Continuous Variable

Data

Colleen McCue , in Data Mining and Predictive Analysis, 2007

5.3 Data 2

Continuous variables can take on an unlimited number of values between the lowest and highest points of measurement. Continuous variables include such things as speed and distance. Continuous data are very desirable in inferential statistics; however, they tend to be less useful in data mining and are frequently recoded into discrete data or sets, which are described next.

Discrete data are associated with a limited number of possible values. Gender or rank are examples of discrete variables because there are a limited number of mutually exclusive options. Binary data are a type of discrete data that encompass information that is confined to two possible options (e.g., male or female; yes or no). Discrete and binary data also are called sets and flag data, respectively.

Understanding the different types of data and their definitions is important because some types of analyses have been designed for particular types of data and may be inappropriate for another type of information. The good news is that the types of information most prevalent in law enforcement and intelligence, sets and flag data, tend to be the most desirable for data mining. With traditional, inferential statistics methodologies, on the other hand, discrete variables are disadvantageous because statistical power is compromised with this type of categorical data. In other words, a bigger difference between the groups of interest is needed to achieve a statistically significant result.

We also can speak of data in terms of how they are measured. Ratio scales are numeric and are associated with a true zero—meaning that nothing can be measured. For example, weight is a ratio scale. A weight of zero corresponds to the absence of any weight. With an interval scale, measurements between points have meaning, although there is no true zero. For example, although there is no true zero associated with the Fahrenheit temperature scale, the difference between 110 and 120 degrees Fahrenheit is the same as the difference between 180 and 190 degrees: 10 degrees. Ordinal scales imply some ranking in the information. Though the data might not correspond to actual numeric figures, there is some implied ranking. Sergeant, lieutenant, major, and colonel represents an ordinal scale. Lieutenant is ranked higher than sergeant, and major is ranked higher than lieutenant. Although they do not correspond directly to any type of numeric values, it is understood that there is a rank ordering of these categories. Finally, nominal scales really are not true scales because they are not associated with any sort of measurable dimension or ranking; the particular designations, even if numeric, do not correspond to quantifiable features. An example of this type of data is any type of categorical data, such as vehicle make or numeric patrol unit designations.

Finally, unformatted or text data truly are unique. Until recently, it was very difficult to analyze this type of information because the analytical tools necessary were extremely sophisticated and not generally available. Frequently, text data were recoded and categorized into some type of discrete variables. Recent advancements in computational techniques, however, have opened the door to analyzing these data in their native form. By using techniques such as natural language processing, syntax and language can be analyzed intact, a process that extends well beyond crude keyword searches.

Read full chapter

URL:

https://www.sciencedirect.com/science/article/pii/B9780750677967500271

27th European Symposium on Computer Aided Process Engineering

Pedro C. Pautasso , ... Diego C. Cafaro , in Computer Aided Chemical Engineering, 2017

2.2 Controlling inventory level in charging tanks

Continuous variables I m i k and I m i m denote the inventory levels in the charging tank m at the completion time of operations ik and im, respectively. They are derived from the difference of accumulated loading ( L m i k , L m i m ) and unloading ( U m i k , U m i m ) amounts plus the parameter i i m o m , representing the initial inventory of crude mix in the charging tank m. The value of I m i k must never exceed the capacity of the charging tank m (capmm ). In turn, I m i m can never be lower than the minimum allowed inventory of crude mix in the charging tank m (invmm ).

(8) I m i k = i i m m o + L m i k U m i k cap m m i k I K new , m M

(9) I m i m = i i m m o + L m i m U m i m i n v m m i m I M , m M

A similar approach is used for tracking component contents both in storage and charging tanks at every time event. The model also includes binary variables to: (a) assign batches of crude mix to storage and charging tanks {WKik,k , WMim,m }; and (b) assign a destination for every existing batch {YViv,k , YPik,m , YMim,t }. Eqs. (10) and (11) state that at most one batch can be sent from the pipeline to a single charging tank during a lot injection. Moreover, only one storage tank can supply material during a single pipeline injection.

(10) i k I K i k < i k X P i k , i k 1 i k I K new

(11) i k I K i k < i k X P i k , i k = m M Y P i k , m = k K W K i k , k i k I K new

Read full chapter

URL:

https://www.sciencedirect.com/science/article/pii/B9780444639653502221

A Survey of Quantum Key Distribution (QKD) Technologies

Jeffrey D. Morris , ... Gerald Baumgartner , in Emerging Trends in ICT Security, 2014

Continuous variable QKD: short-ranged but fast and secure

The first Continuous Variable QKD (CV-QKD) system debuted in the European SEcure COmmunication based on Quantum Cryptography (SECOQC) network, with the prototype built expressly for the project. Timothy Ralph first described the CV-QKD protocol in 1999, with several variations proposed by Cerf, Assche, Lutkenhaus, and Grosshans. These protocols use squeezed Gaussian states of light that have classical intensity levels to carry information, rather than discrete single photon states [17–20].

This system encodes information in the amplitude and phase of the classical light level beam and produces high rates of key generation over a short distance (such as a metropolitan network), as it is not as sensitive to individual photon loss as the discrete-variable protocols. Originally, it was not suitable over long distances because the higher noise ratios in longer fibers created errors in the quadratures of pulses, interfering in the homodyne detection, but improvements in post-processing have increased the transmission range. The protocol is resistant against general and collective eavesdropping attacks, and has a security proof for coherent attacks as well. These security proofs show it is more secure than some other types of QKD systems against attacks that exploit the non-ideal hardware flaws of QKD systems [21].

Read full chapter

URL:

https://www.sciencedirect.com/science/article/pii/B9780124114746000098

29th European Symposium on Computer Aided Process Engineering

Nikolaos Rakovitis , ... Nan Zhang , in Computer Aided Chemical Engineering, 2019

3.1 Different tasks in different units

We define continuous variables bc i, i′, s, n as material s produced from task i consumed by task i′ at event n. Thus, the material consumed should not exceed total available materials.

(1) j i I s C , i I j ρ s , i n n n + Δn b i , j , n , n ST s , n 1 + i I s P i I s C bc i , i , s , n s S IN , n

The amount of materials from i to i′ (i.e., bc i, i′, s, n ) should not exceed the production amount of task i or consumption amount of task i.

(2) i I s C bc i , i , s , n ρ s , i n Δn n n b i , j , n , n s S IN , i I s P , i I Re , j , n

(3) i I s P bc i , i , s , n ρ s , i n n n + Δn b i , j , n , n s S IN , i I s C , j , n

(4) bc i , i , s , n z j , i , s , n ρ s , i B i , j max s S IN , i I s P , i I j , i I s C , i I j , j , j , j j , n

(5) T s , j , n Tf j , n M 1 i I s P , i I j n Δn n n w i , j , n , n s S IN , j , n

(6) T s , j , n Ts j , n + M 2 i I s C , i I j n n n + Δn w i , j , n , n z j , j , s , n s S IN j , j , i I j , i I s P , i I Re , n

An active consumption task i′ should be processed in a unit after the time that state s is available at the previous event n.

(7) T s , j , n Tf j , n + 1 + M 1 i I s C , i I j n + 1 n n + 1 + Δn w i , j , n + 1 , n s S IN j , j , i I s P , i I j , i I Re , n < N

Read full chapter

URL:

https://www.sciencedirect.com/science/article/pii/B9780128186343502320

Personality Development in Adulthood

L.L. Carstensen , in International Encyclopedia of the Social & Behavioral Sciences, 2001

4 The Trait Approach to Adult Personality Development

Traits are continuous variables represented by broadly encompassing lexical terms that account for individual differences (John 1990). Traits—such as shy, lively, outgoing, anxious, and intelligent—are conceptualized as predispositions within individuals to behave in certain ways manifest across a wide variety of situations. Gordon Allport (see Allport, Gordon W (1897–1967) ) argued that cardinal traits are those around which a person organizes life (self-sacrifice). Central traits (e.g., honesty) represent major features and secondary traits are specific traits that help to predict behavior more than underlying personality (e.g., dress type, food preferences). Allport's definition is compatible with modern trait and temperament approaches to personality which attempt to describe people in terms of one or more central features of the person.

Personality psychologists in the trait tradition seek to identify the traits along which people differ and to explore the degree to which these traits predict behavior. Many taxonomies of traits have been offered over the years, but unquestionably the five-factor model is most widely accepted today (see also Personality Structure ). Based on factor analysis of self-descriptions, the five traits that emerge reliably across many studies of Europeans and Americans are: (a) openness to experience, (b) conscientiousness, (c) extraversion, (d) agreeableness, and (e) neuroticism.

Traits and temperaments appear to be relatively stable through the second half of life (Costa and McRae 1990). It appears that beyond the age of 30, extraverts remain extraverts and neurotics remain neurotics. Trait theorists have found reliable evidence for stability in personality well into old age. This finding emerges whether researchers ask individuals to describe themselves repeatedly over time or, alternatively, ask significant others, like spouses, to describe those same individuals repeatedly (Costa and McRae 1990). It should be noted that even though persistent rank-order differences remain the same, there is some recent evidence that modest mean level changes may appear, with older adults scoring slightly higher than younger adults on agreeableness and conscientiousness and slightly lower on neuroticism, extraversion, and openness to experience (McCrae et al. 1999). Importantly, similar findings come from studies sampling Asian and European populations. However, identified changes are quite small. Overall, there is remarkable consistency in the characteristics that distinguish individuals from one another over time. There is some evidence that the core set of traits that differentiate people are genetically based and exert their influence throughout the life course (Gatz 1992). Genetic influence is as strong in old age as early adulthood.

In summary, researchers adopting a trait approach to personality development find that along at least some of the important dimensions of personality, there is little change in personality well into old age. Critics of a trait approach, however, argue that traits communicate little about how people manage their lives in day-to-day life and because of the broadband focus exaggerate the consistency of behavior across time and situations. They criticize the trait approach for failing to better predict behavior and redirect focus to specific strategies (e.g., how an individual cognitively appraises a situation; expectancies, subjective values, self-regulatory systems, and competencies). Life-span approaches—influenced strongly by the social cognitive theory of personality (Bandura 1989)—view individuals as agentic creatures who shape their own environments (see also Interactionism and Personality ; Self-regulation in Adulthood ).

Read full chapter

URL:

https://www.sciencedirect.com/science/article/pii/B0080430767017630

24th European Symposium on Computer Aided Process Engineering

Dajun Yue , Fengqi You , in Computer Aided Chemical Engineering, 2014

2 Mixed-integer linear fractional program

An MILFP includes both continuous and discrete variables. All the constraints of an MILFP are linear, and the objective function is expressed as the ratio of two linear functions. Mathematically, a general MILFP can be formulated as the following problem (P0):

(P0)

(1) max A 0 + i 1 A 1 i x i + j J A 2 j y j B 0 + i j B 1 i x i + j J B 2 j y j

s.t.

(2) C 0 k + i I C I i k x i + C 2 j k y j = 0 , k k

(3) x i 0 , i I a n d y j { 0 , 1 } , j J

where xi are continuous variables and yj are discrete variables. For problem (P0), it is assumed that the denominator B 0 + Σ i I B 1 i x i + Σ j J B 2 j y j > 0 for all feasible solutions and all inequalities are converted into equalities through the use of slack variables (Dinkelbach, 1967).

Read full chapter

URL:

https://www.sciencedirect.com/science/article/pii/B9780444634566501599

From Zero to One

Sarah L. Harris , David Money Harris , in Digital Design and Computer Architecture, 2016

1.6.2 Logic Levels

The mapping of a continuous variable onto a discrete binary variable is done by defining logic levels, as shown in Figure 1.23. The first gate is called the driver and the second gate is called the receiver. The output of the driver is connected to the input of the receiver. The driver produces a LOW (0) output in the range of 0 to VOL or a HIGH (1) output in the range of VOH to V dd · If the receiver gets an input in the range of 0 to VIL , it will consider the input to be LOW. If the receiver gets an input in the range of VIH to V dd , it will consider the input to be HIGH. If, for some reason such as noise or faulty components, the receiver's input should fall in the forbidden zone between VIL and VIH , the behavior of the gate is unpredictable. VOH ,VOL ,VIH , and V Il are called the output and input high and low logic levels.

Figure 1.23. Logic levels and noise margins

Read full chapter

URL:

https://www.sciencedirect.com/science/article/pii/B9780128000564000017

From Zero to One

Sarah L. Harris , David Harris , in Digital Design and Computer Architecture, 2022

1.6.2 Logic Levels

The mapping of a continuous variable onto a discrete binary variable is done by defining logic levels, as shown in Figure 1.23. The first gate is called the driver and the second gate is called the receiver. The output of the driver is connected to the input of the receiver. The driver produces a LOW (0) output in the range of 0 to VOL or a HIGH (1) output in the range of VOH to VDD . If the receiver gets an input in the range of 0 to VIL , it will consider the input to be LOW. If the receiver gets an input in the range of VIH to VDD , it will consider the input to be HIGH. If, for some reason such as noise or faulty components, the receiver's input should fall in the forbidden zone between VIL and VIH , the behavior of the gate is unpredictable. VOH , VOL , VIH , and VIL are called the output and input high and low logic levels.

Figure 1.23. Logic levels and noise margins

Read full chapter

URL:

https://www.sciencedirect.com/science/article/pii/B9780128200643000015

Proceedings of the 9th International Conference on Foundations of Computer-Aided Process Design

Ana Somoza-Tornos , ... Moisés Graells , in Computer Aided Chemical Engineering, 2019

Demand satisfaction

Qout k is a continuous variable denoting the flowrate sent to satisfy demand k, and is calculated in Eq. (10) through the factor Y ik with range [0,1] (Eq. (11)). Equation (12) expresses the limits to be satisfies by Qout k .

(10) Qout k = Σ i Y ik Qtu i k

(11) Σ k Y ik = 1 i

(12) MinQout ¯ k Qout k MaxQout k ¯ k

Equations (13, 14) are the analogous definition and limit satisfaction constraint for the outlet concentration Cout kj .

(13) Cout kj = Σ i Y ik Cin ij Qin i / Σ i Y ik Qin i kj

(14) MinCout ¯ kj Cout kj MaxCout kj ¯ kj

a k is defined by Eqs. (15, 16) as a binary variable that takes a value of 1 if Qout k is greater than the demand D k .

(15) Qout k D k M 1 a k k

(16) D k Qout k M a k k

Read full chapter

URL:

https://www.sciencedirect.com/science/article/pii/B9780128185971500205

31st European Symposium on Computer Aided Process Engineering

Fernando D. Ramos , ... M. Soledad Diaz , in Computer Aided Chemical Engineering, 2021

3 Numerical Results

The MINLP model presented 5398 continuous variables and 13 binary variables and 5336 constraints and it was solved with DICOPT (CONOPT and CPLEX) (Grossmann et al., 2003). Besides, the energetic integration model possesses 1236 continuous variables, 339 binary variables and 1338 constraints. The heat integration reduced the number of cold and heat utilities ( Figure 2) which directly impacted on the environmental pillar of RePSIM. Before the heat integration, the process required 828 kW while after heat integration this value was 470 kW (43 % less). These results are in agreement with the published literature (Chong et al., 2020; Song et al., 2018), which mention a 32.1 % and a 42.8 % of energy reduction in a macroalgae waste biorefinery and a cellulosic bioethanol plant, respectively. In term of cost, this represented a 54 % of savings. As regard RePSIM environmental pillar, it showed an improvement of 14 %. Finally, it is worth noting that not only does heat integration improve economic aspects of a process, but it also improves the environmental one.

Figure 2

Figure 2. Heat exchanger network

Read full chapter

URL:

https://www.sciencedirect.com/science/article/pii/B9780323885065502448