second part of the thesis explores domain-dependent heuristic search algorithms. Domain-dependent algorithms are often more efficient than domain-independent ones because they can learn, generalize, and adapt to a specific domain. Throughout this part, we investigate the integration of heuristic search algorithms with other types of algorithms, particularly reinforcement learning algorithms. We present an original contribution in this area and another contribution that is currently under development. The first method proposes to enhance search algorithms by integrating reinforcement learning algorithms based on the guiding principle. The second method aims to incorporate model-based methods into searches in imperfect information settings
Corazza, Federico Augusto. "Analysis of graph-based quantum error-correcting codes". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/23801/.
Pełny tekst źródłaLinnusaar, Marcus. "GDPR : Jakten på den "perfekta" lösningen". Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18943.
Pełny tekst źródłaKline, Jeffrey Jude. "Perfect recall and the informational contents of strategies in extensive games". Diss., Virginia Tech, 1994. http://hdl.handle.net/10919/38656.
Pełny tekst źródłaPh. D.
GENUZIO, MARCO. "ENGINEERING COMPRESSED STATIC FUNCTIONS AND MINIMAL PERFECT HASH FUNCTIONS". Doctoral thesis, Università degli Studi di Milano, 2018. http://hdl.handle.net/2434/547316.
Pełny tekst źródłaKalogrias, Christos. "Performance analysis of the IEEE 802.11A WLAN standard optimum and sub-optimum receiver in frequency-selective, slowly fading Nakagami channels with AWGN and pulsed noise jamming". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FKalogrias.pdf.
Pełny tekst źródłaThesis advisor(s): Clark Robertson. Includes bibliographical references (p. 143). Also available online.
Phuong, Tran Thi Thanh. "Application of economic analysis to evaluate various infectious diseases in Vietnam". Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:2452971c-e5eb-4661-8675-d76f0eca9774.
Pełny tekst źródłaVeronese, Leonardo <1995>. "Practical non-perfect fuzzy rainbow trade-off: reference design for fast FPGA and SSD implementation". Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/18642.
Pełny tekst źródłaHàn, Hiêp. "Extremal hypergraph theory and algorithmic regularity lemma for sparse graphs". Doctoral thesis, Humboldt-Universität zu Berlin, Mathematisch-Naturwissenschaftliche Fakultät II, 2011. http://dx.doi.org/10.18452/16402.
Pełny tekst źródłaOnce invented as an auxiliary lemma for Szemerédi''s Theorem the regularity lemma has become one of the most powerful tools in graph theory in the last three decades which has been widely applied in several fields of mathematics and theoretical computer science. Roughly speaking the lemma asserts that dense graphs can be approximated by a constant number of bipartite quasi-random graphs, thus, it narrows the gap between deterministic and random graphs. Since the latter are much easier to handle this information is often very useful. With the regularity lemma as the starting point two roads diverge in this thesis aiming at applications of the concept of regularity on the one hand and clarification of several aspects of this concept on the other. In the first part we deal with questions from extremal hypergraph theory and foremost we will use a generalised version of Szemerédi''s regularity lemma for uniform hypergraphs to prove asymptotically sharp bounds on the minimum degree which ensure the existence of Hamilton cycles in uniform hypergraphs. Moreover, we derive (asymptotically sharp) bounds on minimum degrees of uniform hypergraphs which guarantee the appearance of perfect and nearly perfect matchings. In the second part a novel notion of regularity will be introduced which generalises Szemerédi''s original concept. Concerning this new concept we provide a polynomial time algorithm which computes a regular partition for given graphs without too dense induced subgraphs. As an application we show that for the above mentioned class of graphs the problem MAX-CUT can be approximated within a multiplicative factor of (1+o(1)) in polynomial time. Furthermore, pursuing the line of research of Chung, Graham and Wilson on quasi-random graphs we study the notion of quasi-randomness resulting from the new notion of regularity and concerning this we provide a characterisation in terms of eigenvalue separation of the normalised Laplacian matrix.
Johansson, Susanne, i Ann Karlsson. "Den perfekta informationsspridaren? En komparativ studie av tre organisationers intranätanvändning". Thesis, Högskolan i Borås, Institutionen Biblioteks- och informationsvetenskap / Bibliotekshögskolan, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-16352.
Pełny tekst źródłaUppsatsnivå: D
Nordholm, Miranda. "Instagrams filter - Jakten efter den perfekta bilden : En studie om hur redigering av en bild kan påverka attityd till ett motiv". Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Datateknik och informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-41054.
Pełny tekst źródłaSyfte – Syftet med examensarbetet är att undersöka om det finns någon redigeringskombination i form av olika filter som är utgivna i Instagramappen som märkbart står ut jämfört med de andra i form av någon typ av positiv eller negativ respons. Metod – För att uppnå svar på frågeställningen har studien eftersträvat att kunna förankra så många teorier som möjligt i vetenskapligt material. Metoden ”små-N-studie” kommer i denna studie att tillämpas vid insamlandet av information kring de olika filter som Instagram-appen tillåter användaren att välja mellan. En kvantitativ enkätundersökning genomförs i ett försök att få fram en statistik på hur filterna kan rangordnas från mest populär till minst populär. För att ytterligare validera svaren på enkätundersökningen och få fram svar på delfrågorna 1.1 och 1.2 genomförs tre intervjuer. Intervjuerna genomförs för att kunna ge en djupare insikt och mer svarsutrymme för intervjupersonerna. Resultat – Denna studie har kommit fram till att en kombination av: måttligt färgstark, normal kontrast, medel opacitet, neutral färgton, blå färg och medel ljusstyrka är bra variabler för att skapa ett bra filter. Mycket matta och svaga färger, mycket låg kontrast, svart-vitt (neutrala färger), kalla färgtoner, ljust ljushetsstyrka och hög opacitet på filtret är kvalitéer för ett filter som får mycket negativ respons. Det populäraste filtret av alla 23 i Instagramappen är Clarendon, medan det filter med mest negativ respons är Hefe. Implikationer – En risk med att arbeta deduktivt kan vara att de befintliga teorier som redan finns kring ämnet och som forskaren utgår ifrån kommer att rikta studiens resultat. Vid tillämpandet av metoden ”små-N-studie” finns risken att det är svårt att vara tillräckligt nyanserad i insamlandet av variabler och att studien därmed inte blir tillräckligt omfattande för att besvara frågeställningarna. Vid genomförandet av enkätundersökning finns alltid risken att frågorna är för ledande, inte tillräckligt ingående, att testpersonen inte förstår, tolkar på fel sätt eller inte orkar sätta sig in i ämnet för att svara tillräckligt sanningsenligt på enkäten. Vid genomförande av intervju finns risken att intervjupersonerna inte är tillräckligt insatta i ämnet, att de inte kan svara utförligt eller ärligt på frågorna. Begränsningar – Studien är begränsad till de resurser som finns tillgängliga i mån av tid. De försökspersoner som deltagit i intervjuer och enkätundersökning är begränsade till de dem författaren kunnat nå ut till precis som den teori som finns hittad om ämnet är begränsad efter den förmåga författaren har att söka och sålla igenom information, samt språkkunnighet och den data som finns publicerad på bibliotek och databaser. Studiens resultat är begränsad till de medel som använts för de objekt som undersökts. Nyckelord – Färglära, Sociala medier, Instagram, Filter, Bildredigering
Reis, Luís Henrique Vecchio. "The capital structure of portuguese firms within a crisis". Master's thesis, Instituto Superior de Economia e Gestão, 2011. http://hdl.handle.net/10400.5/4565.
Pełny tekst źródłaIn this study we review the theoretical approach behind the capital structure decisions by presenting the ideas of the Modigliani and Miller (1958) Theorem that was based on the perfect capital markets world and with the argument of the law of one price. We show that there are two useful theories in the firm’s financing decision: the Trade‐off theory, which builds on Modigliani and Miller’s original arguments and identifies several relevant factors in determining a firm’s capital structure (such as taxes, costs of financial distress, and agency costs and benefits of debt), and the Pecking Order Theory of Myers and Majluf (1984). Further in this study we describe the evolution of the capital structure of the 16 largest listed non‐financial Portuguese firms (“PSI‐16”) during the recent crisis peaking in 2008. We present a description of the level debt (and net debt) compared to the book value and to the market value of the equity of such firms (debt to equity ratio). We find some evidence consistent with both theories. In particular we find a cautious utilization of debt due to higher risk of bankruptcy (and its costs), but still taking advantage of the interest tax shield (consistent with the trade‐off theory view), and an increase in retained earnings and absence of new issues (consistent with the pecking order theory). We explain that the firms’ financing decision can depend of several factors pointed by the Trade‐off Theory, such as tax advantages of using debt, agency costs and benefits of debt, and costs associated with financial distress. Yet, in times of crisis firms may prefer to use internal rather than external financing mainly because of asymmetry of information.
No presente estudo, fazemos uma revisão da literatura em relação às decisões de estrutura de capital através da apresentação do Teorema de Modigliani e Miller (1958), sendo este baseado num mercado de capitais perfeito com o argumento assente na Lei do Preço Único. Mostramos que existem duas teorias úteis para a decisão de financiamento de uma empresa: a Trade‐off Theory, que está assente sobre os argumentos originais de Modigliani e Miller e identifica vários factores relevantes na determinação da estrutura de capital de uma empresa (como os impostos, os custos de financial distress, custos de agência e benefícios do uso de dívida); e a Pecking Order Theory de Myers e Majluf (1984). Mais além neste estudo, descrevemos a evolução da estrutura de capital das 16 maiores empresas cotadas portuguesas não financeiras (“PSI‐ 16”) durante a recente crise que teve o seu pico em 2008. Apresentamos uma descrição do nível de dívida (e dívida líquida) comparada com o valor contabilístico e o valor de mercado das empresas (rácio debt to equity). Pudemos encontrar alguma evidência consistente com ambas as teorias. Por um lado, as empresas mostram uma certa cautela na utilização de dívida devido ao aumento do risco de falência (e os seus custos), mas ainda tirando vantagem do interest tax shield (consistente com a visão da Trade‐off Theory). Por outro lado, verificamos um aumento dos lucros retidos e nenhuma nova emissão (consistente com a Pecking Order Theory). Concluímos que as decisões de financiamento de uma empresa dependerão de diversos factores apontados pela Tradeoff Theory, como as vantagens fiscais na utilização de dívida, custos de agência e benefícios do uso de dívida, e custos associados com financial distress. Ainda, em tempos de crise as empresas podem preferir usar financiamento interno no lugar de externo, principalmente devido à assimetria de informação.
Järvelä, Andreas, i Sebastian Lindmark. "Evaluation and comparison of a RabbitMQ broker solution on Amazon Web Services and Microsoft Azure". Thesis, Linköpings universitet, Programvara och system, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158242.
Pełny tekst źródłaFedele, Dante. "Naissance de la diplomatie moderne. L'ambassadeur au croisement du droit, de l'éthique et de la politique". Thesis, Lyon, École normale supérieure, 2014. http://www.theses.fr/2014ENSL0968.
Pełny tekst źródłaUsing a collection of texts commonly known as the “treatises on the ambassador”, this research examines the birth and the development of the experience of diplomacy from the 13th to the 17th Century. It aims, in particular, to explore the development of the figure of the ambassador within a field of problematization involving ethics, politics and law.After some methodological and historical remarks, the thesis deals with the development of the status of the ambassador from two perspectives, the legal and the professional. Regarding his legal status, the medieval legal conceptualisation of the role of the ambassador as a genuine public “office”, and that of the diplomatic function as “representation”, are examined. The way in which these conceptualisations help to define the negotiating powers conferred on the ambassador, his immunities and the honours to which he is entitled is then considered. This analysis allows for an investigation of the complex links between the exercise of diplomacy and claims to sovereignty during Europe’s transition from the Middle Ages to Modernity. Regarding his professional status, the thesis reconstructs the functions of the ambassador (particularly in relation to information gathering and negotiation), the means provided for the ambassador to undertake his functions (his salary and the assignment of an escort) and the objective, intellectual or moral qualities required of him. As well as illustrating the techniques which have been required for ambassadorial success since the 15th Century, this analysis offers some hints for studying the professionalization of public officials and the emergence of the modern criteria of political analysis
Subhadarshini(, Sonalin. "An Identity Based Key Exchange Scheme with Perfect Forward Security". Thesis, 2015. http://ethesis.nitrkl.ac.in/7374/1/2015_BT_Sonalin_111CS0446.pdf.
Pełny tekst źródła"Intelligent strategy for two-person non-random perfect information zero-sum game". 2003. http://library.cuhk.edu.hk/record=b5891609.
Pełny tekst źródłaThesis submitted in: December 2002.
Thesis (M.Phil.)--Chinese University of Hong Kong, 2003.
Includes bibliographical references (leaves 77-[80]).
Abstracts in English and Chinese.
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- An Overview --- p.1
Chapter 1.2 --- Tree Search --- p.2
Chapter 1.2.1 --- Minimax Algorithm --- p.2
Chapter 1.2.2 --- The Alpha-Beta Algorithm --- p.4
Chapter 1.2.3 --- Alpha-Beta Enhancements --- p.5
Chapter 1.2.4 --- Selective Search --- p.9
Chapter 1.3 --- Construction of Evaluation Function --- p.16
Chapter 1.4 --- Contribution of the Thesis --- p.17
Chapter 1.5 --- Structure of the Thesis --- p.19
Chapter 2 --- The Probabilistic Forward Pruning Framework --- p.20
Chapter 2.1 --- Introduction --- p.20
Chapter 2.2 --- The Generalized Probabilistic Forward Cuts Heuristic --- p.21
Chapter 2.3 --- The GPC Framework --- p.24
Chapter 2.3.1 --- The Alpha-Beta Algorithm --- p.24
Chapter 2.3.2 --- The NegaScout Algorithm --- p.25
Chapter 2.3.3 --- The Memory-enhanced Test Algorithm --- p.27
Chapter 2.4 --- Summary --- p.27
Chapter 3 --- The Fast Probabilistic Forward Pruning Framework --- p.30
Chapter 3.1 --- Introduction --- p.30
Chapter 3.2 --- The Fast GPC Heuristic --- p.30
Chapter 3.2.1 --- The Alpha-Beta algorithm --- p.32
Chapter 3.2.2 --- The NegaScout algorithm --- p.32
Chapter 3.2.3 --- The Memory-enhanced Test algorithm --- p.35
Chapter 3.3 --- Performance Evaluation --- p.35
Chapter 3.3.1 --- Determination of the Parameters --- p.35
Chapter 3.3.2 --- Result of Experiments --- p.38
Chapter 3.4 --- Summary --- p.42
Chapter 4 --- The Node-Cutting Heuristic --- p.43
Chapter 4.1 --- Introduction --- p.43
Chapter 4.2 --- Move Ordering --- p.43
Chapter 4.2.1 --- Quality of Move Ordering --- p.44
Chapter 4.3 --- Node-Cutting Heuristic --- p.46
Chapter 4.4 --- Performance Evaluation --- p.48
Chapter 4.4.1 --- Determination of the Parameters --- p.48
Chapter 4.4.2 --- Result of Experiments --- p.50
Chapter 4.5 --- Summary --- p.55
Chapter 5 --- The Integrated Strategy --- p.56
Chapter 5.1 --- Introduction --- p.56
Chapter 5.2 --- "Combination of GPC, FGPC and Node-Cutting Heuristic" --- p.56
Chapter 5.3 --- Performance Evaluation --- p.58
Chapter 5.4 --- Summary --- p.63
Chapter 6 --- Conclusions and Future Works --- p.64
Chapter 6.1 --- Conclusions --- p.64
Chapter 6.2 --- Future Works --- p.65
Chapter A --- Examples --- p.67
Chapter B --- The Rules of Chinese Checkers --- p.73
Chapter C --- Application to Chinese Checkers --- p.75
Bibliography --- p.77
Hsueh, Chu-Hsuan, i 薛筑軒. "On Strength Analyses of Computer Programs for Stochastic Games with Perfect Information". Thesis, 2019. http://ndltd.ncl.edu.tw/handle/ku48z7.
Pełny tekst źródła國立交通大學
資訊科學與工程研究所
107
The field of computer games is important to the researches in artificial intelligence. According to two different roles of the elements of chance involved, games can be classified as deterministic vs. stochastic and perfect information vs. imperfect information. Since many real-world problems involve uncertainty, stochastic games and imperfect information games are worthy to study. This thesis targets at stochastic games with perfect information since the games in this category is easier to model than imperfect information games. Chinese dark chess (CDC) and a reduced and solved variant, 2×4 CDC, are two games of this category which this thesis mainly focuses on. This thesis first enhances a game-playing program for CDC based on Monte-Carlo tree search (MCTS) by several existing techniques that combine additional knowledge. The additional knowledge is manually designed, and is incorporated into four techniques including early playout terminations, implicit minimax backups, quality-based rewards, and progressive bias. By combining all, the win rate is 84.75% (±1.90%) against the original program. In addition, this thesis investigates three strength analysis metrics on 2×4 CDC, including win rates playing against other players, prediction rates to expert actions, and mean squared errors to values of positions. Experiments show that win rates are indeed good indicators of programs’ strengths. The other two metrics are also good indicators, though not as good as win rates. Another analysis performed on 2×4 CDC is applying the AlphaZero algorithm, which is a kind of reinforcement learning algorithm achieved superhuman levels of plays in chess, shogi, and Go. Experiments show that the algorithm can learn the theoretical values and optimal plays even in stochastic games. Finally, this thesis studies two more stochastic games with perfect information, which are EinStein Würfelt Nicht! (EWN) and 2048-like games. Another kind of reinforcement learning algorithm, temporal difference learning, is applied to EWN and 2048-like games. For EWN, a program combining three techniques using the learned knowledge, including progressive bias, prior knowledge, and epsilon-greedy playouts, has a win rate of 62.25% (±2.12%) against the original program. For 2048-like games, a multistage variant of temporal difference learning improves the learned knowledge.
Montazeri, Zarrin. "Achieving Perfect Location Privacy in Wireless Devices Using Anonymization". 2017. https://scholarworks.umass.edu/masters_theses_2/478.
Pełny tekst źródłaLin, Yi-Mu. "Simultaneous Bandwidth Allocation Design for Traffic Signal Timing Plans in Urban Grid Traffic Networks under Perfect Traffic Information". 2006. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2707200616441500.
Pełny tekst źródłaLin, Yi-Mu, i 林沂穆. "Simultaneous Bandwidth Allocation Design for Traffic Signal Timing Plans in Urban Grid Traffic Networks under Perfect Traffic Information". Thesis, 2006. http://ndltd.ncl.edu.tw/handle/70432513344242572682.
Pełny tekst źródła國立臺灣大學
電機工程學研究所
94
In the past, traffic signal control strategies always use the traffic patterns gathered as inputs to formulate their traffic signal timing plans. As Intelligent Transportation Systems (ITS) develop, travelers’ information may be collected through modern communication technology, and thus the types of traffic information are changed. To improve the efficient use of the possible advanced traffic information, a new real-time traffic signal control scheme, the simultaneous bandwidth allocation (SBA) design, is proposed. A future scenario with perfect traffic information for both the traffic signal controller and travelers are considered. The design of simultaneous bandwidth allocation takes the queuing vehicles at each intersection of the street as inputs, and tries to maximize the utility of the given bandwidth on a local urban grid network. Several system performance indexes (PI) are also presented to examine the performance of the bandwidth selection. The bandwidth selecting problem occurring in SBA is solved by different PI-based bandwidth selecting mechanisms. To test the feasibility of the dynamic SBA design, a simple flow changing algorithm is used to illustrate the performance of the proposed bandwidth selecting strategies. By applying different total flow rate conditions, it is found that the results of these bandwidth selecting approaches are the same once the flow rate equals or exceeds the dispersing rate of queuing vehicles. In addition, the dynamic SBA has its best performance on PIs when the incoming flow rate is equal to the dispersing rate.
Pinmanee, Saichon. "Logistics Integration for Improving Distribution Performance: in the Context of Thai Egg Industry". Thesis, 2016. https://vuir.vu.edu.au/30149/.
Pełny tekst źródłaMartirosyan, Sosina [Verfasser]. "Perfect hash families, identifiable parent property codes and covering arrays / vorgelegt von Sosina Martirosyan". 2003. http://d-nb.info/970934955/34.
Pełny tekst źródłaBossé, Éric-Olivier. "Transfert d'information quantique et intrication sur réseaux photoniques". Thèse, 2017. http://hdl.handle.net/1866/20307.
Pełny tekst źródła