WorldWideScience

Sample records for bounded model checking

  1. Behavioral Consistency of C and Verilog Programs Using Bounded Model Checking

    National Research Council Canada - National Science Library

    Clarke, Edmund; Kroening, Daniel; Yorav, Karen

    2003-01-01

    .... We describe experimental results on various reactive present an algorithm that checks behavioral consistency between an ANSI-C program and a circuit given in Verilog using Bounded Model Checking...

  2. Efficient Proof Engines for Bounded Model Checking of Hybrid Systems

    DEFF Research Database (Denmark)

    Fränzle, Martin; Herde, Christian

    2005-01-01

    In this paper we present HySat, a new bounded model checker for linear hybrid systems, incorporating a tight integration of a DPLL-based pseudo-Boolean SAT solver and a linear programming routine as core engine. In contrast to related tools like MathSAT, ICS, or CVC, our tool exploits all...

  3. Efficient Multi-Valued Bounded Model Checking for LTL over Quasi-Boolean Algebras

    OpenAIRE

    Andrade, Jefferson O.; Kameyama, Yukiyoshi

    2012-01-01

    Multi-valued Model Checking extends classical, two-valued model checking to multi-valued logic such as Quasi-Boolean logic. The added expressivity is useful in dealing with such concepts as incompleteness and uncertainty in target systems, while it comes with the cost of time and space. Chechik and others proposed an efficient reduction from multi-valued model checking problems to two-valued ones, but to the authors' knowledge, no study was done for multi-valued bounded model checking. In thi...

  4. Bounded Model Checking and Inductive Verification of Hybrid Discrete-Continuous Systems

    DEFF Research Database (Denmark)

    Becker, Bernd; Behle, Markus; Eisenbrand, Fritz

    2004-01-01

    We present a concept to signicantly advance the state of the art for bounded model checking (BMC) and inductive verication (IV) of hybrid discrete-continuous systems. Our approach combines the expertise of partners coming from dierent domains, like hybrid systems modeling and digital circuit veri...

  5. Local Model Checking of Weighted CTL with Upper-Bound Constraints

    DEFF Research Database (Denmark)

    Jensen, Jonas Finnemann; Larsen, Kim Guldstrand; Srba, Jiri

    2013-01-01

    We present a symbolic extension of dependency graphs by Liu and Smolka in order to model-check weighted Kripke structures against the logic CTL with upper-bound weight constraints. Our extension introduces a new type of edges into dependency graphs and lifts the computation of fixed-points from...

  6. Efficient Multi-Valued Bounded Model Checking for LTL over Quasi-Boolean Algebras

    Science.gov (United States)

    Andrade, Jefferson O.; Kameyama, Yukiyoshi

    Multi-valued Model Checking extends classical, two-valued model checking to multi-valued logic such as Quasi-Boolean logic. The added expressivity is useful in dealing with such concepts as incompleteness and uncertainty in target systems, while it comes with the cost of time and space. Chechik and others proposed an efficient reduction from multi-valued model checking problems to two-valued ones, but to the authors' knowledge, no study was done for multi-valued bounded model checking. In this paper, we propose a novel, efficient algorithm for multi-valued bounded model checking. A notable feature of our algorithm is that it is not based on reduction of multi-values into two-values; instead, it generates a single formula which represents multi-valuedness by a suitable encoding, and asks a standard SAT solver to check its satisfiability. Our experimental results show a significant improvement in the number of variables and clauses and also in execution time compared with the reduction-based one.

  7. An efficient algorithm for computing fixed length attractors based on bounded model checking in synchronous Boolean networks with biochemical applications.

    Science.gov (United States)

    Li, X Y; Yang, G W; Zheng, D S; Guo, W S; Hung, W N N

    2015-04-28

    Genetic regulatory networks are the key to understanding biochemical systems. One condition of the genetic regulatory network under different living environments can be modeled as a synchronous Boolean network. The attractors of these Boolean networks will help biologists to identify determinant and stable factors. Existing methods identify attractors based on a random initial state or the entire state simultaneously. They cannot identify the fixed length attractors directly. The complexity of including time increases exponentially with respect to the attractor number and length of attractors. This study used the bounded model checking to quickly locate fixed length attractors. Based on the SAT solver, we propose a new algorithm for efficiently computing the fixed length attractors, which is more suitable for large Boolean networks and numerous attractors' networks. After comparison using the tool BooleNet, empirical experiments involving biochemical systems demonstrated the feasibility and efficiency of our approach.

  8. Model Checking Feature Interactions

    DEFF Research Database (Denmark)

    Le Guilly, Thibaut; Olsen, Petur; Pedersen, Thomas

    2015-01-01

    This paper presents an offline approach to analyzing feature interactions in embedded systems. The approach consists of a systematic process to gather the necessary information about system components and their models. The model is first specified in terms of predicates, before being refined to t...... to timed automata. The consistency of the model is verified at different development stages, and the correct linkage between the predicates and their semantic model is checked. The approach is illustrated on a use case from home automation....

  9. Parallel Algorithms for Model Checking

    NARCIS (Netherlands)

    van de Pol, Jaco; Mousavi, Mohammad Reza; Sgall, Jiri

    2017-01-01

    Model checking is an automated verification procedure, which checks that a model of a system satisfies certain properties. These properties are typically expressed in some temporal logic, like LTL and CTL. Algorithms for LTL model checking (linear time logic) are based on automata theory and graph

  10. Compositional and Quantitative Model Checking

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand

    2010-01-01

    This paper gives a survey of a composition model checking methodology and its succesfull instantiation to the model checking of networks of finite-state, timed, hybrid and probabilistic systems with respect; to suitable quantitative versions of the modal mu-calculus [Koz82]. The method is based...

  11. Bounding species distribution models

    Directory of Open Access Journals (Sweden)

    Thomas J. STOHLGREN, Catherine S. JARNEVICH, Wayne E. ESAIAS,Jeffrey T. MORISETTE

    2011-10-01

    Full Text Available Species distribution models are increasing in popularity for mapping suitable habitat for species of management concern. Many investigators now recognize that extrapolations of these models with geographic information systems (GIS might be sensitive to the environmental bounds of the data used in their development, yet there is no recommended best practice for “clamping” model extrapolations. We relied on two commonly used modeling approaches: classification and regression tree (CART and maximum entropy (Maxent models, and we tested a simple alteration of the model extrapolations, bounding extrapolations to the maximum and minimum values of primary environmental predictors, to provide a more realistic map of suitable habitat of hybridized Africanized honey bees in the southwestern United States. Findings suggest that multiple models of bounding, and the most conservative bounding of species distribution models, like those presented here, should probably replace the unbounded or loosely bounded techniques currently used [Current Zoology 57 (5: 642–647, 2011].

  12. Bounding Species Distribution Models

    Science.gov (United States)

    Stohlgren, Thomas J.; Jarnevich, Cahterine S.; Morisette, Jeffrey T.; Esaias, Wayne E.

    2011-01-01

    Species distribution models are increasing in popularity for mapping suitable habitat for species of management concern. Many investigators now recognize that extrapolations of these models with geographic information systems (GIS) might be sensitive to the environmental bounds of the data used in their development, yet there is no recommended best practice for "clamping" model extrapolations. We relied on two commonly used modeling approaches: classification and regression tree (CART) and maximum entropy (Maxent) models, and we tested a simple alteration of the model extrapolations, bounding extrapolations to the maximum and minimum values of primary environmental predictors, to provide a more realistic map of suitable habitat of hybridized Africanized honey bees in the southwestern United States. Findings suggest that multiple models of bounding, and the most conservative bounding of species distribution models, like those presented here, should probably replace the unbounded or loosely bounded techniques currently used [Current Zoology 57 (5): 642-647, 2011].

  13. Model checking exact cost for attack scenarios

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi; Nielson, Flemming

    2017-01-01

    Attack trees constitute a powerful tool for modelling security threats. Many security analyses of attack trees can be seamlessly expressed as model checking of Markov Decision Processes obtained from the attack trees, thus reaping the benefits of a coherent framework and a mature tool support....... However, current model checking does not encompass the exact cost analysis of an attack, which is standard for attack trees. Our first contribution is the logic erPCTL with cost-related operators. The extended logic allows to analyse the probability of an event satisfying given cost bounds and to compute...... the exact cost of an event. Our second contribution is the model checking algorithm for erPCTL. Finally, we apply our framework to the analysis of attack trees....

  14. Model Checking Algorithms for CTMDPs

    DEFF Research Database (Denmark)

    Buchholz, Peter; Hahn, Ernst Moritz; Hermanns, Holger

    2011-01-01

    Continuous Stochastic Logic (CSL) can be interpreted over continuoustime Markov decision processes (CTMDPs) to specify quantitative properties of stochastic systems that allow some external control. Model checking CSL formulae over CTMDPs requires then the computation of optimal control strategie...

  15. Coverage Metrics for Model Checking

    Science.gov (United States)

    Penix, John; Visser, Willem; Norvig, Peter (Technical Monitor)

    2001-01-01

    When using model checking to verify programs in practice, it is not usually possible to achieve complete coverage of the system. In this position paper we describe ongoing research within the Automated Software Engineering group at NASA Ames on the use of test coverage metrics to measure partial coverage and provide heuristic guidance for program model checking. We are specifically interested in applying and developing coverage metrics for concurrent programs that might be used to support certification of next generation avionics software.

  16. Symbolic Dependency Graphs for PCTL Model-Checking

    DEFF Research Database (Denmark)

    Mariegaard, Anders; Larsen, Kim Guldstrand

    2017-01-01

    We consider the problem of model-checking a subset of probabilistic CTL, interpreted over (discrete-time) Markov reward models, allowing the specification of lower bounds on the probability of the set of paths satisfying a cost-bounded path formula. We first consider a reduction to fixed-point co......We consider the problem of model-checking a subset of probabilistic CTL, interpreted over (discrete-time) Markov reward models, allowing the specification of lower bounds on the probability of the set of paths satisfying a cost-bounded path formula. We first consider a reduction to fixed...

  17. Model Checking Markov Chains: Techniques and Tools

    NARCIS (Netherlands)

    Zapreev, I.S.

    2008-01-01

    This dissertation deals with four important aspects of model checking Markov chains: the development of efficient model-checking tools, the improvement of model-checking algorithms, the efficiency of the state-space reduction techniques, and the development of simulation-based model-checking

  18. Model Checking as Static Analysis

    DEFF Research Database (Denmark)

    Zhang, Fuyuan

    fairness problems can be encoded into ALFP as well. To deal with multi-valued model checking problems, we have proposed multivalued ALFP. A Moore Family result for multi-valued ALFP is also established, which ensures the existence and uniqueness of the least model. When the truth values in multi-valued...... of states satisfying a CTL formula can be characterized as the least model of ALFP clauses specifying this CTL formula. The existence of the least model of ALFP clauses is ensured by the Moore Family property of ALFP. Then, we take fairness assumptions in CTL into consideration and have shown that CTL...... ALFP constitute a nite distributive complete lattice, multi-valued ALFP can be reduced to two-valued ALFP. This result enables to implement a solver for multi-valued ALFP by reusing existing solvers for twovalued ALFP. Our ALFP-based technique developed for the two-valued CTL naturally generalizes...

  19. Model Checking Structured Infinite Markov Chains

    NARCIS (Netherlands)

    Remke, Anne Katharina Ingrid

    2008-01-01

    In the past probabilistic model checking hast mostly been restricted to finite state models. This thesis explores the possibilities of model checking with continuous stochastic logic (CSL) on infinite-state Markov chains. We present an in-depth treatment of model checking algorithms for two special

  20. Approximate Model Checking of PCTL Involving Unbounded Path Properties

    Science.gov (United States)

    Basu, Samik; Ghosh, Arka P.; He, Ru

    We study the problem of applying statistical methods for approximate model checking of probabilistic systems against properties encoded as PCTL formulas. Such approximate methods have been proposed primarily to deal with state-space explosion that makes the exact model checking by numerical methods practically infeasible for large systems. However, the existing statistical methods either consider a restricted subset of PCTL, specifically, the subset that can only express bounded until properties; or rely on user-specified finite bound on the sample path length. We propose a new method that does not have such restrictions and can be effectively used to reason about unbounded until properties. We approximate probabilistic characteristics of an unbounded until property by that of a bounded until property for a suitably chosen value of the bound. In essence, our method is a two-phase process: (a) the first phase is concerned with identifying the bound k 0; (b) the second phase computes the probability of satisfying the k 0-bounded until property as an estimate for the probability of satisfying the corresponding unbounded until property. In both phases, it is sufficient to verify bounded until properties which can be effectively done using existing statistical techniques. We prove the correctness of our technique and present its prototype implementations. We empirically show the practical applicability of our method by considering different case studies including a simple infinite-state model, and large finite-state models such as IPv4 zeroconf protocol and dining philosopher protocol modeled as Discrete Time Markov chains.

  1. Model Checking Real-Time Systems

    DEFF Research Database (Denmark)

    Bouyer, Patricia; Fahrenberg, Uli; Larsen, Kim Guldstrand

    2018-01-01

    This chapter surveys timed automata as a formalism for model checking real-time systems. We begin with introducing the model, as an extension of finite-state automata with real-valued variables for measuring time. We then present the main model-checking results in this framework, and give a hint...

  2. Model checking mobile ad hoc networks

    NARCIS (Netherlands)

    Ghassemi, Fatemeh; Fokkink, Wan

    2016-01-01

    Modeling arbitrary connectivity changes within mobile ad hoc networks (MANETs) makes application of automated formal verification challenging. We use constrained labeled transition systems as a semantic model to represent mobility. To model check MANET protocols with respect to the underlying

  3. Model-Checking Discrete Duration Calculus

    DEFF Research Database (Denmark)

    Hansen, Michael Reichhardt

    1994-01-01

    can do model-checking. The subset we consider is expressive enough to formalize the requirements to the gas burner system given by A.P. Ravn (1993); but only for a discrete time domain. Model-checking is done by reducing the correctness problem ℳ|=𝒟 to the inclusion problem of regular...

  4. Model Checking Infinite-State Markov Chains

    NARCIS (Netherlands)

    Remke, Anne Katharina Ingrid; Haverkort, Boudewijn R.H.M.; Cloth, L.

    2004-01-01

    In this paper algorithms for model checking CSL (continuous stochastic logic) against infinite-state continuous-time Markov chains of so-called quasi birth-death type are developed. In doing so we extend the applicability of CSL model checking beyond the recently proposed case for finite-state

  5. Engineering Abstractions in Model Checking and Testing

    DEFF Research Database (Denmark)

    Achenbach, Michael; Ostermann, Klaus

    2009-01-01

    Abstractions are used in model checking to tackle problems like state space explosion or modeling of IO. The application of these abstractions in real software development processes, however, lacks engineering support. This is one reason why model checking is not widely used in practice yet...... and testing is still state of the art in falsification. We show how user-defined abstractions can be integrated into a Java PathFinder setting with tools like AspectJ or Javassist and discuss implications of remaining weaknesses of these tools. We believe that a principled engineering approach to designing...... and implementing abstractions will improve the applicability of model checking in practice....

  6. A k-Bounded Symbolic Execution for Checking Strong Heap Properties of Open Systems

    DEFF Research Database (Denmark)

    Lee, Jooyong; Deng, Xianghua; Bogor, Robby

    2006-01-01

    This paper presents Kiasan, a bounded technique to reason about open systems based on a path sensitive, relatively sound and complete symbolic execution instead of the usual compositional reasoning through weakest precondition calculation that summarizes all execution paths. Kiasan is able to che...... framework and observed that its performance is comparable to ESC/Java on similar scales of problems and behavioral coverage, while providing the ability to check much stronger specifications...

  7. Model Checking Discounted Temporal Properties

    NARCIS (Netherlands)

    de Alfaro, Luca; Faella, Marco; Henzinger, Thomas A.; Majumdar, Rupak; Stoelinga, Mariëlle Ida Antoinette

    2005-01-01

    Temporal logic is two-valued: a property is either true or false. When applied to the analysis of stochastic systems, or systems with imprecise formal models, temporal logic is therefore fragile: even small changes in the model can lead to opposite truth values for a specification. We present a

  8. Model Checking Discounted Temporal Properties

    NARCIS (Netherlands)

    de Alfaro, Luca; Faella, Marco; Henzinger, Thomas A.; Majumdar, Rupak; Stoelinga, Mariëlle Ida Antoinette; Jensen, K; Podelski, A.

    2004-01-01

    Temporal logic is two-valued: a property is either true or false. When applied to the analysis of stochastic systems, or systems with imprecise formal models, temporal logic is therefore fragile: even small changes in the model can lead to opposite truth values for a specification. We present a

  9. Model Checking Timed Automata with Priorities using DBM Subtraction

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Pettersson, Paul

    2006-01-01

    In this paper we describe an extension of timed automata with priorities, and efficient algorithms to compute subtraction on DBMs (difference bounded matrices), needed in symbolic model-checking of timed automata with priorities. The subtraction is one of the few operations on DBMs that result...... in a non-convex set needing sets of DBMs for representation. Our subtraction algorithms are efficient in the sense that the number of generated DBMs is significantly reduced compared to a naive algorithm. The overhead in time is compensated by the gain from reducing the number of resulting DBMs since...... this number affects the performance of symbolic model-checking. The uses of the DBM subtraction operation extend beyond timed automata with priorities. It is also useful for allowing guards on transitions with urgent actions, deadlock checking, and timed games....

  10. Model checking coalitional games in shortage resource scenarios

    Directory of Open Access Journals (Sweden)

    Dario Della Monica

    2013-07-01

    Full Text Available Verification of multi-agents systems (MAS has been recently studied taking into account the need of expressing resource bounds. Several logics for specifying properties of MAS have been presented in quite a variety of scenarios with bounded resources. In this paper, we study a different formalism, called Priced Resource-Bounded Alternating-time Temporal Logic (PRBATL, whose main novelty consists in moving the notion of resources from a syntactic level (part of the formula to a semantic one (part of the model. This allows us to track the evolution of the resource availability along the computations and provides us with a formalisms capable to model a number of real-world scenarios. Two relevant aspects are the notion of global availability of the resources on the market, that are shared by the agents, and the notion of price of resources, depending on their availability. In a previous work of ours, an initial step towards this new formalism was introduced, along with an EXPTIME algorithm for the model checking problem. In this paper we better analyze the features of the proposed formalism, also in comparison with previous approaches. The main technical contribution is the proof of the EXPTIME-hardness of the the model checking problem for PRBATL, based on a reduction from the acceptance problem for Linearly-Bounded Alternating Turing Machines. In particular, since the problem has multiple parameters, we show two fixed-parameter reductions.

  11. UTP and Temporal Logic Model Checking

    Science.gov (United States)

    Anderson, Hugh; Ciobanu, Gabriel; Freitas, Leo

    In this paper we give an additional perspective to the formal verification of programs through temporal logic model checking, which uses Hoare and He Unifying Theories of Programming (UTP). Our perspective emphasizes the use of UTP designs, an alphabetised relational calculus expressed as a pre/post condition pair of relations, to verify state or temporal assertions about programs. The temporal model checking relation is derived from a satisfaction relation between the model and its properties. The contribution of this paper is that it shows a UTP perspective to temporal logic model checking. The approach includes the notion of efficiency found in traditional model checkers, which reduced a state explosion problem through the use of efficient data structures

  12. A Method for Model Checking Feature Interactions

    DEFF Research Database (Denmark)

    Pedersen, Thomas; Le Guilly, Thibaut; Ravn, Anders Peter

    2015-01-01

    This paper presents a method to check for feature interactions in a system assembled from independently developed concurrent processes as found in many reactive systems. The method combines and refines existing definitions and adds a set of activities. The activities describe how to populate the ...... the definitions with models to ensure that all interactions are captured. The method is illustrated on a home automation example with model checking as analysis tool. In particular, the modelling formalism is timed automata and the analysis uses UPPAAL to find interactions....

  13. Using Stochastic Model Checking to Provision Complex Business Services

    DEFF Research Database (Denmark)

    Herbert, Luke Thomas; Sharp, Robin

    2012-01-01

    bounds on resources consumed during execution of business processes. Accurate resource provisioning is often central to ensuring the safe execution of a process. We first introduce a formalised core subset of the Business Process Modelling and Notation (BPMN), which we extend with probabilistic and non......-deterministic branching and reward annotations. We then develop an algorithm for the efficient translation of these models into the guarded command language used by the model checker PRISM, in turn enabling model checking of BPMN processes and allowing for the calculation of a wide range of quantitative properties...

  14. Discrete-time rewards model-checked

    NARCIS (Netherlands)

    Larsen, K.G.; Andova, S.; Niebert, Peter; Hermanns, H.; Katoen, Joost P.

    2003-01-01

    This paper presents a model-checking approach for analyzing discrete-time Markov reward models. For this purpose, the temporal logic probabilistic CTL is extended with reward constraints. This allows to formulate complex measures – involving expected as well as accumulated rewards – in a precise and

  15. Model Checking the Remote Agent Planner

    Science.gov (United States)

    Khatib, Lina; Muscettola, Nicola; Havelund, Klaus; Norvig, Peter (Technical Monitor)

    2001-01-01

    This work tackles the problem of using Model Checking for the purpose of verifying the HSTS (Scheduling Testbed System) planning system. HSTS is the planner and scheduler of the remote agent autonomous control system deployed in Deep Space One (DS1). Model Checking allows for the verification of domain models as well as planning entries. We have chosen the real-time model checker UPPAAL for this work. We start by motivating our work in the introduction. Then we give a brief description of HSTS and UPPAAL. After that, we give a sketch for the mapping of HSTS models into UPPAAL and we present samples of plan model properties one may want to verify.

  16. Statistical Model Checking for Biological Systems

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Legay, Axel

    2014-01-01

    Statistical Model Checking (SMC) is a highly scalable simulation-based verification approach for testing and estimating the probability that a stochastic system satisfies a given linear temporal property. The technique has been applied to (discrete and continuous time) Markov chains, stochastic...

  17. Model checking the HAVi leader election protocol

    NARCIS (Netherlands)

    J.M.T. Romijn (Judi)

    1999-01-01

    textabstractThe HAVi specification proposes an architecture for audio/video interoperability in home networks. Part of the HAVi specification is a distributed leader election protocol. We have modelled this leader election protocol in Promela and Lotos and have checked several properties with the

  18. Model Checking - Automated Verification of Computational Systems

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 14; Issue 7. Model Checking - Automated Verification of Computational Systems. Madhavan Mukund. General Article Volume 14 Issue 7 July 2009 pp 667-681. Fulltext. Click here to view fulltext PDF. Permanent link:

  19. Slicing AADL specifications for model checking

    NARCIS (Netherlands)

    Odenbrett, M.R.; Nguyen, V.Y.; Noll, T.

    2010-01-01

    To combat the state-space explosion problem in model checking larger systems, abstraction techniques can be employed. Here, methods that operate on the system specification before constructing its state space are preferable to those that try to minimize the resulting transition system as they

  20. Automata-Based CSL Model Checking

    DEFF Research Database (Denmark)

    Zhang, Lijun; Jansen, David N.; Nielson, Flemming

    2011-01-01

    For continuous-time Markov chains, the model-checking problem with respect to continuous-time stochastic logic (CSL) has been introduced and shown to be decidable by Aziz, Sanwal, Singhal and Brayton in 1996. The presented decision procedure, however, has exponential complexity. In this paper, we...... probability can then be approximated in polynomial time (using uniformization). This makes the present work the centerpiece of a broadly applicable full CSL model checker. Recently, the decision algorithm by Aziz et al. was shown to be incorrect in general. In fact, it works only for stratified CTMCs...

  1. Statistical Model Checking of Rich Models and Properties

    DEFF Research Database (Denmark)

    Poulsen, Danny Bøgsted

    in undecidability issues for the traditional model checking approaches. Statistical model checking has proven itself a valuable supplement to model checking and this thesis is concerned with extending this software validation technique to stochastic hybrid systems. The thesis consists of two parts: the first part...... motivates why existing model checking technology should be supplemented by new techniques. It also contains a brief introduction to probability theory and concepts covered by the six papers making up the second part. The first two papers are concerned with developing online monitoring techniques...... systems. The fifth paper shows how stochastic hybrid automata are useful for modelling biological systems and the final paper is concerned with showing how statistical model checking is efficiently distributed. In parallel with developing the theory contained in the papers, a substantial part of this work...

  2. Model Checking Markov Reward Models with Impulse Rewards

    NARCIS (Netherlands)

    Cloth, Lucia; Katoen, Joost-Pieter; Khattri, Maneesh; Pulungan, Reza; Bondavalli, Andrea; Haverkort, Boudewijn; Tang, Dong

    This paper considers model checking of Markov reward models (MRMs), continuous-time Markov chains with state rewards as well as impulse rewards. The reward extension of the logic CSL (Continuous Stochastic Logic) is interpreted over such MRMs, and two numerical algorithms are provided to check the

  3. Abstraction and Model Checking in the PEPA Plug-in for Eclipse

    DEFF Research Database (Denmark)

    Smith, Michael James Andrew

    2010-01-01

    lead to very large Markov chains. One way of analysing such models is to use abstraction - constructing a smaller model that bounds the properties of the original. We present an extension to the PEPA plug-in for Eclipse that enables abstracting and model checking of PEPA models. This implements two new...

  4. Model Checking JAVA Programs Using Java Pathfinder

    Science.gov (United States)

    Havelund, Klaus; Pressburger, Thomas

    2000-01-01

    This paper describes a translator called JAVA PATHFINDER from JAVA to PROMELA, the "programming language" of the SPIN model checker. The purpose is to establish a framework for verification and debugging of JAVA programs based on model checking. This work should be seen in a broader attempt to make formal methods applicable "in the loop" of programming within NASA's areas such as space, aviation, and robotics. Our main goal is to create automated formal methods such that programmers themselves can apply these in their daily work (in the loop) without the need for specialists to manually reformulate a program into a different notation in order to analyze the program. This work is a continuation of an effort to formally verify, using SPIN, a multi-threaded operating system programmed in Lisp for the Deep-Space 1 spacecraft, and of previous work in applying existing model checkers and theorem provers to real applications.

  5. Sound statistical model checking for MDP using partial order and confluence reduction

    NARCIS (Netherlands)

    Hartmanns, Arnd; Timmer, Mark

    Statistical model checking (SMC) is an analysis method that circumvents the state space explosion problem in model-based verification by combining probabilistic simulation with statistical methods that provide clear error bounds. As a simulation-based technique, it can in general only provide sound

  6. On-the-fly confluence detection for statistical model checking (extended version)

    NARCIS (Netherlands)

    Hartmanns, Arnd; Timmer, Mark

    Statistical model checking is an analysis method that circumvents the state space explosion problem in model-based verification by combining probabilistic simulation with statistical methods that provide clear error bounds. As a simulation-based technique, it can only provide sound results if the

  7. Classification and checking model of pedestrian crossing

    Directory of Open Access Journals (Sweden)

    Luis Delgado Méndez

    2012-11-01

    After realizing this investigation it can be confirmed that the functionality of a pedestrian crossing depends on almost a hundred parameters which must be checked or measured, in turn proving that this design and construction process is indeed complex.

  8. Performability assessment by model checking of Markov reward models

    NARCIS (Netherlands)

    Baier, Christel; Cloth, L.; Haverkort, Boudewijn R.H.M.; Hermanns, H.; Katoen, Joost P.

    2010-01-01

    This paper describes efficient procedures for model checking Markov reward models, that allow us to evaluate, among others, the performability of computer-communication systems. We present the logic CSRL (Continuous Stochastic Reward Logic) to specify performability measures. It provides flexibility

  9. Strategic Planning through Model Checking of ATL Formulae

    NARCIS (Netherlands)

    Jamroga, W.J.; Rutkowski, L.; Siekmann, J.; Tadeusiewicz, R.; Zadeh, L.A.

    2004-01-01

    Model checking of temporal logic has already been proposed for automatic planning. In this paper, we introduce a simple adaptation of the ATL model checking algorithm that returns a strategy to achieve given goal. We point out that the algorithm generalizes minimaxing, and that ATL models generalize

  10. Applied Bounded Model Checking for Interlocking System Designs

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Peleska, Jan; Pinger, Ralf

    2014-01-01

    In this paper the verification and validation of interlocking systems is investigated. Reviewing both geographical and route-related interlocking, the verification objectives can be structured from a perspective of computer science into (1) verification of static semantics, and (2) verification o...

  11. Applied Bounded Model Checking for Interlocking System Designs

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Peleska, Jan; Pinger, Ralf

    2013-01-01

    In this article the verification and validation of interlocking systems is investigated. Reviewing both geographical and route-related interlocking, the verification objectives can be structured from a perspective of computer science into (1) verification of static semantics, and (2) verification...

  12. Efficient probabilistic model checking on general purpose graphic processors

    NARCIS (Netherlands)

    Bosnacki, D.; Edelkamp, S.; Sulewski, D.; Pasareanu, C.S.

    2009-01-01

    We present algorithms for parallel probabilistic model checking on general purpose graphic processing units (GPGPUs). For this purpose we exploit the fact that some of the basic algorithms for probabilistic model checking rely on matrix vector multiplication. Since this kind of linear algebraic

  13. Dynamic State Space Partitioning for External Memory Model Checking

    DEFF Research Database (Denmark)

    Evangelista, Sami; Kristensen, Lars Michael

    2009-01-01

    We describe a dynamic partitioning scheme usable by model checking techniques that divide the state space into partitions, such as most external memory and distributed model checking algorithms. The goal of the scheme is to reduce the number of transitions that link states belonging to different...

  14. Partial-Order Reduction for GPU Model Checking

    NARCIS (Netherlands)

    Neele, T.; Wijs, A.; Bosnacki, D.; van de Pol, Jan Cornelis; Artho, C; Legay, A.; Peled, D.

    2016-01-01

    Model checking using GPUs has seen increased popularity over the last years. Because GPUs have a limited amount of memory, only small to medium-sized systems can be verified. For on-the-fly explicit-state model checking, we improve memory efficiency by applying partial-order reduction. We propose

  15. Partial-order reduction for GPU model checking

    NARCIS (Netherlands)

    Neele, T.S.; Wijs, A.J.; Bošnački, D.; van de Pol, J.C.

    2016-01-01

    Model checking using GPUs has seen increased popularity over the last years. Because GPUs have a limited amount of memory, only small to medium-sized systems can be verified. For on-the-fly explicitstate model checking, we improve memory efficiency by applying partialorder reduction. We propose

  16. Implementing Model-Check for Employee and Management Satisfaction

    Science.gov (United States)

    Jones, Corey; LaPha, Steven

    2013-01-01

    This presentation will discuss methods to which ModelCheck can be implemented to not only improve model quality, but also satisfy both employees and management through different sets of quality checks. This approach allows a standard set of modeling practices to be upheld throughout a company, with minimal interaction required by the end user. The presenter will demonstrate how to create multiple ModelCheck standards, preventing users from evading the system, and how it can improve the quality of drawings and models.

  17. Multi-Valued Modal Fixed Point Logics for Model Checking

    Science.gov (United States)

    Nishizawa, Koki

    In this paper, I will show how multi-valued logics are used for model checking. Model checking is an automatic technique to analyze correctness of hardware and software systems. A model checker is based on a temporal logic or a modal fixed point logic. That is to say, a system to be checked is formalized as a Kripke model, a property to be satisfied by the system is formalized as a temporal formula or a modal formula, and the model checker checks that the Kripke model satisfies the formula. Although most existing model checkers are based on 2-valued logics, recently new attempts have been made to extend the underlying logics of model checkers to multi-valued logics. I will summarize these new results.

  18. Optimisation of BPMN Business Models via Model Checking

    DEFF Research Database (Denmark)

    Herbert, Luke Thomas; Sharp, Robin

    2013-01-01

    We present a framework for the optimisation of business processes modelled in the business process modelling language BPMN, which builds upon earlier work, where we developed a model checking based method for the analysis of BPMN models. We define a structure for expressing optimisation goals...... for synthesized BPMN components, based on probabilistic computation tree logic and real-valued reward structures of the BPMN model, allowing for the specification of complex quantitative goals. We here present a simple algorithm, inspired by concepts from evolutionary algorithms, which iteratively generates...

  19. Model Checking and Model-based Testing in the Railway Domain

    DEFF Research Database (Denmark)

    Haxthausen, Anne Elisabeth; Peleska, Jan

    2015-01-01

    This chapter describes some approaches and emerging trends for verification and model-based testing of railway control systems. We describe state-of-the-art methods and associated tools for verifying interlocking systems and their configuration data, using bounded model checking and k...... with good test strength are explained. Interlocking systems represent just one class of many others, where concrete system instances are created from generic representations, using configuration data for determining the behaviour of the instances. We explain how the systematic transition from generic...... to concrete instances in the development path is complemented by associated transitions in the verification and testing paths....

  20. Model checking biological systems described using ambient calculus

    DEFF Research Database (Denmark)

    Mardare, Radu Iulian; Priami, Corrado; Qualia, Paola

    2005-01-01

    Model checking biological systems described using ambient calculus. In Proc. of the second International Workshop on Computational Methods in Systems Biology (CMSB04), Lecture Notes in Bioinformatics 3082:85-103, Springer, 2005.......Model checking biological systems described using ambient calculus. In Proc. of the second International Workshop on Computational Methods in Systems Biology (CMSB04), Lecture Notes in Bioinformatics 3082:85-103, Springer, 2005....

  1. Towards Model Checking Stochastic Process Algebra

    NARCIS (Netherlands)

    Hermanns, H.; Grieskamp, W.; Santen, T.; Katoen, Joost P.; Stoddart, B.; Meyer-Kayser, J.; Siegle, M.

    2000-01-01

    Stochastic process algebras have been proven useful because they allow behaviour-oriented performance and reliability modelling. As opposed to traditional performance modelling techniques, the behaviour- oriented style supports composition and abstraction in a natural way. However, analysis of

  2. Models of bounded rationality under certainty

    NARCIS (Netherlands)

    Rasouli, S.; Timmermans, H.J.P.; Rasouli, S.; Timmermans, H.J.P.

    2015-01-01

    Purpose This chapter reviews models of decision-making and choice under conditions of certainty. It allows readers to position the contribution of the other chapters in this book in the historical development of the topic area. Theory Bounded rationality is defined in terms of a strategy to simplify

  3. Bringing LTL Model Checking to Biologists

    OpenAIRE

    Ahmed, Z; Benque, D; Berezin, S; Dahl, ACE; Fisher, Jasmin; Hall, Benjamin Andrew; Ishtiaq, S; Nanavati, J; Piterman, N; Riechert, M; Skoblov, N

    2017-01-01

    The BioModelAnalyzer (BMA) is a web based tool for the development of discrete models of biological systems. Through a graphical user interface, it allows rapid development of complex models of gene and protein interaction networks and stability analysis without requiring users to be proficient computer programmers. Whilst stability is a useful specification for testing many systems, testing temporal specifications in BMA presently requires the user to perform simulations. Here we describe th...

  4. Workflow Fault Tree Generation Through Model Checking

    DEFF Research Database (Denmark)

    Herbert, Luke Thomas; Sharp, Robin

    2014-01-01

    We present a framework for the automated generation of fault trees from models of realworld process workflows, expressed in a formalised subset of the popular Business Process Modelling and Notation (BPMN) language. To capture uncertainty and unreliability in workflows, we extend this formalism...

  5. Learning Markov Decision Processes for Model Checking

    DEFF Research Database (Denmark)

    Mao, Hua; Chen, Yingke; Jaeger, Manfred

    2012-01-01

    . The proposed learning algorithm is adapted from algorithms for learning deterministic probabilistic finite automata, and extended to include both probabilistic and nondeterministic transitions. The algorithm is empirically analyzed and evaluated by learning system models of slot machines. The evaluation......Constructing an accurate system model for formal model verification can be both resource demanding and time-consuming. To alleviate this shortcoming, algorithms have been proposed for automatically learning system models based on observed system behaviors. In this paper we extend the algorithm...... on learning probabilistic automata to reactive systems, where the observed system behavior is in the form of alternating sequences of inputs and outputs. We propose an algorithm for automatically learning a deterministic labeled Markov decision process model from the observed behavior of a reactive system...

  6. Temporal Precedence Checking for Switched Models and its Application to a Parallel Landing Protocol

    Science.gov (United States)

    Duggirala, Parasara Sridhar; Wang, Le; Mitra, Sayan; Viswanathan, Mahesh; Munoz, Cesar A.

    2014-01-01

    This paper presents an algorithm for checking temporal precedence properties of nonlinear switched systems. This class of properties subsume bounded safety and capture requirements about visiting a sequence of predicates within given time intervals. The algorithm handles nonlinear predicates that arise from dynamics-based predictions used in alerting protocols for state-of-the-art transportation systems. It is sound and complete for nonlinear switch systems that robustly satisfy the given property. The algorithm is implemented in the Compare Execute Check Engine (C2E2) using validated simulations. As a case study, a simplified model of an alerting system for closely spaced parallel runways is considered. The proposed approach is applied to this model to check safety properties of the alerting logic for different operating conditions such as initial velocities, bank angles, aircraft longitudinal separation, and runway separation.

  7. Memoised Garbage Collection for Software Model Checking

    NARCIS (Netherlands)

    Nguyen, V.Y.; Ruys, T.C.; Kowalewski, S.; Philippou, A.

    Virtual machine based software model checkers like JPF and MoonWalker spend up to half of their veri��?cation time on garbage collection. This is no surprise as after nearly each transition the heap has to be cleaned from garbage. To improve this, this paper presents the Memoised Garbage Collection

  8. Statistical Model Checking for Product Lines

    DEFF Research Database (Denmark)

    ter Beek, Maurice H.; Legay, Axel; Lluch Lafuente, Alberto

    2016-01-01

    average cost of products (in terms of the attributes of the products’ features) and the probability of features to be (un)installed at runtime. The product lines must be modelled in QFLan, which extends the probabilistic feature-oriented language PFLan with novel quantitative constraints among features...

  9. Model checking meets probability: a gentle introduction

    NARCIS (Netherlands)

    Katoen, Joost P.

    2013-01-01

    This paper considers fully probabilistic system models. Each transition is quantified with a probability—its likelihood of occurrence. Properties are expressed as automata that either accept or reject system runs. The central question is to determine the fraction of accepted system runs. We also

  10. Linear Parametric Model Checking of Timed Automata

    DEFF Research Database (Denmark)

    Hune, Tohmas Seidelin; Romijn, Judi; Stoelinga, Mariëlle

    2001-01-01

    We present an extension of the model checker Uppaal capable of synthesize linear parameter constraints for the correctness of parametric timed automata. The symbolic representation of the (parametric) state-space is shown to be correct. A second contribution of this paper is the identication...... of a subclass of parametric timed automata (L/U automata), for which the emptiness problem is decidable, contrary to the full class where it is know to be undecidable. Also we present a number of lemmas enabling the verication eort to be reduced for L/U automata in some cases. We illustrate our approach...

  11. Model Checking Temporal Logic Formulas Using Sticker Automata

    Science.gov (United States)

    Feng, Changwei; Wu, Huanmei

    2017-01-01

    As an important complex problem, the temporal logic model checking problem is still far from being fully resolved under the circumstance of DNA computing, especially Computation Tree Logic (CTL), Interval Temporal Logic (ITL), and Projection Temporal Logic (PTL), because there is still a lack of approaches for DNA model checking. To address this challenge, a model checking method is proposed for checking the basic formulas in the above three temporal logic types with DNA molecules. First, one-type single-stranded DNA molecules are employed to encode the Finite State Automaton (FSA) model of the given basic formula so that a sticker automaton is obtained. On the other hand, other single-stranded DNA molecules are employed to encode the given system model so that the input strings of the sticker automaton are obtained. Next, a series of biochemical reactions are conducted between the above two types of single-stranded DNA molecules. It can then be decided whether the system satisfies the formula or not. As a result, we have developed a DNA-based approach for checking all the basic formulas of CTL, ITL, and PTL. The simulated results demonstrate the effectiveness of the new method. PMID:29119114

  12. CheckMATE 2: From the model to the limit

    Science.gov (United States)

    Dercks, Daniel; Desai, Nishita; Kim, Jong Soo; Rolbiecki, Krzysztof; Tattersall, Jamie; Weber, Torsten

    2017-12-01

    We present the latest developments to the CheckMATE program that allows models of new physics to be easily tested against the recent LHC data. To achieve this goal, the core of CheckMATE now contains over 60 LHC analyses of which 12 are from the 13 TeV run. The main new feature is that CheckMATE 2 now integrates the Monte Carlo event generation via MadGraph5_aMC@NLO and Pythia 8. This allows users to go directly from a SLHA file or UFO model to the result of whether a model is allowed or not. In addition, the integration of the event generation leads to a significant increase in the speed of the program. Many other improvements have also been made, including the possibility to now combine signal regions to give a total likelihood for a model.

  13. Schedulability of Herschel revisited using statistical model checking

    DEFF Research Database (Denmark)

    David, Alexandre; Larsen, Kim Guldstrand; Legay, Axel

    2015-01-01

    -approximation technique. We can safely conclude that the system is schedulable for varying values of BCET. For the cases where deadlines are violated, we use polyhedra to try to confirm the witnesses. Our alternative method to confirm non-schedulability uses statistical model-checking (SMC) to generate counter...... and blocking times of tasks. Consequently, the method may falsely declare deadline violations that will never occur during execution. This paper is a continuation of previous work of the authors in applying extended timed automata model checking (using the tool UPPAAL) to obtain more exact schedulability...... analysis, here in the presence of non-deterministic computation times of tasks given by intervals [BCET,WCET]. Computation intervals with preemptive schedulers make the schedulability analysis of the resulting task model undecidable. Our contribution is to propose a combination of model checking techniques...

  14. modelling of queuing process at airport check-in system

    African Journals Online (AJOL)

    HOD

    Key words: Airport check-in system, discrete time events, analytical models, simulation model, SimEvents toolbox. 1. ..... [6] Gross, D. and Harris, C. M. Fundamentals of. Queueing ... [11] Manataki I. E. and Zogra os K. G. “A Generic. System ...

  15. Bayesian inference with information content model check for Langevin equations

    DEFF Research Database (Denmark)

    Krog, Jens F. C.; Lomholt, Michael Andersen

    2017-01-01

    The Bayesian data analysis framework has been proven to be a systematic and effective method of parameter inference and model selection for stochastic processes. In this work we introduce an information content model check which may serve as a goodness-of-fit, like the chi-square procedure...

  16. Towards Model Checking a Spi-Calculus Dialect

    NARCIS (Netherlands)

    Gnesi, S.; Latella, D.; Lenzini, Gabriele

    We present a model checking framework for a spi-calculus dialect which uses a linear time temporal logic for expressing security properties. We have provided our spi-calculus dialect, called SPID, with a semantics based on labeled transition systems (LTS), where the intruder is modeled in the

  17. Model checking: one can do much more than you think!

    NARCIS (Netherlands)

    Katoen, Joost P.

    2012-01-01

    Model checking is an automated verification technique that actively is applied to find bugs in hardware and software designs. Companies like IBM and Cadence developed their in-house model checkers, and acted as driving forces behind the design of the IEEE-standardized temporal logic PSL. On the

  18. Recent advances in importance sampling for statistical model checking

    NARCIS (Netherlands)

    Reijsbergen, D.P.; de Boer, Pieter-Tjerk; Scheinhardt, Willem R.W.; Haverkort, Boudewijn R.H.M.

    2013-01-01

    In the following work we present an overview of recent advances in rare event simulation for model checking made at the University of Twente. The overview is divided into the several model classes for which we propose algorithms, namely multicomponent systems, Markov chains and stochastic Petri

  19. A voice-actuated wind tunnel model leak checking system

    Science.gov (United States)

    Larson, William E.

    1989-01-01

    A computer program has been developed that improves the efficiency of wind tunnel model leak checking. The program uses a voice recognition unit to relay a technician's commands to the computer. The computer, after receiving a command, can respond to the technician via a voice response unit. Information about the model pressure orifice being checked is displayed on a gas-plasma terminal. On command, the program records up to 30 seconds of pressure data. After the recording is complete, the raw data and a straight line fit of the data are plotted on the terminal. This allows the technician to make a decision on the integrity of the orifice being checked. All results of the leak check program are stored in a database file that can be listed on the line printer for record keeping purposes or displayed on the terminal to help the technician find unchecked orifices. This program allows one technician to check a model for leaks instead of the two or three previously required.

  20. Consistency checks in beam emission modeling for neutral beam injectors

    International Nuclear Information System (INIS)

    Punyapu, Bharathi; Vattipalle, Prahlad; Sharma, Sanjeev Kumar; Baruah, Ujjwal Kumar; Crowley, Brendan

    2015-01-01

    In positive neutral beam systems, the beam parameters such as ion species fractions, power fractions and beam divergence are routinely measured using Doppler shifted beam emission spectrum. The accuracy with which these parameters are estimated depend on the accuracy of the atomic modeling involved in these estimations. In this work, an effective procedure to check the consistency of the beam emission modeling in neutral beam injectors is proposed. As a first consistency check, at a constant beam voltage and current, the intensity of the beam emission spectrum is measured by varying the pressure in the neutralizer. Then, the scaling of measured intensity of un-shifted (target) and Doppler shifted intensities (projectile) of the beam emission spectrum at these pressure values are studied. If the un-shifted component scales with pressure, then the intensity of this component will be used as a second consistency check on the beam emission modeling. As a further check, the modeled beam fractions and emission cross sections of projectile and target are used to predict the intensity of the un-shifted component and then compared with the value of measured target intensity. An agreement between the predicted and measured target intensities provide the degree of discrepancy in the beam emission modeling. In order to test this methodology, a systematic analysis of Doppler shift spectroscopy data obtained on the JET neutral beam test stand data was carried out

  1. Symbolic Game Semantics for Model Checking Program Families

    DEFF Research Database (Denmark)

    Dimovski, Aleksandar

    2016-01-01

    represent program families with infinite integers as so-called (finite-state) featured symbolic automata. Specifically designed model checking algorithms are then employed to verify safety of all programs from a family at once and pinpoint those programs that are unsafe (respectively, safe). We present...... a prototype tool implementing this approach, and we illustrate it with several examples....

  2. Application of Model-Checking Technology to Controller Synthesis

    DEFF Research Database (Denmark)

    David, Alexandre; Grunnet, Jacob Deleuran; Jessen, Jan Jacob

    2011-01-01

    In this paper we present two frameworks that have been implemented to link traditional model-checking techniques to the domain of control. The techniques are based on solving a timed game and using the resulting solution (a strategy) as a controller. The obtained discrete controller must fit with...

  3. Model checking conditional CSL for continuous-time Markov chains

    DEFF Research Database (Denmark)

    Gao, Yang; Xu, Ming; Zhan, Naijun

    2013-01-01

    In this paper, we consider the model-checking problem of continuous-time Markov chains (CTMCs) with respect to conditional logic. To the end, we extend Continuous Stochastic Logic introduced in Aziz et al. (2000) [1] to Conditional Continuous Stochastic Logic (CCSL) by introducing a conditional...

  4. State Space Reduction for Model Checking Agent Programs

    NARCIS (Netherlands)

    S.-S.T.Q. Jongmans (Sung-Shik); K.V. Hindriks; M.B. van Riemsdijk; L. Dennis; O. Boissier; R.H. Bordini (Rafael)

    2012-01-01

    htmlabstractState space reduction techniques have been developed to increase the efficiency of model checking in the context of imperative programming languages. Unfortunately, these techniques cannot straightforwardly be applied to agents: the nature of states in the two programming paradigms

  5. Verifying large SDL-specifications using model checking

    NARCIS (Netherlands)

    Sidorova, N.; Steffen, M.; Reed, R.; Reed, J.

    2001-01-01

    In this paper we propose a methodology for model-checking based verification of large SDL specifications. The methodology is illustrated by a case study of an industrial medium-access protocol for wireless ATM. To cope with the state space explosion, the verification exploits the layered and modular

  6. Efficient family-based model checking via variability abstractions

    DEFF Research Database (Denmark)

    Dimovski, Aleksandar; Al-Sibahi, Ahmad Salim; Brabrand, Claus

    2016-01-01

    with the abstract model checking of the concrete high-level variational model. This allows the use of Spin with all its accumulated optimizations for efficient verification of variational models without any knowledge about variability. We have implemented the transformations in a prototype tool, and we illustrate......Many software systems are variational: they can be configured to meet diverse sets of requirements. They can produce a (potentially huge) number of related systems, known as products or variants, by systematically reusing common parts. For variational models (variational systems or families...... of related systems), specialized family-based model checking algorithms allow efficient verification of multiple variants, simultaneously, in a single run. These algorithms, implemented in a tool Snip, scale much better than ``the brute force'' approach, where all individual systems are verified using...

  7. Mixed Portmanteau Test for Diagnostic Checking of Time Series Models

    Directory of Open Access Journals (Sweden)

    Sohail Chand

    2014-01-01

    Full Text Available Model criticism is an important stage of model building and thus goodness of fit tests provides a set of tools for diagnostic checking of the fitted model. Several tests are suggested in literature for diagnostic checking. These tests use autocorrelation or partial autocorrelation in the residuals to criticize the adequacy of fitted model. The main idea underlying these portmanteau tests is to identify if there is any dependence structure which is yet unexplained by the fitted model. In this paper, we suggest mixed portmanteau tests based on autocorrelation and partial autocorrelation functions of the residuals. We derived the asymptotic distribution of the mixture test and studied its size and power using Monte Carlo simulations.

  8. Take it NP-easy: Bounded model construction for duration calculus

    DEFF Research Database (Denmark)

    Fränzle, Martin

    2002-01-01

    Following the recent successes of bounded model-checking, we reconsider the problem of constructing models of discrete-time Duration Calculus formulae. While this problem is known to be non-elementary when arbitrary length models are considered [Hansen94], it turns out to be only NP-complete when...... constrained to bounded length. As a corollary we obtain that model construction is in NP for the formulae actually encountered in case studies using Duration Calculus, as these have a certain small-model property. First experiments with a prototype implementation of the procedures demonstrate a competitive...

  9. MTL-Model Checking of One-Clock Parametric Timed Automata is Undecidable

    Directory of Open Access Journals (Sweden)

    Karin Quaas

    2014-03-01

    Full Text Available Parametric timed automata extend timed automata (Alur and Dill, 1991 in that they allow the specification of parametric bounds on the clock values. Since their introduction in 1993 by Alur, Henzinger, and Vardi, it is known that the emptiness problem for parametric timed automata with one clock is decidable, whereas it is undecidable if the automaton uses three or more parametric clocks. The problem is open for parametric timed automata with two parametric clocks. Metric temporal logic, MTL for short, is a widely used specification language for real-time systems. MTL-model checking of timed automata is decidable, no matter how many clocks are used in the timed automaton. In this paper, we prove that MTL-model checking for parametric timed automata is undecidable, even if the automaton uses only one clock and one parameter and is deterministic.

  10. Symbolic Model Checking and Analysis for E-Commerce Protocol

    Institute of Scientific and Technical Information of China (English)

    WEN Jing-Hua; ZHANG Mei; LI Xiang

    2005-01-01

    A new approach is proposed for analyzing non-repudiation and fairness of e-commerce protocols. The authentication e-mail protocol CMP1 is modeled as finite state machine and analyzed in two vital aspects - non-repudiation and fairness using SMV. As a result, the CMP1 protocol is not fair and we have improved it. This result shows that it is effective to analyze and check the new features of e-commerce protocols using SMV model checker

  11. Logic Model Checking of Unintended Acceleration Claims in Toyota Vehicles

    Science.gov (United States)

    Gamble, Ed

    2012-01-01

    Part of the US Department of Transportation investigation of Toyota sudden unintended acceleration (SUA) involved analysis of the throttle control software, JPL Laboratory for Reliable Software applied several techniques including static analysis and logic model checking, to the software; A handful of logic models were build, Some weaknesses were identified; however, no cause for SUA was found; The full NASA report includes numerous other analyses

  12. Analysis of DIRAC's behavior using model checking with process algebra

    CERN Document Server

    Remenska, Daniela; Willemse, Tim; Bal, Henri; Verstoep, Kees; Fokkink, Wan; Charpentier, Philippe; Diaz, Ricardo Graciani; Lanciotti, Elisa; Roiser, Stefan; Ciba, Krzysztof

    2012-01-01

    DIRAC is the grid solution developed to support LHCb production activities as well as user data analysis. It consists of distributed services and agents delivering the workload to the grid resources. Services maintain database back-ends to store dynamic state information of entities such as jobs, queues, staging requests, etc. Agents use polling to check and possibly react to changes in the system state. Each agent's logic is relatively simple, the main complexity lies in their cooperation. Agents run concurrently, and collaborate using the databases as shared memory. The databases can be accessed directly by the agents if running locally or through a DIRAC service interface if necessary. This shared-memory model causes entities to occasionally get into inconsistent states. Tracing and fixing such problems becomes formidable due to the inherent parallelism present. We propose more rigorous methods to cope with this. Model checking is one such technique for analysis of an abstract model of a system. Unlike con...

  13. Models for light QCD bound states

    International Nuclear Information System (INIS)

    LaCourse, D.P.

    1992-01-01

    After a brief overview of Regge, tower, and heavy-quark experimental data, this thesis examines two massless wave equations relevant to quark bound states. We establish general conditions on the Lorentz scalar and Lorentz vector potentials which yield arbitrary leading Regge trajectories for the case of circular classical motion. A semi-classical approximation which includes radial motion reproduces remarkably well the exact solutions. Conditions for tower structure are examined, and found to be incompatible with conditions which give a Nambu stringlike Regge slope. The author then proposes a generalization of the usual potential model of quark bound states in which the confining flux tube is a dynamical object carrying both angular momentum and energy. The Q bar Q-string system with spinless quarks is quantized using an implicit operator technique and the resulting relativistic wave equation is solved. For heavy quarks the usual Schroedinger valence-quark model is recovered. The Regge slope with light quarks agree with the classical rotating-string result and is significantly larger and the effects of short-range forces are also considered. A relativistic generalization of the quantized flux tube model predicts the glueball ground state mass to be √3/α' ≅ 1.9 GeV where α' is the normal Regge slope. The groundstate as well as excited levels like considerably above the expectations of previous models and also above various proposed experimental candidates. The glueball Regge slope is only about three-eighths that for valence quark hadrons. A semi-classical calculation of the Regge slope is in good agreement with a numerically exact value

  14. Model Checking Processes Specified In Join-Calculus Algebra

    Directory of Open Access Journals (Sweden)

    Sławomir Piotr Maludziński

    2014-01-01

    Full Text Available This article presents a model checking tool used to verify concurrent systems specified in join-calculus algebra. The temporal properties of systems under verification are expressed in CTL logic. Join-calculus algebra with its operational semantics defined by the chemical abstract machine serves as the basic method for the specification of concurrent systems and their synchronization mechanisms, and allows the examination of more complex systems.

  15. Introduction of Virtualization Technology to Multi-Process Model Checking

    Science.gov (United States)

    Leungwattanakit, Watcharin; Artho, Cyrille; Hagiya, Masami; Tanabe, Yoshinori; Yamamoto, Mitsuharu

    2009-01-01

    Model checkers find failures in software by exploring every possible execution schedule. Java PathFinder (JPF), a Java model checker, has been extended recently to cover networked applications by caching data transferred in a communication channel. A target process is executed by JPF, whereas its peer process runs on a regular virtual machine outside. However, non-deterministic target programs may produce different output data in each schedule, causing the cache to restart the peer process to handle the different set of data. Virtualization tools could help us restore previous states of peers, eliminating peer restart. This paper proposes the application of virtualization technology to networked model checking, concentrating on JPF.

  16. Using Model Checking for Analyzing Distributed Power Control Problems

    DEFF Research Database (Denmark)

    Brihaye, Thomas; Jungers, Marc; Lasaulce, Samson

    2010-01-01

    Model checking (MC) is a formal verification technique which has been known and still knows a resounding success in the computer science community. Realizing that the distributed power control ( PC) problem can be modeled by a timed game between a given transmitter and its environment, the authors...... objectives a transmitter-receiver pair would like to reach. The network is modeled by a game where transmitters are considered as timed automata interacting with each other. The objectives are then translated into timed alternating-time temporal logic formulae and MC is exploited to know whether the desired...

  17. From Transition Systems to Variability Models and from Lifted Model Checking Back to UPPAAL

    DEFF Research Database (Denmark)

    Dimovski, Aleksandar; Wasowski, Andrzej

    2017-01-01

    efficient lifted (family-based) model checking for real-time variability models. This reduces the cost of maintaining specialized family-based real-time model checkers. Real-time variability models can be model checked using the standard UPPAAL. We have implemented abstractions as syntactic source...

  18. Model-checking techniques based on cumulative residuals.

    Science.gov (United States)

    Lin, D Y; Wei, L J; Ying, Z

    2002-03-01

    Residuals have long been used for graphical and numerical examinations of the adequacy of regression models. Conventional residual analysis based on the plots of raw residuals or their smoothed curves is highly subjective, whereas most numerical goodness-of-fit tests provide little information about the nature of model misspecification. In this paper, we develop objective and informative model-checking techniques by taking the cumulative sums of residuals over certain coordinates (e.g., covariates or fitted values) or by considering some related aggregates of residuals, such as moving sums and moving averages. For a variety of statistical models and data structures, including generalized linear models with independent or dependent observations, the distributions of these stochastic processes tinder the assumed model can be approximated by the distributions of certain zero-mean Gaussian processes whose realizations can be easily generated by computer simulation. Each observed process can then be compared, both graphically and numerically, with a number of realizations from the Gaussian process. Such comparisons enable one to assess objectively whether a trend seen in a residual plot reflects model misspecification or natural variation. The proposed techniques are particularly useful in checking the functional form of a covariate and the link function. Illustrations with several medical studies are provided.

  19. Optimizing ZigBee Security using Stochastic Model Checking

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    , we identify an important gap in the specification on key updates, and present a methodology for determining optimal key update policies and security parameters. We exploit the stochastic model checking approach using the probabilistic model checker PRISM, and assess the security needs for realistic......ZigBee is a fairly new but promising wireless sensor network standard that offers the advantages of simple and low resource communication. Nevertheless, security is of great concern to ZigBee, and enhancements are prescribed in the latest ZigBee specication: ZigBee-2007. In this technical report...

  20. UPPAAL-SMC: Statistical Model Checking for Priced Timed Automata

    DEFF Research Database (Denmark)

    Bulychev, Petr; David, Alexandre; Larsen, Kim Guldstrand

    2012-01-01

    on a series of extensions of the statistical model checking approach generalized to handle real-time systems and estimate undecidable problems. U PPAAL - SMC comes together with a friendly user interface that allows a user to specify complex problems in an efficient manner as well as to get feedback...... in the form of probability distributions and compare probabilities to analyze performance aspects of systems. The focus of the survey is on the evolution of the tool – including modeling and specification formalisms as well as techniques applied – together with applications of the tool to case studies....

  1. Model Checking A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs

    Science.gov (United States)

    Malekpour, Mahyar R.

    2012-01-01

    This report presents the mechanical verification of a self-stabilizing distributed clock synchronization protocol for arbitrary digraphs in the absence of faults. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. The system under study is an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period. A bounded model of the protocol is verified using the Symbolic Model Verifier (SMV) for a subset of digraphs. Modeling challenges of the protocol and the system are addressed. The model checking effort is focused on verifying correctness of the bounded model of the protocol as well as confirmation of claims of determinism and linear convergence with respect to the self-stabilization period.

  2. Probabilistic error bounds for reduced order modeling

    Energy Technology Data Exchange (ETDEWEB)

    Abdo, M.G.; Wang, C.; Abdel-Khalik, H.S., E-mail: abdo@purdue.edu, E-mail: wang1730@purdue.edu, E-mail: abdelkhalik@purdue.edu [Purdue Univ., School of Nuclear Engineering, West Lafayette, IN (United States)

    2015-07-01

    Reduced order modeling has proven to be an effective tool when repeated execution of reactor analysis codes is required. ROM operates on the assumption that the intrinsic dimensionality of the associated reactor physics models is sufficiently small when compared to the nominal dimensionality of the input and output data streams. By employing a truncation technique with roots in linear algebra matrix decomposition theory, ROM effectively discards all components of the input and output data that have negligible impact on reactor attributes of interest. This manuscript introduces a mathematical approach to quantify the errors resulting from the discarded ROM components. As supported by numerical experiments, the introduced analysis proves that the contribution of the discarded components could be upper-bounded with an overwhelmingly high probability. The reverse of this statement implies that the ROM algorithm can self-adapt to determine the level of the reduction needed such that the maximum resulting reduction error is below a given tolerance limit that is set by the user. (author)

  3. Applying Model Checking to Industrial-Sized PLC Programs

    CERN Document Server

    AUTHOR|(CDS)2079190; Darvas, Daniel; Blanco Vinuela, Enrique; Tournier, Jean-Charles; Bliudze, Simon; Blech, Jan Olaf; Gonzalez Suarez, Victor M

    2015-01-01

    Programmable logic controllers (PLCs) are embedded computers widely used in industrial control systems. Ensuring that a PLC software complies with its specification is a challenging task. Formal verification has become a recommended practice to ensure the correctness of safety-critical software but is still underused in industry due to the complexity of building and managing formal models of real applications. In this paper, we propose a general methodology to perform automated model checking of complex properties expressed in temporal logics (\\eg CTL, LTL) on PLC programs. This methodology is based on an intermediate model (IM), meant to transform PLC programs written in various standard languages (ST, SFC, etc.) to different modeling languages of verification tools. We present the syntax and semantics of the IM and the transformation rules of the ST and SFC languages to the nuXmv model checker passing through the intermediate model. Finally, two real cases studies of \\CERN PLC programs, written mainly in th...

  4. Efficient Parallel Statistical Model Checking of Biochemical Networks

    Directory of Open Access Journals (Sweden)

    Paolo Ballarini

    2009-12-01

    Full Text Available We consider the problem of verifying stochastic models of biochemical networks against behavioral properties expressed in temporal logic terms. Exact probabilistic verification approaches such as, for example, CSL/PCTL model checking, are undermined by a huge computational demand which rule them out for most real case studies. Less demanding approaches, such as statistical model checking, estimate the likelihood that a property is satisfied by sampling executions out of the stochastic model. We propose a methodology for efficiently estimating the likelihood that a LTL property P holds of a stochastic model of a biochemical network. As with other statistical verification techniques, the methodology we propose uses a stochastic simulation algorithm for generating execution samples, however there are three key aspects that improve the efficiency: first, the sample generation is driven by on-the-fly verification of P which results in optimal overall simulation time. Second, the confidence interval estimation for the probability of P to hold is based on an efficient variant of the Wilson method which ensures a faster convergence. Third, the whole methodology is designed according to a parallel fashion and a prototype software tool has been implemented that performs the sampling/verification process in parallel over an HPC architecture.

  5. SoS contract verification using statistical model checking

    Directory of Open Access Journals (Sweden)

    Alessandro Mignogna

    2013-11-01

    Full Text Available Exhaustive formal verification for systems of systems (SoS is impractical and cannot be applied on a large scale. In this paper we propose to use statistical model checking for efficient verification of SoS. We address three relevant aspects for systems of systems: 1 the model of the SoS, which includes stochastic aspects; 2 the formalization of the SoS requirements in the form of contracts; 3 the tool-chain to support statistical model checking for SoS. We adapt the SMC technique for application to heterogeneous SoS. We extend the UPDM/SysML specification language to express the SoS requirements that the implemented strategies over the SoS must satisfy. The requirements are specified with a new contract language specifically designed for SoS, targeting a high-level English- pattern language, but relying on an accurate semantics given by the standard temporal logics. The contracts are verified against the UPDM/SysML specification using the Statistical Model Checker (SMC PLASMA combined with the simulation engine DESYRE, which integrates heterogeneous behavioral models through the functional mock-up interface (FMI standard. The tool-chain allows computing an estimation of the satisfiability of the contracts by the SoS. The results help the system architect to trade-off different solutions to guide the evolution of the SoS.

  6. Conformity checking of LPG Transportation Trucks by Modelling and Simulation

    Directory of Open Access Journals (Sweden)

    Gallab Maryam

    2017-01-01

    Full Text Available LPG Loading /unloading site is considered as a dangerous environment of significant risk, especially during LPG transfer operations. These risks may cause catastrophic dangers such as BLEVE (Boiling Liquid Expanding Vapour Explosion, UVCE (Unconfined Vapour Cloud Explosion, etc. The site consists of a tank (RST containing LPG and threetransfer posts. Two posts allow loading of small carrier tankers 6 tons. The other one transfer post transfer LPG contained injumbo tankers 20 tons inside the tank. The industrial site at risks chooses to demonstrate the need for a modelling-simulation approach. The aim is to check first compliance and authorization of the truck when it enters the site for loading /unloading, to verify the authorization to make the transfer, and then, to identify the driver and his training to ensure that the transfer operations are going to take place without incident. Sometimes, it may happen that Consignment Operator (CO is busy orabsent and thus the driver operates alone without being authorized, in this case the site risks a loss of control due to a lack of resources. The modelling-simulation will be done using multi-agent systems that will present the drivers, trucks, PO and loading unloading posts as agents in order to have a model facilitating this checking.

  7. Model-checking dense-time Duration Calculus

    DEFF Research Database (Denmark)

    Fränzle, Martin

    2004-01-01

    Since the seminal work of Zhou Chaochen, M. R. Hansen, and P. Sestoft on decidability of dense-time Duration Calculus [Zhou, Hansen, Sestoft, 1993] it is well-known that decidable fragments of Duration Calculus can only be obtained through withdrawal of much of the interesting vocabulary...... of this logic. While this was formerly taken as an indication that key-press verification of implementations with respect to elaborate Duration Calculus specifications were also impossible, we show that the model property is well decidable for realistic designs which feature natural constraints...... suitably sparser model classes we obtain model-checking procedures for rich subsets of Duration Calculus. Together with undecidability results also obtained, this sheds light upon the exact borderline between decidability and undecidability of Duration Calculi and related logics....

  8. Using Model Checking for Analyzing Distributed Power Control Problems

    Directory of Open Access Journals (Sweden)

    Thomas Brihaye

    2010-01-01

    Full Text Available Model checking (MC is a formal verification technique which has been known and still knows a resounding success in the computer science community. Realizing that the distributed power control (PC problem can be modeled by a timed game between a given transmitter and its environment, the authors wanted to know whether this approach can be applied to distributed PC. It turns out that it can be applied successfully and allows one to analyze realistic scenarios including the case of discrete transmit powers and games with incomplete information. The proposed methodology is as follows. We state some objectives a transmitter-receiver pair would like to reach. The network is modeled by a game where transmitters are considered as timed automata interacting with each other. The objectives are then translated into timed alternating-time temporal logic formulae and MC is exploited to know whether the desired properties are verified and determine a winning strategy.

  9. Methods to model-check parallel systems software

    International Nuclear Information System (INIS)

    Matlin, O. S.; McCune, W.; Lusk, E.

    2003-01-01

    We report on an effort to develop methodologies for formal verification of parts of the Multi-Purpose Daemon (MPD) parallel process management system. MPD is a distributed collection of communicating processes. While the individual components of the collection execute simple algorithms, their interaction leads to unexpected errors that are difficult to uncover by conventional means. Two verification approaches are discussed here: the standard model checking approach using the software model checker SPIN and the nonstandard use of a general-purpose first-order resolution-style theorem prover OTTER to conduct the traditional state space exploration. We compare modeling methodology and analyze performance and scalability of the two methods with respect to verification of MPD

  10. Model checking as an aid to procedure design

    International Nuclear Information System (INIS)

    Zhang, Wenhu

    2001-01-01

    The OECD Halden Reactor Project has been actively working on computer assisted operating procedures for many years. The objective of the research has been to provide computerised assistance for procedure design, verification and validation, implementation and maintenance. For the verification purpose, the application of formal methods has been considered in several reports. The recent formal verification activity conducted at the Halden Project is based on using model checking to the verification of procedures. This report presents verification approaches based on different model checking techniques and tools for the formalization and verification of operating procedures. Possible problems and relative merits of the different approaches are discussed. A case study of one of the approaches is presented to show the practical application of formal verification. Application of formal verification in the traditional procedure design process can reduce the human resources involved in reviews and simulations, and hence reduce the cost of verification and validation. A discussion of the integration of the formal verification with the traditional procedure design process is given at the end of this report. (Author)

  11. Analysis of DIRAC's behavior using model checking with process algebra

    International Nuclear Information System (INIS)

    Remenska, Daniela; Templon, Jeff; Willemse, Tim; Bal, Henri; Verstoep, Kees; Fokkink, Wan; Charpentier, Philippe; Lanciotti, Elisa; Roiser, Stefan; Ciba, Krzysztof; Diaz, Ricardo Graciani

    2012-01-01

    DIRAC is the grid solution developed to support LHCb production activities as well as user data analysis. It consists of distributed services and agents delivering the workload to the grid resources. Services maintain database back-ends to store dynamic state information of entities such as jobs, queues, staging requests, etc. Agents use polling to check and possibly react to changes in the system state. Each agent's logic is relatively simple; the main complexity lies in their cooperation. Agents run concurrently, and collaborate using the databases as shared memory. The databases can be accessed directly by the agents if running locally or through a DIRAC service interface if necessary. This shared-memory model causes entities to occasionally get into inconsistent states. Tracing and fixing such problems becomes formidable due to the inherent parallelism present. We propose more rigorous methods to cope with this. Model checking is one such technique for analysis of an abstract model of a system. Unlike conventional testing, it allows full control over the parallel processes execution, and supports exhaustive state-space exploration. We used the mCRL2 language and toolset to model the behavior of two related DIRAC subsystems: the workload and storage management system. Based on process algebra, mCRL2 allows defining custom data types as well as functions over these. This makes it suitable for modeling the data manipulations made by DIRAC's agents. By visualizing the state space and replaying scenarios with the toolkit's simulator, we have detected race-conditions and deadlocks in these systems, which, in several cases, were confirmed to occur in the reality. Several properties of interest were formulated and verified with the tool. Our future direction is automating the translation from DIRAC to a formal model.

  12. Analysis of DIRAC's behavior using model checking with process algebra

    Science.gov (United States)

    Remenska, Daniela; Templon, Jeff; Willemse, Tim; Bal, Henri; Verstoep, Kees; Fokkink, Wan; Charpentier, Philippe; Graciani Diaz, Ricardo; Lanciotti, Elisa; Roiser, Stefan; Ciba, Krzysztof

    2012-12-01

    DIRAC is the grid solution developed to support LHCb production activities as well as user data analysis. It consists of distributed services and agents delivering the workload to the grid resources. Services maintain database back-ends to store dynamic state information of entities such as jobs, queues, staging requests, etc. Agents use polling to check and possibly react to changes in the system state. Each agent's logic is relatively simple; the main complexity lies in their cooperation. Agents run concurrently, and collaborate using the databases as shared memory. The databases can be accessed directly by the agents if running locally or through a DIRAC service interface if necessary. This shared-memory model causes entities to occasionally get into inconsistent states. Tracing and fixing such problems becomes formidable due to the inherent parallelism present. We propose more rigorous methods to cope with this. Model checking is one such technique for analysis of an abstract model of a system. Unlike conventional testing, it allows full control over the parallel processes execution, and supports exhaustive state-space exploration. We used the mCRL2 language and toolset to model the behavior of two related DIRAC subsystems: the workload and storage management system. Based on process algebra, mCRL2 allows defining custom data types as well as functions over these. This makes it suitable for modeling the data manipulations made by DIRAC's agents. By visualizing the state space and replaying scenarios with the toolkit's simulator, we have detected race-conditions and deadlocks in these systems, which, in several cases, were confirmed to occur in the reality. Several properties of interest were formulated and verified with the tool. Our future direction is automating the translation from DIRAC to a formal model.

  13. Algebraic model checking for Boolean gene regulatory networks.

    Science.gov (United States)

    Tran, Quoc-Nam

    2011-01-01

    We present a computational method in which modular and Groebner bases (GB) computation in Boolean rings are used for solving problems in Boolean gene regulatory networks (BN). In contrast to other known algebraic approaches, the degree of intermediate polynomials during the calculation of Groebner bases using our method will never grow resulting in a significant improvement in running time and memory space consumption. We also show how calculation in temporal logic for model checking can be done by means of our direct and efficient Groebner basis computation in Boolean rings. We present our experimental results in finding attractors and control strategies of Boolean networks to illustrate our theoretical arguments. The results are promising. Our algebraic approach is more efficient than the state-of-the-art model checker NuSMV on BNs. More importantly, our approach finds all solutions for the BN problems.

  14. Transformation of UML Behavioral Diagrams to Support Software Model Checking

    Directory of Open Access Journals (Sweden)

    Luciana Brasil Rebelo dos Santos

    2014-04-01

    Full Text Available Unified Modeling Language (UML is currently accepted as the standard for modeling (object-oriented software, and its use is increasing in the aerospace industry. Verification and Validation of complex software developed according to UML is not trivial due to complexity of the software itself, and the several different UML models/diagrams that can be used to model behavior and structure of the software. This paper presents an approach to transform up to three different UML behavioral diagrams (sequence, behavioral state machines, and activity into a single Transition System to support Model Checking of software developed in accordance with UML. In our approach, properties are formalized based on use case descriptions. The transformation is done for the NuSMV model checker, but we see the possibility in using other model checkers, such as SPIN. The main contribution of our work is the transformation of a non-formal language (UML to a formal language (language of the NuSMV model checker towards a greater adoption in practice of formal methods in software development.

  15. Take the Reins on Model Quality with ModelCHECK and Gatekeeper

    Science.gov (United States)

    Jones, Corey

    2012-01-01

    Model quality and consistency has been an issue for us due to the diverse experience level and imaginative modeling techniques of our users. Fortunately, setting up ModelCHECK and Gatekeeper to enforce our best practices has helped greatly, but it wasn't easy. There were many challenges associated with setting up ModelCHECK and Gatekeeper including: limited documentation, restrictions within ModelCHECK, and resistance from end users. However, we consider ours a success story. In this presentation we will describe how we overcame these obstacles and present some of the details of how we configured them to work for us.

  16. Sanity check for NN bound states in lattice QCD with Lüscher’s finite volume formula – Disclosing Symptoms of Fake Plateaux –

    Directory of Open Access Journals (Sweden)

    Aoki Sinya

    2018-01-01

    Full Text Available The sanity check is to rule out certain classes of obviously false results, not to catch every possible error. After reviewing such a sanity check for NN bound states with the Lüscher’s finite volume formula [1–3], we give further evidences for the operator dependence of plateaux, a symptom of the fake plateau problem, against the claim [4]. We then present our critical comments on [5] by NPLQCD: (i Operator dependences of plateaux in NPL2013 [6, 7] exist with the P value of 4–5%. (ii The volume independence of plateaux in NPL2013 does not prove their correctness. (iii Effective range expansions (EREs in NPL2013 violate the physical pole condition. (iv Their comment is partly based on new data and analysis different from the original ones. (v Their new ERE does not satisfy the Lüscher’s finite volume formula.

  17. A Formal Approach for RT-DVS Algorithms Evaluation Based on Statistical Model Checking

    Directory of Open Access Journals (Sweden)

    Shengxin Dai

    2015-01-01

    Full Text Available Energy saving is a crucial concern in embedded real time systems. Many RT-DVS algorithms have been proposed to save energy while preserving deadline guarantees. This paper presents a novel approach to evaluate RT-DVS algorithms using statistical model checking. A scalable framework is proposed for RT-DVS algorithms evaluation, in which the relevant components are modeled as stochastic timed automata, and the evaluation metrics including utilization bound, energy efficiency, battery awareness, and temperature awareness are expressed as statistical queries. Evaluation of these metrics is performed by verifying the corresponding queries using UPPAAL-SMC and analyzing the statistical information provided by the tool. We demonstrate the applicability of our framework via a case study of five classical RT-DVS algorithms.

  18. Models and Techniques for Proving Data Structure Lower Bounds

    DEFF Research Database (Denmark)

    Larsen, Kasper Green

    In this dissertation, we present a number of new techniques and tools for proving lower bounds on the operational time of data structures. These techniques provide new lines of attack for proving lower bounds in both the cell probe model, the group model, the pointer machine model and the I...... bound of tutq = (lgd􀀀1 n). For ball range searching, we get a lower bound of tutq = (n1􀀀1=d). The highest previous lower bound proved in the group model does not exceed ((lg n= lg lg n)2) on the maximum of tu and tq. Finally, we present a new technique for proving lower bounds....../O-model. In all cases, we push the frontiers further by proving lower bounds higher than what could possibly be proved using previously known techniques. For the cell probe model, our results have the following consequences: The rst (lg n) query time lower bound for linear space static data structures...

  19. Simple nonparametric checks for model data fit in CAT

    NARCIS (Netherlands)

    Meijer, R.R.

    2005-01-01

    In this paper, the usefulness of several nonparametric checks is discussed in a computerized adaptive testing (CAT) context. Although there is no tradition of nonparametric scalability in CAT, it can be argued that scalability checks can be useful to investigate, for example, the quality of item

  20. Model Checking of a Diabetes-Cancer Model

    Science.gov (United States)

    Gong, Haijun; Zuliani, Paolo; Clarke, Edmund M.

    2011-06-01

    Accumulating evidence suggests that cancer incidence might be associated with diabetes mellitus, especially Type II diabetes which is characterized by hyperinsulinaemia, hyperglycaemia, obesity, and overexpression of multiple WNT pathway components. These diabetes risk factors can activate a number of signaling pathways that are important in the development of different cancers. To systematically understand the signaling components that link diabetes and cancer risk, we have constructed a single-cell, Boolean network model by integrating the signaling pathways that are influenced by these risk factors to study insulin resistance, cancer cell proliferation and apoptosis. Then, we introduce and apply the Symbolic Model Verifier (SMV), a formal verification tool, to qualitatively study some temporal logic properties of our diabetes-cancer model. The verification results show that the diabetes risk factors might not increase cancer risk in normal cells, but they will promote cell proliferation if the cell is in a precancerous or cancerous stage characterized by losses of the tumor-suppressor proteins ARF and INK4a.

  1. Temperature bounds in a model of laminar flames

    International Nuclear Information System (INIS)

    Kirane, M.; Badraoui, S.

    1994-06-01

    We consider reaction-diffusion equations coupling temperature and mass fraction in one-step-reaction model of combustion in R N . Uniform temperature bounds are derived when the Lewis number is less than one. This result completes the case of Lewis number greater than one studied by J.D. Avrin and M. Kirane ''Temperature growth and temperature bounds in special cases of combustion models'' (to appear in Applicable Analysis). (author). 5 refs

  2. A gauged baby Skyrme model and a novel BPS bound

    International Nuclear Information System (INIS)

    Adam, C; Naya, C; Sanchez-Guillen, J; Wereszczynski, A

    2013-01-01

    The baby Skyrme model is a well-known nonlinear field theory supporting topological solitons in two space dimensions. Its action functional consist of a potential term, a kinetic term quadratic in derivatives (the 'nonlinear sigma model term') and the Skyrme term quartic in first derivatives. The limiting case of vanishing sigma model term (the so-called BPS baby Skyrme model) is known to support exact soliton solutions saturating a BPS bound which exists for this model. Further, the BPS model has infinitely many symmetries and conservation laws. Recently it was found that the gauged version of the BPS baby Skyrme model with gauge group U(1) and the usual Maxwell term, too, has a BPS bound and BPS solutions saturating this bound. This BPS bound is determined by a superpotential which has to obey a superpotential equation, in close analogy to the situation in supergravity. Further, the BPS bound and the corresponding BPS solitons only may exist for potentials such that the superpotential equation has a global solution. We also briefly describe some properties of soliton solutions.

  3. Creating Büchi automata for multi-valued model checking

    NARCIS (Netherlands)

    Vijzelaar, Stefan J.J.; Fokkink, Wan J.

    2017-01-01

    In explicit state model checking of linear temporal logic properties, a Büchi automaton encodes a temporal property. It interleaves with a Kripke model to form a state space, which is searched for counterexamples. Multi-valued model checking considers additional truth values beyond the Boolean true

  4. A Model of Boundedly Rational Consumer Choice

    OpenAIRE

    Thomas Riechmann

    2000-01-01

    The paper presents an extended version of the standard textbook problem of consumer choice. As usual, agents have to decide about their desired quatities of various consumption goods, at the same time taking into account their limited budget. Prices for the goods are not fixed but arise from a Walrasian interaction of total demand and a stilized supply function for each of the goods. After showing that this type of model cannot be solved analytically, three different types of evolutionary alg...

  5. Electrostatic charge bounds for ball lightning models

    International Nuclear Information System (INIS)

    Stephan, Karl D

    2008-01-01

    Several current theories concerning the nature of ball lightning predict a substantial electrostatic charge in order to account for its observed motion and shape (Turner 1998 Phys. Rep. 293 1; Abrahamson and Dinniss 2000 Nature 403 519). Using charged soap bubbles as a physical model for ball lightning, we show that the magnitude of charge predicted by some of these theories is too high to allow for the types of motion commonly observed in natural ball lightning, which includes horizontal motion above the ground and movement near grounded conductors. Experiments show that at charge levels of only 10-15 nC, 3-cm-diameter soap bubbles tend to be attracted by induced charges to the nearest grounded conductor and rupture. We conclude with a scaling rule that can be used to extrapolate these results to larger objects and surroundings

  6. Quantitative Analysis of Probabilistic Models of Software Product Lines with Statistical Model Checking

    DEFF Research Database (Denmark)

    ter Beek, Maurice H.; Legay, Axel; Lluch Lafuente, Alberto

    2015-01-01

    We investigate the suitability of statistical model checking techniques for analysing quantitative properties of software product line models with probabilistic aspects. For this purpose, we enrich the feature-oriented language FLAN with action rates, which specify the likelihood of exhibiting pa...

  7. WCET Analysis of ARM Processors using Real-Time Model Checking

    DEFF Research Database (Denmark)

    Toft, Martin; Olesen, Mads Christian; Dalsgaard, Andreas

    2009-01-01

    This paper presents a flexible method that utilises real-time model checking to determine safe and sharp WCETs for processes running on hardware platforms featuring pipelining and caching.......This paper presents a flexible method that utilises real-time model checking to determine safe and sharp WCETs for processes running on hardware platforms featuring pipelining and caching....

  8. Hyperon polarizabilities in the bound-state soliton model

    International Nuclear Information System (INIS)

    Gobbi, C.; Scoccola, N.N.

    1996-01-01

    A detailed calculation of electric and magnetic static polarizabilities of octet hyperons is presented in the framework of the bound-state soliton model. Both seagull and dispersive contributions are considered, and the results are compared with different model predictions. (orig.)

  9. PVeStA: A Parallel Statistical Model Checking and Quantitative Analysis Tool

    KAUST Repository

    AlTurki, Musab

    2011-01-01

    Statistical model checking is an attractive formal analysis method for probabilistic systems such as, for example, cyber-physical systems which are often probabilistic in nature. This paper is about drastically increasing the scalability of statistical model checking, and making such scalability of analysis available to tools like Maude, where probabilistic systems can be specified at a high level as probabilistic rewrite theories. It presents PVeStA, an extension and parallelization of the VeStA statistical model checking tool [10]. PVeStA supports statistical model checking of probabilistic real-time systems specified as either: (i) discrete or continuous Markov Chains; or (ii) probabilistic rewrite theories in Maude. Furthermore, the properties that it can model check can be expressed in either: (i) PCTL/CSL, or (ii) the QuaTEx quantitative temporal logic. As our experiments show, the performance gains obtained from parallelization can be very high. © 2011 Springer-Verlag.

  10. The dynamics of Bertrand model with bounded rationality

    International Nuclear Information System (INIS)

    Zhang Jixiang; Da Qingli; Wang Yanhua

    2009-01-01

    The paper considers a Bertrand model with bounded rational. A duopoly game is modelled by two nonlinear difference equations. By using the theory of bifurcations of dynamical systems, the existence and stability for the equilibria of this system are obtained. Numerical simulations used to show bifurcations diagrams, phase portraits for various parameters and sensitive dependence on initial conditions. We observe that an increase of the speed of adjustment of bounded rational player may change the stability of Nash equilibrium point and cause bifurcation and chaos to occur. The analysis and results in this paper are interesting in mathematics and economics.

  11. Using Canonical Forms for Isomorphism Reduction in Graph-based Model Checking

    NARCIS (Netherlands)

    Kant, Gijs

    Graph isomorphism checking can be used in graph-based model checking to achieve symmetry reduction. Instead of one-to-one comparing the graph representations of states, canonical forms of state graphs can be computed. These canonical forms can be used to store and compare states. However, computing

  12. Vulnerable Derivatives and Good Deal Bounds: A Structural Model

    DEFF Research Database (Denmark)

    Murgoci, Agatha

    2013-01-01

    We price vulnerable derivatives -- i.e. derivatives where the counterparty may default. These are basically the derivatives traded on the over-the-counter (OTC) markets. Default is modeled in a structural framework. The technique employed for pricing is good deal bounds (GDBs). The method imposes...

  13. Cryptography In The Bounded Quantum-Storage Model

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Schaffner, Christian

    2005-01-01

    We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size. We show that oblivious transfer and bit commitment can be implemented in this model using protocols where honest parties need no quantum memory...

  14. Cryptography in the Bounded Quantum-Storage Model

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Serge, Fehr; Schaffner, Christian

    2008-01-01

    We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size. We show that oblivious transfer and bit commitment can be implemented in this model using protocols where honest parties need no quantum memory...

  15. Stieltjes electrostatic model interpretation for bound state problems

    Indian Academy of Sciences (India)

    In this paper, it is shown that Stieltjes electrostatic model and quantum Hamilton Jacobi formalism are analogous to each other. This analogy allows the bound state problem to mimic as unit moving imaginary charges i ℏ , which are placed in between the two fixed imaginary charges arising due to the classical turning ...

  16. Re-derived overclosure bound for the inert doublet model

    Science.gov (United States)

    Biondini, S.; Laine, M.

    2017-08-01

    We apply a formalism accounting for thermal effects (such as modified Sommerfeld effect; Salpeter correction; decohering scatterings; dissociation of bound states), to one of the simplest WIMP-like dark matter models, associated with an "inert" Higgs doublet. A broad temperature range T ˜ M/20 . . . M/104 is considered, stressing the importance and less-understood nature of late annihilation stages. Even though only weak interactions play a role, we find that resummed real and virtual corrections increase the tree-level overclosure bound by 1 . . . 18%, depending on quartic couplings and mass splittings.

  17. Lower Bounds in the Asymmetric External Memory Model

    DEFF Research Database (Denmark)

    Jacob, Riko; Sitchinava, Nodari

    2017-01-01

    Motivated by the asymmetric read and write costs of emerging non-volatile memory technologies, we study lower bounds for the problems of sorting, permuting and multiplying a sparse matrix by a dense vector in the asymmetric external memory model (AEM). Given an AEM with internal (symmetric) memory...... of size M, transfers between symmetric and asymmetric memory in blocks of size B and the ratio ω between write and read costs, we show Ω(min (N, ωN/B logω M/B N/B) lower bound for the cost of permuting N input elements. This lower bound also applies to the problem of sorting N elements. This proves...

  18. Model independent bounds on magnetic moments of Majorana neutrinos

    International Nuclear Information System (INIS)

    Bell, Nicole F.; Gorchtein, Mikhail; Ramsey-Musolf, Michael J.; Vogel, Petr; Wang, Peng

    2006-01-01

    We analyze the implications of neutrino masses for the magnitude of neutrino magnetic moments. By considering electroweak radiative corrections to the neutrino mass, we derive model-independent naturalness upper bounds on neutrino magnetic moments, μ ν , generated by physics above the electroweak scale. For Dirac neutrinos, the bound is several orders of magnitude more stringent than present experimental limits. However, for Majorana neutrinos the magnetic moment contribution to the mass is Yukawa suppressed. The bounds we derive for magnetic moments of Majorana neutrinos are weaker than present experimental limits if μ ν is generated by new physics at ∼1 TeV, and surpass current experimental sensitivity only for new physics scales >10-100 TeV. The discovery of a neutrino magnetic moment near present limits would thus signify that neutrinos are Majorana particles

  19. LHCb: Analysing DIRAC's Behavior using Model Checking with Process Algebra

    CERN Multimedia

    Remenska, Daniela

    2012-01-01

    DIRAC is the Grid solution designed to support LHCb production activities as well as user data analysis. Based on a service-oriented architecture, DIRAC consists of many cooperating distributed services and agents delivering the workload to the Grid resources. Services accept requests from agents and running jobs, while agents run as light-weight components, fulfilling specific goals. Services maintain database back-ends to store dynamic state information of entities such as jobs, queues, staging requests, etc. Agents use polling to check for changes in the service states, and react to these accordingly. A characteristic of DIRAC's architecture is the relatively low complexity in the logic of each agent; the main source of complexity lies in their cooperation. These agents run concurrently, and communicate using the services' databases as a shared memory for synchronizing the state transitions. Although much effort is invested in making DIRAC reliable, entities occasionally get into inconsistent states, leadi...

  20. Checking the new IRI model: The bottomside B parameters

    International Nuclear Information System (INIS)

    Mosert, M.; Buresova, D.; Miro, G.; Lazo, B.; Ezquer, R.

    2003-01-01

    Electron density profiles obtained at Pruhonice (50.0, 15.0), El Arenosillo (37.1, 353.2) and Havana (23, 278) were used to check the bottom-side B parameters BO (thickness parameter) and B1 (shape parameter) predicted by the new IRI - 2000 version. The electron density profiles were derived from ionograms using the ARP technique. The data base includes daytime and nighttime ionograms recorded under different seasonal and solar activity conditions. Comparisons with IRI predictions were also done. The analysis shows that: a) The parameter B1 given by IRI 2000 reproduces better the observed ARP values than the IRI-90 version and b) The observed BO values are in general well reproduced by both IRI versions: IRI-90 and IRI-2000. (author)

  1. Checking the new IRI model The bottomside B parameters

    CERN Document Server

    Mosert, M; Ezquer, R; Lazo, B; Miro, G

    2002-01-01

    Electron density profiles obtained at Pruhonice (50.0, 15.0), El Arenosillo (37.1, 353.2) and Havana (23, 278) were used to check the bottom-side B parameters BO (thickness parameter) and B1 (shape parameter) predicted by the new IRI - 2000 version. The electron density profiles were derived from ionograms using the ARP technique. The data base includes daytime and nighttime ionograms recorded under different seasonal and solar activity conditions. Comparisons with IRI predictions were also done. The analysis shows that: a) The parameter B1 given by IRI 2000 reproduces better the observed ARP values than the IRI-90 version and b) The observed BO values are in general well reproduced by both IRI versions: IRI-90 and IRI-2000.

  2. Development of a butterfly check valve model under natural circulation conditions

    International Nuclear Information System (INIS)

    Rao, Yuxian; Yu, Lei; Fu, Shengwei; Zhang, Fan

    2015-01-01

    Highlights: • Bases on Lim’s swing check valve model, a butterfly check valve model was developed. • The method to quantify the friction torque T F in Li’s model was corrected. • The developed model was implemented into the RELAP5 code and verified. - Abstract: A butterfly check valve is widely used to prevent a reverse flow in the pipe lines of a marine nuclear power plant. Under some conditions, the natural circulation conditions in particular, the fluid velocity through the butterfly check valve might become too low to hold the valve disk fully open, thereby the flow resistance of the butterfly check valve varies with the location of the valve disk and as a result the fluid flow is significantly affected by the dynamic motion of the valve disk. Simulation of a pipe line that includes some butterfly check valves, especially under natural circulation conditions, is thus complicated. This paper focuses on the development of a butterfly check valve model to enhance the capability of the thermal–hydraulic system code and the developed model is implemented into the RELAP5 code. Both steady-state calculations and transient calculations were carried out for the primary loop system of a marine nuclear power plant and the calculation results are compared with the experimental data for verification purpose. The simulation results show an agreement with the experimental data

  3. Integrating model checking with HiP-HOPS in model-based safety analysis

    International Nuclear Information System (INIS)

    Sharvia, Septavera; Papadopoulos, Yiannis

    2015-01-01

    The ability to perform an effective and robust safety analysis on the design of modern safety–critical systems is crucial. Model-based safety analysis (MBSA) has been introduced in recent years to support the assessment of complex system design by focusing on the system model as the central artefact, and by automating the synthesis and analysis of failure-extended models. Model checking and failure logic synthesis and analysis (FLSA) are two prominent MBSA paradigms. Extensive research has placed emphasis on the development of these techniques, but discussion on their integration remains limited. In this paper, we propose a technique in which model checking and Hierarchically Performed Hazard Origin and Propagation Studies (HiP-HOPS) – an advanced FLSA technique – can be applied synergistically with benefit for the MBSA process. The application of the technique is illustrated through an example of a brake-by-wire system. - Highlights: • We propose technique to integrate HiP-HOPS and model checking. • State machines can be systematically constructed from HiP-HOPS. • The strengths of different MBSA techniques are combined. • Demonstrated through modeling and analysis of brake-by-wire system. • Root cause analysis is automated and system dynamic behaviors analyzed and verified

  4. Deterministic Compilation of Temporal Safety Properties in Explicit State Model Checking

    Data.gov (United States)

    National Aeronautics and Space Administration — The translation of temporal logic specifications constitutes an essen- tial step in model checking and a major influence on the efficiency of formal verification via...

  5. Efficient Symmetry Reduction and the Use of State Symmetries for Symbolic Model Checking

    Directory of Open Access Journals (Sweden)

    Christian Appold

    2010-06-01

    Full Text Available One technique to reduce the state-space explosion problem in temporal logic model checking is symmetry reduction. The combination of symmetry reduction and symbolic model checking by using BDDs suffered a long time from the prohibitively large BDD for the orbit relation. Dynamic symmetry reduction calculates representatives of equivalence classes of states dynamically and thus avoids the construction of the orbit relation. In this paper, we present a new efficient model checking algorithm based on dynamic symmetry reduction. Our experiments show that the algorithm is very fast and allows the verification of larger systems. We additionally implemented the use of state symmetries for symbolic symmetry reduction. To our knowledge we are the first who investigated state symmetries in combination with BDD based symbolic model checking.

  6. PVeStA: A Parallel Statistical Model Checking and Quantitative Analysis Tool

    KAUST Repository

    AlTurki, Musab; Meseguer, José

    2011-01-01

    Statistical model checking is an attractive formal analysis method for probabilistic systems such as, for example, cyber-physical systems which are often probabilistic in nature. This paper is about drastically increasing the scalability

  7. PENERAPAN MODEL PEMBELAJARAN KOOPERATIF TIPE PAIR CHECKS PEMECAHAN MASALAH UNTUK MENINGKATKAN SOCIAL SKILL SISWA

    OpenAIRE

    R. Lestari; S. Linuwih

    2012-01-01

    Tujuan penelitian tindakan kelas ini untuk mengetahui pengaruh proses pembelajaran dengan menggunakan model pembelajaran kooperatif tipe Pair Checks pemecahan masalah terhadap peningkatan social skill siswa. Pada proses penerapan model pembelajaran kooperatif tipe Pair Checks pemecahan masalah siswa dibagi dalam kelompok-kelompok dan satu kelompok terdiri dari dua orang. Setiap kelompok berdiskusi untuk menyelesaikan suatu masalah, kemudian hasil diskusi kelompok akan dicek oleh pasangan dari...

  8. Phase Two Feasibility Study for Software Safety Requirements Analysis Using Model Checking

    Science.gov (United States)

    Turgeon, Gregory; Price, Petra

    2010-01-01

    A feasibility study was performed on a representative aerospace system to determine the following: (1) the benefits and limitations to using SCADE , a commercially available tool for model checking, in comparison to using a proprietary tool that was studied previously [1] and (2) metrics for performing the model checking and for assessing the findings. This study was performed independently of the development task by a group unfamiliar with the system, providing a fresh, external perspective free from development bias.

  9. Model-checking statistique pour la vérification de véhicules autonomes

    OpenAIRE

    Barbot , Benoît; Bérard , Béatrice; Duplouy , Yann; Haddad , Serge

    2017-01-01

    National audience; We present an application of statistical model-checking to the verification of an autonomous vehicle controller. Our goal is to check safety properties in various traffic situations. More specifically, we focus on a traffic jam situation. The controller is specified by a C++ program. Using sensors, it registers positions and velocities of nearby vehicles and modifies the position and velocity of the controlled vehicle to avoid collisions. We model the environment using a st...

  10. Possible check of the QCD parton model in semiinclusive μ- -production of tau/psi-meson

    International Nuclear Information System (INIS)

    Bagdasaryan, I.A.; Grigoryan, S.G.; Yesaibegyan, S.V.

    1982-01-01

    The process of tau/psi meson production in the semi-inclusive μN → μ+tau/psi+X interaction is discussed. It is shown that the measurement of azimuthal asymmetry in semi-inclusive production of tau/psi can serve as a good test for the check of the QCD parton model. An additional method of the check of distribution gluon functions in photon-gluon fusion model is suggested

  11. Generalized Skyrme model with the loosely bound potential

    Science.gov (United States)

    Gudnason, Sven Bjarke; Zhang, Baiyang; Ma, Nana

    2016-12-01

    We study a generalization of the loosely bound Skyrme model which consists of the Skyrme model with a sixth-order derivative term—motivated by its fluidlike properties—and the second-order loosely bound potential—motivated by lowering the classical binding energies of higher-charged Skyrmions. We use the rational map approximation for the Skyrmion of topological charge B =4 , calculate the binding energy of the latter, and estimate the systematic error in using this approximation. In the parameter space that we can explore within the rational map approximation, we find classical binding energies as low as 1.8%, and once taking into account the contribution from spin-isospin quantization, we obtain binding energies as low as 5.3%. We also calculate the contribution from the sixth-order derivative term to the electric charge density and axial coupling.

  12. Model checking methodology for large systems, faults and asynchronous behaviour. SARANA 2011 work report

    International Nuclear Information System (INIS)

    Lahtinen, J.; Launiainen, T.; Heljanko, K.; Ropponen, J.

    2012-01-01

    Digital instrumentation and control (I and C) systems are challenging to verify. They enable complicated control functions, and the state spaces of the models easily become too large for comprehensive verification through traditional methods. Model checking is a formal method that can be used for system verification. A number of efficient model checking systems are available that provide analysis tools to determine automatically whether a given state machine model satisfies the desired safety properties. This report reviews the work performed in the Safety Evaluation and Reliability Analysis of Nuclear Automation (SARANA) project in 2011 regarding model checking. We have developed new, more exact modelling methods that are able to capture the behaviour of a system more realistically. In particular, we have developed more detailed fault models depicting the hardware configuration of a system, and methodology to model function-block-based systems asynchronously. In order to improve the usability of our model checking methods, we have developed an algorithm for model checking large modular systems. The algorithm can be used to verify properties of a model that could otherwise not be verified in a straightforward manner. (orig.)

  13. Model checking methodology for large systems, faults and asynchronous behaviour. SARANA 2011 work report

    Energy Technology Data Exchange (ETDEWEB)

    Lahtinen, J. [VTT Technical Research Centre of Finland, Espoo (Finland); Launiainen, T.; Heljanko, K.; Ropponen, J. [Aalto Univ., Espoo (Finland). Dept. of Information and Computer Science

    2012-07-01

    Digital instrumentation and control (I and C) systems are challenging to verify. They enable complicated control functions, and the state spaces of the models easily become too large for comprehensive verification through traditional methods. Model checking is a formal method that can be used for system verification. A number of efficient model checking systems are available that provide analysis tools to determine automatically whether a given state machine model satisfies the desired safety properties. This report reviews the work performed in the Safety Evaluation and Reliability Analysis of Nuclear Automation (SARANA) project in 2011 regarding model checking. We have developed new, more exact modelling methods that are able to capture the behaviour of a system more realistically. In particular, we have developed more detailed fault models depicting the hardware configuration of a system, and methodology to model function-block-based systems asynchronously. In order to improve the usability of our model checking methods, we have developed an algorithm for model checking large modular systems. The algorithm can be used to verify properties of a model that could otherwise not be verified in a straightforward manner. (orig.)

  14. Minimal Z' models: present bounds and early LHC reach

    International Nuclear Information System (INIS)

    Salvioni, Ennio; Zwirner, Fabio; Villadoro, Giovanni

    2009-01-01

    We consider 'minimal' Z' models, whose phenomenology is controlled by only three parameters beyond the Standard Model ones: the Z' mass and two effective coupling constants. They encompass many popular models motivated by grand unification, as well as many arising in other theoretical contexts. This parameterization takes also into account both mass and kinetic mixing effects, which we show to be sizable in some cases. After discussing the interplay between the bounds from electroweak precision tests and recent direct searches at the Tevatron, we extend our analysis to estimate the early LHC discovery potential. We consider a center-of-mass energy from 7 towards 10 TeV and an integrated luminosity from 50 to several hundred pb -1 , taking all existing bounds into account. We find that the LHC will start exploring virgin land in parameter space for M Z' around 700 GeV, with lower masses still excluded by the Tevatron and higher masses still excluded by electroweak precision tests. Increasing the energy up to 10 TeV, the LHC will start probing a wider range of Z' masses and couplings, although several hundred pb -1 will be needed to explore the regions of couplings favored by grand unification and to overcome the Tevatron bounds in the mass region around 250 GeV.

  15. On Diagnostic Checking of Vector ARMA-GARCH Models with Gaussian and Student-t Innovations

    Directory of Open Access Journals (Sweden)

    Yongning Wang

    2013-04-01

    Full Text Available This paper focuses on the diagnostic checking of vector ARMA (VARMA models with multivariate GARCH errors. For a fitted VARMA-GARCH model with Gaussian or Student-t innovations, we derive the asymptotic distributions of autocorrelation matrices of the cross-product vector of standardized residuals. This is different from the traditional approach that employs only the squared series of standardized residuals. We then study two portmanteau statistics, called Q1(M and Q2(M, for model checking. A residual-based bootstrap method is provided and demonstrated as an effective way to approximate the diagnostic checking statistics. Simulations are used to compare the performance of the proposed statistics with other methods available in the literature. In addition, we also investigate the effect of GARCH shocks on checking a fitted VARMA model. Empirical sizes and powers of the proposed statistics are investigated and the results suggest a procedure of using jointly Q1(M and Q2(M in diagnostic checking. The bivariate time series of FTSE 100 and DAX index returns is used to illustrate the performance of the proposed portmanteau statistics. The results show that it is important to consider the cross-product series of standardized residuals and GARCH effects in model checking.

  16. Modelling Ca2+ bound Troponin in Excitation Contraction Coupling

    Directory of Open Access Journals (Sweden)

    Henry G. Zot

    2016-09-01

    Full Text Available To explain disparate decay rates of cytosolic Ca2+ and structural changes in the thin filaments during a twitch, we model the time course of Ca2+ bound troponin (Tn resulting from the free Ca2+ transient of fast skeletal muscle. In fibers stretched beyond overlap, the decay of Ca2+ as measured by a change in fluo 3 fluorescence is significantly slower than the intensity decay of the meridional 1/38.5 nm-1 reflection of Tn; this is not simply explained by considering only the Ca2+ binding properties of Tn alone (Matsuo, T., Iwamoto, H., and Yagi, N. (2010. Biophys. J. 99, 193-200. We apply a comprehensive model that includes the known Ca2+ binding properties of Tn in the context of the thin filament with and without cycling crossbridges. Calculations based on the model predict that the transient of Ca2+ bound Tn correlates with either the fluo 3 time course in muscle with overlapping thin and thick filaments or the intensity of the meridional 1/38.5 nm-1 reflection in overstretched muscle. Hence, cycling crossbridges delay the dissociation of Ca2+ from Tn. Correlation with the fluo 3 fluorescence change is not causal given that the transient of Ca2+ bound Tn depends on sarcomere length, whereas the fluo-3 fluorescence change does not. Transient positions of tropomyosin calculated from the time course of Ca2+ bound Tn are in reasonable agreement with the transient of measured perturbations of the Tn repeat in overlap and non-overlap muscle preparations.

  17. Model based feasibility study on bidirectional check valves in wave energy converters

    DEFF Research Database (Denmark)

    Hansen, Anders Hedegaard; Pedersen, Henrik C.; Andersen, Torben Ole

    2014-01-01

    Discrete fluid power force systems have been proposed as the primary stage for Wave Energy Converters (WEC’s) when converting ocean waves into electricity, this to improve the overall efficiency of wave energy devices. This paper presents a model based feasibility study of using bidirectional check....../Off and bidirectional check valves. Based on the analysis it is found that the energy production may be slightly improved by using bidirectional check valves as compared to on/off valves, due to a decrease in switching losses. Furthermore a reduction in high flow peaks are realised. The downside being increased...

  18. P2-16: Dual-Bound Model and the Role of Time Bound in Perceptual Decision Making

    Directory of Open Access Journals (Sweden)

    Daeseob Lim

    2012-10-01

    Full Text Available The diffusion model (DM encapsulates the dynamics of perceptual decision within a ‘diffusion field’ that is defined by a basis with sensory-evidence (SE and time vectors. At the core of the DM, it assumes that a decision is not made until an evidence particle drifts in the diffusion field and eventually hits one of the two pre-fixed bounds defined in the SE axis. This assumption dictates when and which choice is made by referring to when and which bound will be hit by the evidence particle. What if urgency pressures the decision system to make a choice even when the evidence particle has yet hit the SE bound? Previous modeling attempts at coping with time pressure, despite differences in detail, all manipulated the coordinate of SE bounds. Here, we offer a novel solution by adopting another bound on the time axis. This ‘dual-bound’ model (DBM posits that decisions can also be made when the evidence particle hits a time bound, which is determined on a trial-by-trial basis by a ‘perceived time interval’ – how long the system can stay in the ‘diffusion’ field. The classic single-bound model (SBM exhibited systematic errors in predicting both the reaction time distributions and the time-varying bias in choice. Those errors were not corrected by previously proposed variants of the SBM until the time bound was introduced. The validity of the DBM was further supported by the strong across-individual correlation between observed precision of interval timing and the predicted trial-by-trial variability of the time bound.

  19. Closing open SDL-systems for model checking with DTSpin

    NARCIS (Netherlands)

    N. Ioustinova (Natalia); N. Sidorova; M. Steffen

    2002-01-01

    textabstractModel checkers like Spin can handle closed reactive systems, only. Thus to handle open systems, in particular when using assume-guarantee reasoning, we need to be able to close (sub-)systems, which is commonly done by adding an environment process. For models with asynchronous

  20. Modelling and Analysis of Smart Grid: A Stochastic Model Checking Case Study

    DEFF Research Database (Denmark)

    Yuksel, Ender; Zhu, Huibiao; Nielson, Hanne Riis

    2012-01-01

    that require novel methods and applications. In this context, an important issue is the verification of certain quantitative properties of the system. In this paper, we consider a specific Chinese Smart Grid implementation as a case study and address the verification problem for performance and energy......Cyber-physical systems integrate information and communication technology functions to the physical elements of a system for monitoring and controlling purposes. The conversion of traditional power grid into a smart grid, a fundamental example of a cyber-physical system, raises a number of issues...... consumption. We employ stochastic model checking approach and present our modelling and analysis study using PRISM model checker....

  1. Quantitative modelling and analysis of a Chinese smart grid: a stochastic model checking case study

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    2014-01-01

    Cyber-physical systems integrate information and communication technology with the physical elements of a system, mainly for monitoring and controlling purposes. The conversion of traditional power grid into a smart grid, a fundamental example of a cyber-physical system, raises a number of issues...... that require novel methods and applications. One of the important issues in this context is the verification of certain quantitative properties of the system. In this paper, we consider a specific Chinese smart grid implementation as a case study and address the verification problem for performance and energy...... consumption.We employ stochastic model checking approach and present our modelling and analysis study using PRISM model checker....

  2. Model-Checking Real-Time Control Programs

    DEFF Research Database (Denmark)

    Iversen, T. K.; Kristoffersen, K. J.; Larsen, Kim Guldstrand

    2000-01-01

    In this paper, we present a method for automatic verification of real-time control programs running on LEGO(R) RCX(TM) bricks using the verification tool UPPALL. The control programs, consisting of a number of tasks running concurrently, are automatically translated into the mixed automata model...... of UPPAAL. The fixed scheduling algorithm used by the LEGO(R) RCX(TM) processor is modeled in UPPALL, and supply of similar (sufficient) timed automata models for the environment allows analysis of the overall real-time system using the tools of UPPALL. To illustrate our technique for sorting LEGO(R) bricks...

  3. Parameter discovery in stochastic biological models using simulated annealing and statistical model checking.

    Science.gov (United States)

    Hussain, Faraz; Jha, Sumit K; Jha, Susmit; Langmead, Christopher J

    2014-01-01

    Stochastic models are increasingly used to study the behaviour of biochemical systems. While the structure of such models is often readily available from first principles, unknown quantitative features of the model are incorporated into the model as parameters. Algorithmic discovery of parameter values from experimentally observed facts remains a challenge for the computational systems biology community. We present a new parameter discovery algorithm that uses simulated annealing, sequential hypothesis testing, and statistical model checking to learn the parameters in a stochastic model. We apply our technique to a model of glucose and insulin metabolism used for in-silico validation of artificial pancreata and demonstrate its effectiveness by developing parallel CUDA-based implementation for parameter synthesis in this model.

  4. Bounds for perpetual American option prices in a jump diffusion model

    OpenAIRE

    Ekström, Erik

    2006-01-01

    We provide bounds for perpetual American option prices in a jump diffusion model in terms of American option prices in the standard Black-Scholes model. We also investigate the dependence of the bounds on different parameters of the model.

  5. COMPREHENSIVE CHECK MEASUREMENT OF KEY PARAMETERS ON MODEL BELT CONVEYOR

    Directory of Open Access Journals (Sweden)

    Vlastimil MONI

    2013-07-01

    Full Text Available Complex measurements of characteristic parameters realised on a long distance model belt conveyor are described. The main objective was to complete and combine the regular measurements of electric power on drives of belt conveyors operated in Czech opencast mines with measurements of other physical quantities and to gain by this way an image of their mutual relations and relations of quantities derived from them. The paper includes a short description and results of the measurements on an experimental model conveyor with a closed material transport way.

  6. Dynamic Delayed Duplicate Detection for External Memory Model Checking

    DEFF Research Database (Denmark)

    Evangelista, Sami

    2008-01-01

    Duplicate detection is an expensive operation of disk-based model checkers. It consists of comparing some potentially new states, the candidate states, to previous visited states. We propose a new approach to this technique called dynamic delayed duplicate detection. This one exploits some typical...

  7. Model Checking Geographically Distributed Interlocking Systems Using UMC

    DEFF Research Database (Denmark)

    Fantechi, Alessandro; Haxthausen, Anne Elisabeth; Nielsen, Michel Bøje Randahl

    2017-01-01

    the relevant distributed protocols. By doing that we obey the safety guidelines of the railway signalling domain, that require formal methods to support the certification of such products. We also show how formal modelling can help designing alternative distributed solutions, while maintaining adherence...

  8. Hypersonic: Model Analysis and Checking in the Cloud

    DEFF Research Database (Denmark)

    Acretoaie, Vlad; Störrle, Harald

    2014-01-01

    ”. Objective: In this paper we investigate the conceptual and technical feasibility of a new software architecture for modeling tools, where certain advanced features are factored out of the client and moved towards the Cloud. With this approach we plan to address the above mentioned drawbacks of existing...

  9. CSL model checking of deterministic and stochastic Petri nets

    NARCIS (Netherlands)

    Martinez Verdugo, J.M.; Haverkort, Boudewijn R.H.M.; German, R.; Heindl, A.

    2006-01-01

    Deterministic and Stochastic Petri Nets (DSPNs) are a widely used high-level formalism for modeling discrete-event systems where events may occur either without consuming time, after a deterministic time, or after an exponentially distributed time. The underlying process dened by DSPNs, under

  10. Dynamic Delayed Duplicate Detection for External Memory Model Checking

    DEFF Research Database (Denmark)

    Evangelista, Sami

    2008-01-01

    Duplicate detection is an expensive operation of disk-based model checkers. It consists of comparing some potentially new states, the candidate states, to previous visited states. We propose a new approach to this technique called dynamic delayed duplicate detection. This one exploits some typica...... significantly better than some previously published algorithms....

  11. UML Statechart Fault Tree Generation By Model Checking

    DEFF Research Database (Denmark)

    Herbert, Luke Thomas; Herbert-Hansen, Zaza Nadja Lee

    of the popular Business Process Modelling and Nota-tion (BPMN) language. To capture uncertainty and unreliability in workflows, we extend this formalism with probabilistic non-deterministic branching.We present an algorithm that allows for exhaustive gen-eration of possible error states that could arise in ex...

  12. Model checking the FlexRay startup phase

    NARCIS (Netherlands)

    Cranen, S.

    2012-01-01

    This report describes a discrete-time model of the startup phase of a FlexRay network. The startup behaviour of this network is analysed in the presence of several faults. It is shown that in certain cases a faulty node can prevent the network from communicating altogether. One previously unknown

  13. Testing Model with "Check Technique" for Physics Education

    Science.gov (United States)

    Demir, Cihat

    2016-01-01

    As the number, date and form of the written tests are structured and teacher-oriented, it is considered that it creates fear and anxiety among the students. It has been found necessary and important to form a testing model which will keep the students away from the test anxiety and allows them to learn only about the lesson. For this study,…

  14. Modeling tides and vertical tidal mixing: A reality check

    International Nuclear Information System (INIS)

    Robertson, Robin

    2010-01-01

    Recently, there has been a great interest in the tidal contribution to vertical mixing in the ocean. In models, vertical mixing is estimated using parameterization of the sub-grid scale processes. Estimates of the vertical mixing varied widely depending on which vertical mixing parameterization was used. This study investigated the performance of ten different vertical mixing parameterizations in a terrain-following ocean model when simulating internal tides. The vertical mixing parameterization was found to have minor effects on the velocity fields at the tidal frequencies, but large effects on the estimates of vertical diffusivity of temperature. Although there was no definitive best performer for the vertical mixing parameterization, several parameterizations were eliminated based on comparison of the vertical diffusivity estimates with observations. The best performers were the new generic coefficients for the generic length scale schemes and Mellor-Yamada's 2.5 level closure scheme.

  15. Using Runtime Analysis to Guide Model Checking of Java Programs

    Science.gov (United States)

    Havelund, Klaus; Norvig, Peter (Technical Monitor)

    2001-01-01

    This paper describes how two runtime analysis algorithms, an existing data race detection algorithm and a new deadlock detection algorithm, have been implemented to analyze Java programs. Runtime analysis is based on the idea of executing the program once. and observing the generated run to extract various kinds of information. This information can then be used to predict whether other different runs may violate some properties of interest, in addition of course to demonstrate whether the generated run itself violates such properties. These runtime analyses can be performed stand-alone to generate a set of warnings. It is furthermore demonstrated how these warnings can be used to guide a model checker, thereby reducing the search space. The described techniques have been implemented in the b e grown Java model checker called PathFinder.

  16. Leader's opinion priority bounded confidence model for network opinion evolution

    Science.gov (United States)

    Zhu, Meixia; Xie, Guangqiang

    2017-08-01

    Aiming at the weight of trust someone given to participate in the interaction in Hegselmann-Krause's type consensus model is the same and virtual social networks among individuals with different level of education, personal influence, etc. For differences between agents, a novelty bounded confidence model was proposed with leader's opinion considered priority. Interaction neighbors can be divided into two kinds. The first kind is made up of "opinion leaders" group, another kind is made up of ordinary people. For different groups to give different weights of trust. We also analyzed the related characteristics of the new model under the symmetrical bounded confidence parameters and combined with the classical HK model were analyzed. Simulation experiment results show that no matter the network size and initial view is subject to uniform distribution or discrete distribution. We can control the "opinion-leader" good change the number of views and values, and even improve the convergence speed. Experiment also found that the choice of "opinion leaders" is not the more the better, the model well explain how the "opinion leader" in the process of the evolution of the public opinion play the role of the leader.

  17. Checking Fine and Gray subdistribution hazards model with cumulative sums of residuals

    DEFF Research Database (Denmark)

    Li, Jianing; Scheike, Thomas; Zhang, Mei Jie

    2015-01-01

    Recently, Fine and Gray (J Am Stat Assoc 94:496–509, 1999) proposed a semi-parametric proportional regression model for the subdistribution hazard function which has been used extensively for analyzing competing risks data. However, failure of model adequacy could lead to severe bias in parameter...... estimation, and only a limited contribution has been made to check the model assumptions. In this paper, we present a class of analytical methods and graphical approaches for checking the assumptions of Fine and Gray’s model. The proposed goodness-of-fit test procedures are based on the cumulative sums...

  18. Kumaraswamy autoregressive moving average models for double bounded environmental data

    Science.gov (United States)

    Bayer, Fábio Mariano; Bayer, Débora Missio; Pumi, Guilherme

    2017-12-01

    In this paper we introduce the Kumaraswamy autoregressive moving average models (KARMA), which is a dynamic class of models for time series taking values in the double bounded interval (a,b) following the Kumaraswamy distribution. The Kumaraswamy family of distribution is widely applied in many areas, especially hydrology and related fields. Classical examples are time series representing rates and proportions observed over time. In the proposed KARMA model, the median is modeled by a dynamic structure containing autoregressive and moving average terms, time-varying regressors, unknown parameters and a link function. We introduce the new class of models and discuss conditional maximum likelihood estimation, hypothesis testing inference, diagnostic analysis and forecasting. In particular, we provide closed-form expressions for the conditional score vector and conditional Fisher information matrix. An application to environmental real data is presented and discussed.

  19. Prototype of Automated PLC Model Checking Using Continuous Integration Tools

    CERN Document Server

    Lettrich, Michael

    2015-01-01

    To deal with the complexity of operating and supervising large scale industrial installations at CERN, often Programmable Logic Controllers (PLCs) are used. A failure in these control systems can cause a disaster in terms of economic loses, environmental damages or human losses. Therefore the requirements to software quality are very high. To provide PLC developers with a way to verify proper functionality against requirements, a Java tool named PLCverif has been developed which encapsulates and thus simplifies the use of third party model checkers. One of our goals in this project is to integrate PLCverif in development process of PLC programs. When the developer changes the program, all the requirements should be verified again, as a change on the code can produce collateral effects and violate one or more requirements. For that reason, PLCverif has been extended to work with Jenkins CI in order to trigger automatically the verication cases when the developer changes the PLC program. This prototype has been...

  20. Model-Checking Driven Design of QoS-Based Routing Protocol for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zhi Chen

    2015-01-01

    Full Text Available Accurate and reliable routing protocols with Quality of Service (QoS support determine the mission-critical application efficiency in WSNs. This paper proposes a model-checking design driven framework for designing the QoS-based routing protocols of WSNs, which involves the light-weight design process, the timed automata model, and the alternative QoS verification properties. The accurate feedback of continually model checking in the iterative design process effectively stimulates the parameter tuning of the protocols. We demonstrate the straightforward and modular characteristics of the proposed framework in designing a prototype QoS-based routing protocol. The prototype study shows that the model-checking design framework may complement other design methods and ensure the QoS implementation of the QoS-based routing protocol design for WSNs.

  1. Model Checking Real Time Java Using Java PathFinder

    Science.gov (United States)

    Lindstrom, Gary; Mehlitz, Peter C.; Visser, Willem

    2005-01-01

    The Real Time Specification for Java (RTSJ) is an augmentation of Java for real time applications of various degrees of hardness. The central features of RTSJ are real time threads; user defined schedulers; asynchronous events, handlers, and control transfers; a priority inheritance based default scheduler; non-heap memory areas such as immortal and scoped, and non-heap real time threads whose execution is not impeded by garbage collection. The Robust Software Systems group at NASA Ames Research Center has JAVA PATHFINDER (JPF) under development, a Java model checker. JPF at its core is a state exploring JVM which can examine alternative paths in a Java program (e.g., via backtracking) by trying all nondeterministic choices, including thread scheduling order. This paper describes our implementation of an RTSJ profile (subset) in JPF, including requirements, design decisions, and current implementation status. Two examples are analyzed: jobs on a multiprogramming operating system, and a complex resource contention example involving autonomous vehicles crossing an intersection. The utility of JPF in finding logic and timing errors is illustrated, and the remaining challenges in supporting all of RTSJ are assessed.

  2. Capacitated Bounded Cardinality Hub Routing Problem: Model and Solution Algorithm

    OpenAIRE

    Gelareha, Shahin; Monemic, Rahimeh Neamatian; Semetd, Frederic

    2017-01-01

    In this paper, we address the Bounded Cardinality Hub Location Routing with Route Capacity wherein each hub acts as a transshipment node for one directed route. The number of hubs lies between a minimum and a maximum and the hub-level network is a complete subgraph. The transshipment operations take place at the hub nodes and flow transfer time from a hub-level transporter to a spoke-level vehicle influences spoke- to-hub allocations. We propose a mathematical model and a branch-and-cut algor...

  3. An interval-valued reliability model with bounded failure rates

    DEFF Research Database (Denmark)

    Kozine, Igor; Krymsky, Victor

    2012-01-01

    The approach to deriving interval-valued reliability measures described in this paper is distinctive from other imprecise reliability models in that it overcomes the issue of having to impose an upper bound on time to failure. It rests on the presupposition that a constant interval-valued failure...... rate is known possibly along with other reliability measures, precise or imprecise. The Lagrange method is used to solve the constrained optimization problem to derive new reliability measures of interest. The obtained results call for an exponential-wise approximation of failure probability density...

  4. A point particle model of lightly bound skyrmions

    Directory of Open Access Journals (Sweden)

    Mike Gillard

    2017-04-01

    Full Text Available A simple model of the dynamics of lightly bound skyrmions is developed in which skyrmions are replaced by point particles, each carrying an internal orientation. The model accounts well for the static energy minimizers of baryon number 1≤B≤8 obtained by numerical simulation of the full field theory. For 9≤B≤23, a large number of static solutions of the point particle model are found, all closely resembling size B subsets of a face centred cubic lattice, with the particle orientations dictated by a simple colouring rule. Rigid body quantization of these solutions is performed, and the spin and isospin of the corresponding ground states extracted. As part of the quantization scheme, an algorithm to compute the symmetry group of an oriented point cloud, and to determine its corresponding Finkelstein–Rubinstein constraints, is devised.

  5. Solving scheduling problems by untimed model checking. The clinical chemical analyser case study

    NARCIS (Netherlands)

    Margaria, T.; Wijs, Anton J.; Massink, M.; van de Pol, Jan Cornelis; Bortnik, Elena M.

    2009-01-01

    In this article, we show how scheduling problems can be modelled in untimed process algebra, by using special tick actions. A minimal-cost trace leading to a particular action, is one that minimises the number of tick steps. As a result, we can use any (timed or untimed) model checking tool to find

  6. Analysis of an emergency diesel generator control system by compositional model checking. MODSAFE 2010 work report

    International Nuclear Information System (INIS)

    Lahtinen, J.; Bjoerkman, K.; Valkonen, J.; Frits, J.; Niemelae, I.

    2010-12-01

    Digital instrumentation and control (I and C) systems containing programmable logic controllers are challenging to verify. They enable complicated control functions and the state spaces (number of distinct values of inputs, outputs and internal memory) of the designs easily become too large for comprehensive manual inspection. Model checking is a formal method that can be used for verifying that systems have been correctly designed. A number of efficient model checking systems are available which provide analysis tools that are able to determine automatically whether a given state machine model satisfies the desired safety properties. The practical case analysed in this research project is called an 'emergency diesel generator control system' and its purpose is to provide reserve power to critical devices and computers that must be available without interruption. This report describes 1) the development of a compositional approach for checking the models in large system designs, 2) the development of a modular model checking approach for modelling function block diagrams with the Uppaal model checker and 3) the experience of utilising the new modelling approaches in practice. (orig.)

  7. Logic Model Checking of Unintended Acceleration Claims in the 2005 Toyota Camry Electronic Throttle Control System

    Science.gov (United States)

    Gamble, Ed; Holzmann, Gerard

    2011-01-01

    Part of the US DOT investigation of Toyota SUA involved analysis of the throttle control software. JPL LaRS applied several techniques, including static analysis and logic model checking, to the software. A handful of logic models were built. Some weaknesses were identified; however, no cause for SUA was found. The full NASA report includes numerous other analyses

  8. Variability-Specific Abstraction Refinement for Family-Based Model Checking

    DEFF Research Database (Denmark)

    Dimovski, Aleksandar; Wasowski, Andrzej

    2017-01-01

    and property, while the number of possible scenarios is very large. In this work, we present an automatic iterative abstraction refinement procedure for family-based model checking. We use Craig interpolation to refine abstract variational models based on the obtained spurious counterexamples (traces...

  9. Logical Specification and Analysis of Fault Tolerant Systems through Partial Model Checking

    NARCIS (Netherlands)

    Gnesi, S.; Etalle, Sandro; Mukhopadhyay, S.; Lenzini, Gabriele; Lenzini, G.; Martinelli, F.; Roychoudhury, A.

    2003-01-01

    This paper presents a framework for a logical characterisation of fault tolerance and its formal analysis based on partial model checking techniques. The framework requires a fault tolerant system to be modelled using a formal calculus, here the CCS process algebra. To this aim we propose a uniform

  10. Requirements-level semantics and model checking of object-oriented statecharts

    NARCIS (Netherlands)

    Eshuis, H.; Jansen, D.N.; Wieringa, Roelf J.

    2002-01-01

    In this paper we define a requirements-level execution semantics for object-oriented statecharts and show how properties of a system specified by these statecharts can be model checked using tool support for model checkers. Our execution semantics is requirements-level because it uses the perfect

  11. PENERAPAN MODEL PEMBELAJARAN KOOPERATIF TIPE PAIR CHECKS PEMECAHAN MASALAH UNTUK MENINGKATKAN SOCIAL SKILL SISWA

    Directory of Open Access Journals (Sweden)

    R. Lestari

    2012-07-01

    Full Text Available Tujuan penelitian tindakan kelas ini untuk mengetahui pengaruh proses pembelajaran dengan menggunakan model pembelajaran kooperatif tipe Pair Checks pemecahan masalah terhadap peningkatan social skill siswa. Pada proses penerapan model pembelajaran kooperatif tipe Pair Checks pemecahan masalah siswa dibagi dalam kelompok-kelompok dan satu kelompok terdiri dari dua orang. Setiap kelompok berdiskusi untuk menyelesaikan suatu masalah, kemudian hasil diskusi kelompok akan dicek oleh pasangan dari kelompok lain. Metode Penelitian yang digunakan adalah penelitian tindakan kelas yang dilaksanakan dua siklus. Metode pengumpulan data menggunakan tes dan angket skala sikap, sedangkan teknik analisis data menggunakan teknik analisis data kuantitatif. Social Skill siswa dari siklus I ke siklus II mengalami peningkatan. Hal ini didapatkan dari data angket skala sikap siklus I ke siklus II ketuntasan klasikalnya meningkat dan sebagian besar siswa sudah memiliki social skill yang baik. Hasil belajar kognitif siswa juga mengalami peningkatan. Model pembelajaran kooperatif tipe Pair Checks pemecahan masalah dapat meningkatkan social skill siswa.This two cycles-action research aimed to know learning process applying cooperative learning model-pair checks problem solving type and improvement of student’s social skills. The process of the model was as follows: deviding students into some groups consisting of two students, solving problem by each group and checking result of the discussion by other groups. Data collection method used was test and the use of attitude scale questionnaire, while technique of data analysis used was quantitative data analysis technique. The data analysis result showed that there was an increase of student’s social skill and students’ achievement from cycle one to two. It is concluded that cooperative learning model-pair checks problem solving type can enhance student’s social skills

  12. Monitor-Based Statistical Model Checking for Weighted Metric Temporal Logic

    DEFF Research Database (Denmark)

    Bulychev, Petr; David, Alexandre; Larsen, Kim Guldstrand

    2012-01-01

    We present a novel approach and implementation for ana- lysing weighted timed automata (WTA) with respect to the weighted metric temporal logic (WMTL≤ ). Based on a stochastic semantics of WTAs, we apply statistical model checking (SMC) to estimate and test probabilities of satisfaction with desi......We present a novel approach and implementation for ana- lysing weighted timed automata (WTA) with respect to the weighted metric temporal logic (WMTL≤ ). Based on a stochastic semantics of WTAs, we apply statistical model checking (SMC) to estimate and test probabilities of satisfaction...

  13. DiVinE-CUDA - A Tool for GPU Accelerated LTL Model Checking

    Directory of Open Access Journals (Sweden)

    Jiří Barnat

    2009-12-01

    Full Text Available In this paper we present a tool that performs CUDA accelerated LTL Model Checking. The tool exploits parallel algorithm MAP adjusted to the NVIDIA CUDA architecture in order to efficiently detect the presence of accepting cycles in a directed graph. Accepting cycle detection is the core algorithmic procedure in automata-based LTL Model Checking. We demonstrate that the tool outperforms non-accelerated version of the algorithm and we discuss where the limits of the tool are and what we intend to do in the future to avoid them.

  14. Automated parameter estimation for biological models using Bayesian statistical model checking.

    Science.gov (United States)

    Hussain, Faraz; Langmead, Christopher J; Mi, Qi; Dutta-Moscato, Joyeeta; Vodovotz, Yoram; Jha, Sumit K

    2015-01-01

    Probabilistic models have gained widespread acceptance in the systems biology community as a useful way to represent complex biological systems. Such models are developed using existing knowledge of the structure and dynamics of the system, experimental observations, and inferences drawn from statistical analysis of empirical data. A key bottleneck in building such models is that some system variables cannot be measured experimentally. These variables are incorporated into the model as numerical parameters. Determining values of these parameters that justify existing experiments and provide reliable predictions when model simulations are performed is a key research problem. Using an agent-based model of the dynamics of acute inflammation, we demonstrate a novel parameter estimation algorithm by discovering the amount and schedule of doses of bacterial lipopolysaccharide that guarantee a set of observed clinical outcomes with high probability. We synthesized values of twenty-eight unknown parameters such that the parameterized model instantiated with these parameter values satisfies four specifications describing the dynamic behavior of the model. We have developed a new algorithmic technique for discovering parameters in complex stochastic models of biological systems given behavioral specifications written in a formal mathematical logic. Our algorithm uses Bayesian model checking, sequential hypothesis testing, and stochastic optimization to automatically synthesize parameters of probabilistic biological models.

  15. The tightly bound nuclei in the liquid drop model

    Science.gov (United States)

    Sree Harsha, N. R.

    2018-05-01

    In this paper, we shall maximise the binding energy per nucleon function in the semi-empirical mass formula of the liquid drop model of the atomic nuclei to analytically prove that the mean binding energy per nucleon curve has local extrema at A ≈ 58.6960, Z ≈ 26.3908 and at A ≈ 62.0178, Z ≈ 27.7506. The Lagrange method of multipliers is used to arrive at these results, while we have let the values of A and Z take continuous fractional values. The shell model that shows why 62Ni is the most tightly bound nucleus is outlined. A brief account on stellar nucleosynthesis is presented to show why 56Fe is more abundant than 62Ni and 58Fe. We believe that the analytical proof presented in this paper can be a useful tool to the instructors to introduce the nucleus with the highest mean binding energy per nucleon.

  16. Bounded Satisfiability for PCTL

    OpenAIRE

    Bertrand, Nathalie; Fearnley, John; Schewe, Sven

    2012-01-01

    While model checking PCTL for Markov chains is decidable in polynomial-time, the decidability of PCTL satisfiability, as well as its finite model property, are long standing open problems. While general satisfiability is an intriguing challenge from a purely theoretical point of view, we argue that general solutions would not be of interest to practitioners: such solutions could be too big to be implementable or even infinite. Inspired by bounded synthesis techniques, we turn to the more appl...

  17. Model checking optimal finite-horizon control for probabilistic gene regulatory networks.

    Science.gov (United States)

    Wei, Ou; Guo, Zonghao; Niu, Yun; Liao, Wenyuan

    2017-12-14

    Probabilistic Boolean networks (PBNs) have been proposed for analyzing external control in gene regulatory networks with incorporation of uncertainty. A context-sensitive PBN with perturbation (CS-PBNp), extending a PBN with context-sensitivity to reflect the inherent biological stability and random perturbations to express the impact of external stimuli, is considered to be more suitable for modeling small biological systems intervened by conditions from the outside. In this paper, we apply probabilistic model checking, a formal verification technique, to optimal control for a CS-PBNp that minimizes the expected cost over a finite control horizon. We first describe a procedure of modeling a CS-PBNp using the language provided by a widely used probabilistic model checker PRISM. We then analyze the reward-based temporal properties and the computation in probabilistic model checking; based on the analysis, we provide a method to formulate the optimal control problem as minimum reachability reward properties. Furthermore, we incorporate control and state cost information into the PRISM code of a CS-PBNp such that automated model checking a minimum reachability reward property on the code gives the solution to the optimal control problem. We conduct experiments on two examples, an apoptosis network and a WNT5A network. Preliminary experiment results show the feasibility and effectiveness of our approach. The approach based on probabilistic model checking for optimal control avoids explicit computation of large-size state transition relations associated with PBNs. It enables a natural depiction of the dynamics of gene regulatory networks, and provides a canonical form to formulate optimal control problems using temporal properties that can be automated solved by leveraging the analysis power of underlying model checking engines. This work will be helpful for further utilization of the advances in formal verification techniques in system biology.

  18. Modeling and analysis of cell membrane systems with probabilistic model checking

    Science.gov (United States)

    2011-01-01

    Background Recently there has been a growing interest in the application of Probabilistic Model Checking (PMC) for the formal specification of biological systems. PMC is able to exhaustively explore all states of a stochastic model and can provide valuable insight into its behavior which are more difficult to see using only traditional methods for system analysis such as deterministic and stochastic simulation. In this work we propose a stochastic modeling for the description and analysis of sodium-potassium exchange pump. The sodium-potassium pump is a membrane transport system presents in all animal cell and capable of moving sodium and potassium ions against their concentration gradient. Results We present a quantitative formal specification of the pump mechanism in the PRISM language, taking into consideration a discrete chemistry approach and the Law of Mass Action aspects. We also present an analysis of the system using quantitative properties in order to verify the pump reversibility and understand the pump behavior using trend labels for the transition rates of the pump reactions. Conclusions Probabilistic model checking can be used along with other well established approaches such as simulation and differential equations to better understand pump behavior. Using PMC we can determine if specific events happen such as the potassium outside the cell ends in all model traces. We can also have a more detailed perspective on its behavior such as determining its reversibility and why its normal operation becomes slow over time. This knowledge can be used to direct experimental research and make it more efficient, leading to faster and more accurate scientific discoveries. PMID:22369714

  19. Design of Installing Check Dam Using RAMMS Model in Seorak National Park of South Korea

    Science.gov (United States)

    Jun, K.; Tak, W.; JUN, B. H.; Lee, H. J.; KIM, S. D.

    2016-12-01

    Design of Installing Check Dam Using RAMMS Model in Seorak National Park of South Korea Kye-Won Jun*, Won-Jun Tak*, Byong-Hee Jun**, Ho-Jin Lee***, Soung-Doug Kim* *Graduate School of Disaster Prevention, Kangwon National University, 346 Joogang-ro, Samcheok-si, Gangwon-do, Korea **School of Fire and Disaster Protection, Kangwon National University, 346 Joogang-ro, Samcheok-si, Gangwon-do, Korea ***School of Civil Engineering, Chungbuk National University, 1 Chungdae-ro, Seowon-gu, Cheongju, Korea Abstract As more than 64% of the land in South Korea is mountainous area, so many regions in South Korea are exposed to the danger of landslide and debris flow. So it is important to understand the behavior of debris flow in mountainous terrains, the various methods and models are being presented and developed based on the mathematical concept. The purpose of this study is to investigate the regions that experienced the debris flow due to typhoon called Ewiniar and to perform numerical modeling to design and layout of the Check dam for reducing the damage by the debris flow. For the performance of numerical modeling, on-site measurement of the research area was conducted including: topographic investigation, research on bridges in the downstream, and precision LiDAR 3D scanning for composed basic data of numerical modeling. The numerical simulation of this study was performed using RAMMS (Rapid Mass Movements Simulation) model for the analysis of the debris flow. This model applied to the conditions of the Check dam which was installed in the upstream, midstream, and downstream. Considering the reduction effect of debris flow, the expansion of debris flow, and the influence on the bridges in the downstream, proper location of the Check dam was designated. The result of present numerical model showed that when the Check dam was installed in the downstream section, 50 m above the bridge, the reduction effect of the debris flow was higher compared to when the Check dam were

  20. Query Language for Location-Based Services: A Model Checking Approach

    Science.gov (United States)

    Hoareau, Christian; Satoh, Ichiro

    We present a model checking approach to the rationale, implementation, and applications of a query language for location-based services. Such query mechanisms are necessary so that users, objects, and/or services can effectively benefit from the location-awareness of their surrounding environment. The underlying data model is founded on a symbolic model of space organized in a tree structure. Once extended to a semantic model for modal logic, we regard location query processing as a model checking problem, and thus define location queries as hybrid logicbased formulas. Our approach is unique to existing research because it explores the connection between location models and query processing in ubiquitous computing systems, relies on a sound theoretical basis, and provides modal logic-based query mechanisms for expressive searches over a decentralized data structure. A prototype implementation is also presented and will be discussed.

  1. Combinatorial bounds on the α-divergence of univariate mixture models

    KAUST Repository

    Nielsen, Frank; Sun, Ke

    2017-01-01

    We derive lower- and upper-bounds of α-divergence between univariate mixture models with components in the exponential family. Three pairs of bounds are presented in order with increasing quality and increasing computational cost. They are verified

  2. Undecidability of model-checking branching-time properties of stateless probabilistic pushdown process

    OpenAIRE

    Lin, T.

    2014-01-01

    In this paper, we settle a problem in probabilistic verification of infinite--state process (specifically, {\\it probabilistic pushdown process}). We show that model checking {\\it stateless probabilistic pushdown process} (pBPA) against {\\it probabilistic computational tree logic} (PCTL) is undecidable.

  3. Specification and Generation of Environment for Model Checking of Software Components

    Czech Academy of Sciences Publication Activity Database

    Pařízek, P.; Plášil, František

    2007-01-01

    Roč. 176, - (2007), s. 143-154 ISSN 1571-0661 R&D Projects: GA AV ČR 1ET400300504 Institutional research plan: CEZ:AV0Z10300504 Keywords : software components * behavior protocols * model checking * automated generation of environment Subject RIV: JC - Computer Hardware ; Software

  4. Efficient model checking for duration calculus based on branching-time approximations

    DEFF Research Database (Denmark)

    Fränzle, Martin; Hansen, Michael Reichhardt

    2008-01-01

    Duration Calculus (abbreviated to DC) is an interval-based, metric-time temporal logic designed for reasoning about embedded real-time systems at a high level of abstraction. But the complexity of model checking any decidable fragment featuring both negation and chop, DC's only modality, is non...

  5. Combining Decision Diagrams and SAT Procedures for Efficient Symbolic Model Checking

    DEFF Research Database (Denmark)

    Williams, Poul Frederick; Biere, Armin; Clarke, Edmund M.

    2000-01-01

    In this paper we show how to do symbolic model checking using Boolean Expression Diagrams (BEDs), a non-canonical representation for Boolean formulas, instead of Binary Decision Diagrams (BDDs), the traditionally used canonical representation. The method is based on standard fixed point algorithm...

  6. A practical approach to model checking Duration Calculus using Presburger Arithmetic

    DEFF Research Database (Denmark)

    Hansen, Michael Reichhardt; Dung, Phan Anh; Brekling, Aske Wiid

    2014-01-01

    This paper investigates the feasibility of reducing a model-checking problem K ⊧ ϕ for discrete time Duration Calculus to the decision problem for Presburger Arithmetic. Theoretical results point at severe limitations of this approach: (1) the reduction in Fränzle and Hansen (Int J Softw Inform 3...... limits of the approach are illustrated by a family of examples....

  7. An evolutionary model of bounded rationality and intelligence.

    Directory of Open Access Journals (Sweden)

    Thomas J Brennan

    Full Text Available BACKGROUND: Most economic theories are based on the premise that individuals maximize their own self-interest and correctly incorporate the structure of their environment into all decisions, thanks to human intelligence. The influence of this paradigm goes far beyond academia-it underlies current macroeconomic and monetary policies, and is also an integral part of existing financial regulations. However, there is mounting empirical and experimental evidence, including the recent financial crisis, suggesting that humans do not always behave rationally, but often make seemingly random and suboptimal decisions. METHODS AND FINDINGS: Here we propose to reconcile these contradictory perspectives by developing a simple binary-choice model that takes evolutionary consequences of decisions into account as well as the role of intelligence, which we define as any ability of an individual to increase its genetic success. If no intelligence is present, our model produces results consistent with prior literature and shows that risks that are independent across individuals in a generation generally lead to risk-neutral behaviors, but that risks that are correlated across a generation can lead to behaviors such as risk aversion, loss aversion, probability matching, and randomization. When intelligence is present the nature of risk also matters, and we show that even when risks are independent, either risk-neutral behavior or probability matching will occur depending upon the cost of intelligence in terms of reproductive success. In the case of correlated risks, we derive an implicit formula that shows how intelligence can emerge via selection, why it may be bounded, and how such bounds typically imply the coexistence of multiple levels and types of intelligence as a reflection of varying environmental conditions. CONCLUSIONS: Rational economic behavior in which individuals maximize their own self interest is only one of many possible types of behavior that

  8. An evolutionary model of bounded rationality and intelligence.

    Science.gov (United States)

    Brennan, Thomas J; Lo, Andrew W

    2012-01-01

    Most economic theories are based on the premise that individuals maximize their own self-interest and correctly incorporate the structure of their environment into all decisions, thanks to human intelligence. The influence of this paradigm goes far beyond academia-it underlies current macroeconomic and monetary policies, and is also an integral part of existing financial regulations. However, there is mounting empirical and experimental evidence, including the recent financial crisis, suggesting that humans do not always behave rationally, but often make seemingly random and suboptimal decisions. Here we propose to reconcile these contradictory perspectives by developing a simple binary-choice model that takes evolutionary consequences of decisions into account as well as the role of intelligence, which we define as any ability of an individual to increase its genetic success. If no intelligence is present, our model produces results consistent with prior literature and shows that risks that are independent across individuals in a generation generally lead to risk-neutral behaviors, but that risks that are correlated across a generation can lead to behaviors such as risk aversion, loss aversion, probability matching, and randomization. When intelligence is present the nature of risk also matters, and we show that even when risks are independent, either risk-neutral behavior or probability matching will occur depending upon the cost of intelligence in terms of reproductive success. In the case of correlated risks, we derive an implicit formula that shows how intelligence can emerge via selection, why it may be bounded, and how such bounds typically imply the coexistence of multiple levels and types of intelligence as a reflection of varying environmental conditions. Rational economic behavior in which individuals maximize their own self interest is only one of many possible types of behavior that arise from natural selection. The key to understanding which types of

  9. Achieving the physical limits of the bounded-storage model

    International Nuclear Information System (INIS)

    Mandayam, Prabha; Wehner, Stephanie

    2011-01-01

    Secure two-party cryptography is possible if the adversary's quantum storage device suffers imperfections. For example, security can be achieved if the adversary can store strictly less then half of the qubits transmitted during the protocol. This special case is known as the bounded-storage model, and it has long been an open question whether security can still be achieved if the adversary's storage were any larger. Here, we answer this question positively and demonstrate a two-party protocol which is secure as long as the adversary cannot store even a small fraction of the transmitted pulses. We also show that security can be extended to a larger class of noisy quantum memories.

  10. A Novel Method to Verify Multilevel Computational Models of Biological Systems Using Multiscale Spatio-Temporal Meta Model Checking.

    Science.gov (United States)

    Pârvu, Ovidiu; Gilbert, David

    2016-01-01

    Insights gained from multilevel computational models of biological systems can be translated into real-life applications only if the model correctness has been verified first. One of the most frequently employed in silico techniques for computational model verification is model checking. Traditional model checking approaches only consider the evolution of numeric values, such as concentrations, over time and are appropriate for computational models of small scale systems (e.g. intracellular networks). However for gaining a systems level understanding of how biological organisms function it is essential to consider more complex large scale biological systems (e.g. organs). Verifying computational models of such systems requires capturing both how numeric values and properties of (emergent) spatial structures (e.g. area of multicellular population) change over time and across multiple levels of organization, which are not considered by existing model checking approaches. To address this limitation we have developed a novel approximate probabilistic multiscale spatio-temporal meta model checking methodology for verifying multilevel computational models relative to specifications describing the desired/expected system behaviour. The methodology is generic and supports computational models encoded using various high-level modelling formalisms because it is defined relative to time series data and not the models used to generate it. In addition, the methodology can be automatically adapted to case study specific types of spatial structures and properties using the spatio-temporal meta model checking concept. To automate the computational model verification process we have implemented the model checking approach in the software tool Mule (http://mule.modelchecking.org). Its applicability is illustrated against four systems biology computational models previously published in the literature encoding the rat cardiovascular system dynamics, the uterine contractions of labour

  11. Improved rigorous upper bounds for transport due to passive advection described by simple models of bounded systems

    International Nuclear Information System (INIS)

    Kim, Chang-Bae; Krommes, J.A.

    1988-08-01

    The work of Krommes and Smith on rigorous upper bounds for the turbulent transport of a passively advected scalar [/ital Ann. Phys./ 177:246 (1987)] is extended in two directions: (1) For their ''reference model,'' improved upper bounds are obtained by utilizing more sophisticated two-time constraints which include the effects of cross-correlations up to fourth order. Numerical solutions of the model stochastic differential equation are also obtained; they show that the new bounds compare quite favorably with the exact results, even at large Reynolds and Kubo numbers. (2) The theory is extended to take account of a finite spatial autocorrelation length L/sub c/. As a reasonably generic example, the problem of particle transport due to statistically specified stochastic magnetic fields in a collisionless turbulent plasma is revisited. A bound is obtained which reduces for small L/sub c/ to the quasilinear limit and for large L/sub c/ to the strong turbulence limit, and which provides a reasonable and rigorous interpolation for intermediate values of L/sub c/. 18 refs., 6 figs

  12. Rigorous bounds on the free energy of electron-phonon models

    NARCIS (Netherlands)

    Raedt, Hans De; Michielsen, Kristel

    1997-01-01

    We present a collection of rigorous upper and lower bounds to the free energy of electron-phonon models with linear electron-phonon interaction. These bounds are used to compare different variational approaches. It is shown rigorously that the ground states corresponding to the sharpest bounds do

  13. Formal verification of dynamic hybrid systems: a NuSMV-based model checking approach

    Directory of Open Access Journals (Sweden)

    Xu Zhi

    2018-01-01

    Full Text Available Software security is an important and challenging research topic in developing dynamic hybrid embedded software systems. Ensuring the correct behavior of these systems is particularly difficult due to the interactions between the continuous subsystem and the discrete subsystem. Currently available security analysis methods for system risks have been limited, as they rely on manual inspections of the individual subsystems under simplifying assumptions. To improve this situation, a new approach is proposed that is based on the symbolic model checking tool NuSMV. A dual PID system is used as an example system, for which the logical part and the computational part of the system are modeled in a unified manner. Constraints are constructed on the controlled object, and a counter-example path is ultimately generated, indicating that the hybrid system can be analyzed by the model checking tool.

  14. Analyzing Phylogenetic Trees with Timed and Probabilistic Model Checking: The Lactose Persistence Case Study.

    Science.gov (United States)

    Requeno, José Ignacio; Colom, José Manuel

    2014-12-01

    Model checking is a generic verification technique that allows the phylogeneticist to focus on models and specifications instead of on implementation issues. Phylogenetic trees are considered as transition systems over which we interrogate phylogenetic questions written as formulas of temporal logic. Nonetheless, standard logics become insufficient for certain practices of phylogenetic analysis since they do not allow the inclusion of explicit time and probabilities. The aim of this paper is to extend the application of model checking techniques beyond qualitative phylogenetic properties and adapt the existing logical extensions and tools to the field of phylogeny. The introduction of time and probabilities in phylogenetic specifications is motivated by the study of a real example: the analysis of the ratio of lactose intolerance in some populations and the date of appearance of this phenotype.

  15. The Supermarket Model with Bounded Queue Lengths in Equilibrium

    Science.gov (United States)

    Brightwell, Graham; Fairthorne, Marianne; Luczak, Malwina J.

    2018-04-01

    In the supermarket model, there are n queues, each with a single server. Customers arrive in a Poisson process with arrival rate λ n , where λ = λ (n) \\in (0,1) . Upon arrival, a customer selects d=d(n) servers uniformly at random, and joins the queue of a least-loaded server amongst those chosen. Service times are independent exponentially distributed random variables with mean 1. In this paper, we analyse the behaviour of the supermarket model in the regime where λ (n) = 1 - n^{-α } and d(n) = \\lfloor n^β \\rfloor , where α and β are fixed numbers in (0, 1]. For suitable pairs (α , β ) , our results imply that, in equilibrium, with probability tending to 1 as n → ∞, the proportion of queues with length equal to k = \\lceil α /β \\rceil is at least 1-2n^{-α + (k-1)β } , and there are no longer queues. We further show that the process is rapidly mixing when started in a good state, and give bounds on the speed of mixing for more general initial conditions.

  16. Fault Tree Analysis with Temporal Gates and Model Checking Technique for Qualitative System Safety Analysis

    International Nuclear Information System (INIS)

    Koh, Kwang Yong; Seong, Poong Hyun

    2010-01-01

    Fault tree analysis (FTA) has suffered from several drawbacks such that it uses only static gates and hence can not capture dynamic behaviors of the complex system precisely, and it is in lack of rigorous semantics, and reasoning process which is to check whether basic events really cause top events is done manually and hence very labor-intensive and time-consuming for the complex systems while it has been one of the most widely used safety analysis technique in nuclear industry. Although several attempts have been made to overcome this problem, they can not still do absolute or actual time modeling because they adapt relative time concept and can capture only sequential behaviors of the system. In this work, to resolve the problems, FTA and model checking are integrated to provide formal, automated and qualitative assistance to informal and/or quantitative safety analysis. Our approach proposes to build a formal model of the system together with fault trees. We introduce several temporal gates based on timed computational tree logic (TCTL) to capture absolute time behaviors of the system and to give concrete semantics to fault tree gates to reduce errors during the analysis, and use model checking technique to automate the reasoning process of FTA

  17. From Collective Adaptive Systems to Human Centric Computation and Back: Spatial Model Checking for Medical Imaging

    Directory of Open Access Journals (Sweden)

    Gina Belmonte

    2016-07-01

    Full Text Available Recent research on formal verification for Collective Adaptive Systems (CAS pushed advancements in spatial and spatio-temporal model checking, and as a side result provided novel image analysis methodologies, rooted in logical methods for topological spaces. Medical Imaging (MI is a field where such technologies show potential for ground-breaking innovation. In this position paper, we present a preliminary investigation centred on applications of spatial model checking to MI. The focus is shifted from pure logics to a mixture of logical, statistical and algorithmic approaches, driven by the logical nature intrinsic to the specification of the properties of interest in the field. As a result, novel operators are introduced, that could as well be brought back to the setting of CAS.

  18. HyLTL: a temporal logic for model checking hybrid systems

    Directory of Open Access Journals (Sweden)

    Davide Bresolin

    2013-08-01

    Full Text Available The model-checking problem for hybrid systems is a well known challenge in the scientific community. Most of the existing approaches and tools are limited to safety properties only, or operates by transforming the hybrid system to be verified into a discrete one, thus loosing information on the continuous dynamics of the system. In this paper we present a logic for specifying complex properties of hybrid systems called HyLTL, and we show how it is possible to solve the model checking problem by translating the formula into an equivalent hybrid automaton. In this way the problem is reduced to a reachability problem on hybrid automata that can be solved by using existing tools.

  19. Improved metastability bounds on the standard model Higgs mass

    CERN Document Server

    Espinosa, J R; Espinosa, J R; Quiros, M

    1995-01-01

    Depending on the Higgs-boson and top-quark masses, M_H and M_t, the effective potential of the Standard Model at finite (and zero) temperature can have a deep and unphysical stable minimum \\langle \\phi(T)\\rangle at values of the field much larger than G_F^{-1/2}. We have computed absolute lower bounds on M_H, as a function of M_t, imposing the condition of no decay by thermal fluctuations, or quantum tunnelling, to the stable minimum. Our effective potential at zero temperature includes all next-to-leading logarithmic corrections (making it extremely scale-independent), and we have used pole masses for the Higgs-boson and top-quark. Thermal corrections to the effective potential include plasma effects by one-loop ring resummation of Debye masses. All calculations, including the effective potential and the bubble nucleation rate, are performed numerically and so the results do not rely on any kind of analytical approximation. Easy-to-use fits are provided for the benefit of the reader. Conclusions on the possi...

  20. Analysis of DGNB-DK criteria for BIM-based Model Checking automatization

    DEFF Research Database (Denmark)

    Gade, Peter Nørkjær; Svidt, Kjeld; Jensen, Rasmus Lund

    This report includes the results of an analysis of the automation potential of the Danish edition of building sustainability assessment method Deutsche Gesellschaft für Nachhaltiges Bauen (DGNB) for office buildings version 2014 1.1. The analysis investigate the criteria related to DGNB-DK and if......-DK and if they would be suited for automation through the technological concept BIM-based Model Checking (BMC)....

  1. Model-Checking of Linear-Time Properties in Multi-Valued Systems

    OpenAIRE

    Li, Yongming; Droste, Manfred; Lei, Lihui

    2012-01-01

    In this paper, we study model-checking of linear-time properties in multi-valued systems. Safety property, invariant property, liveness property, persistence and dual-persistence properties in multi-valued logic systems are introduced. Some algorithms related to the above multi-valued linear-time properties are discussed. The verification of multi-valued regular safety properties and multi-valued $\\omega$-regular properties using lattice-valued automata are thoroughly studied. Since the law o...

  2. Model checking software for phylogenetic trees using distribution and database methods

    Directory of Open Access Journals (Sweden)

    Requeno José Ignacio

    2013-12-01

    Full Text Available Model checking, a generic and formal paradigm stemming from computer science based on temporal logics, has been proposed for the study of biological properties that emerge from the labeling of the states defined over the phylogenetic tree. This strategy allows us to use generic software tools already present in the industry. However, the performance of traditional model checking is penalized when scaling the system for large phylogenies. To this end, two strategies are presented here. The first one consists of partitioning the phylogenetic tree into a set of subgraphs each one representing a subproblem to be verified so as to speed up the computation time and distribute the memory consumption. The second strategy is based on uncoupling the information associated to each state of the phylogenetic tree (mainly, the DNA sequence and exporting it to an external tool for the management of large information systems. The integration of all these approaches outperforms the results of monolithic model checking and helps us to execute the verification of properties in a real phylogenetic tree.

  3. A Novel Algorithm for Intrusion Detection Based on RASL Model Checking

    Directory of Open Access Journals (Sweden)

    Weijun Zhu

    2013-01-01

    Full Text Available The interval temporal logic (ITL model checking (MC technique enhances the power of intrusion detection systems (IDSs to detect concurrent attacks due to the strong expressive power of ITL. However, an ITL formula suffers from difficulty in the description of the time constraints between different actions in the same attack. To address this problem, we formalize a novel real-time interval temporal logic—real-time attack signature logic (RASL. Based on such a new logic, we put forward a RASL model checking algorithm. Furthermore, we use RASL formulas to describe attack signatures and employ discrete timed automata to create an audit log. As a result, RASL model checking algorithm can be used to automatically verify whether the automata satisfy the formulas, that is, whether the audit log coincides with the attack signatures. The simulation experiments show that the new approach effectively enhances the detection power of the MC-based intrusion detection methods for a number of telnet attacks, p-trace attacks, and the other sixteen types of attacks. And these experiments indicate that the new algorithm can find several types of real-time attacks, whereas the existing MC-based intrusion detection approaches cannot do that.

  4. A rule-based approach to model checking of UML state machines

    Science.gov (United States)

    Grobelna, Iwona; Grobelny, Michał; Stefanowicz, Łukasz

    2016-12-01

    In the paper a new approach to formal verification of control process specification expressed by means of UML state machines in version 2.x is proposed. In contrast to other approaches from the literature, we use the abstract and universal rule-based logical model suitable both for model checking (using the nuXmv model checker), but also for logical synthesis in form of rapid prototyping. Hence, a prototype implementation in hardware description language VHDL can be obtained that fully reflects the primary, already formally verified specification in form of UML state machines. Presented approach allows to increase the assurance that implemented system meets the user-defined requirements.

  5. Model Checking Verification and Validation at JPL and the NASA Fairmont IV and V Facility

    Science.gov (United States)

    Schneider, Frank; Easterbrook, Steve; Callahan, Jack; Montgomery, Todd

    1999-01-01

    We show how a technology transfer effort was carried out. The successful use of model checking on a pilot JPL flight project demonstrates the usefulness and the efficacy of the approach. The pilot project was used to model a complex spacecraft controller. Software design and implementation validation were carried out successfully. To suggest future applications we also show how the implementation validation step can be automated. The effort was followed by the formal introduction of the modeling technique as a part of the JPL Quality Assurance process.

  6. Exploring L1 model space in search of conductivity bounds for the MT problem

    Science.gov (United States)

    Wheelock, B. D.; Parker, R. L.

    2013-12-01

    Geophysical inverse problems of the type encountered in electromagnetic techniques are highly non-unique. As a result, any single inverted model, though feasible, is at best inconclusive and at worst misleading. In this paper, we use modified inversion methods to establish bounds on electrical conductivity within a model of the earth. Our method consists of two steps, each making use of the 1-norm in model regularization. Both 1-norm minimization problems are framed without approximation as non-negative least-squares (NNLS) problems. First, we must identify a parsimonious set of regions within the model for which upper and lower bounds on average conductivity will be sought. This is accomplished by minimizing the 1-norm of spatial variation, which produces a model with a limited number of homogeneous regions; in fact, the number of homogeneous regions will never be greater than the number of data, regardless of the number of free parameters supplied. The second step establishes bounds for each of these regions with pairs of inversions. The new suite of inversions also uses a 1-norm penalty, but applied to the conductivity values themselves, rather than the spatial variation thereof. In the bounding step we use the 1-norm of our model parameters because it is proportional to average conductivity. For a lower bound on average conductivity, the 1-norm within a bounding region is minimized. For an upper bound on average conductivity, the 1-norm everywhere outside a bounding region is minimized. The latter minimization has the effect of concentrating conductance into the bounding region. Taken together, these bounds are a measure of the uncertainty in the associated region of our model. Starting with a blocky inverse solution is key in the selection of the bounding regions. Of course, there is a tradeoff between resolution and uncertainty: an increase in resolution (smaller bounding regions), results in greater uncertainty (wider bounds). Minimization of the 1-norm of

  7. Sediment depositions upstream of open check dams: new elements from small scale models

    Science.gov (United States)

    Piton, Guillaume; Le Guern, Jules; Carbonari, Costanza; Recking, Alain

    2015-04-01

    numbers that the flows tend to adopt? New small scale model experiments have been undertaken focusing on depositions processes and their related hydraulics. Accurate photogrammetric measurements allowed us to better describe the deposition processes3. Large Scale Particle Image Velocimetry (LS-PIV) was performed to determine surface velocity fields in highly active channels with low grain submersion4. We will present preliminary results of our experiments showing the new elements we observed in massive deposit dynamics. REFERENCES 1.Armanini, A., Dellagiacoma, F. & Ferrari, L. From the check dam to the development of functional check dams. Fluvial Hydraulics of Mountain Regions 37, 331-344 (1991). 2.Piton, G. & Recking, A. Design of sediment traps with open check dams: a review, part I: hydraulic and deposition processes. (Accepted by the) Journal of Hydraulic Engineering 1-23 (2015). 3.Le Guern, J. Ms Thesis: Modélisation physique des plages de depot : analyse de la dynamique de remplissage.(2014) . 4.Carbonari, C. Ms Thesis: Small scale experiments of deposition processes occuring in sediment traps, LS-PIV measurments and geomorphological descriptions. (in preparation).

  8. Higgs mass bounds from a chirally invariant lattice Higgs-Yukawa model with overlap fermions

    International Nuclear Information System (INIS)

    Gerhold, Philipp; Kallarackal, Jim

    2008-10-01

    We study the parameter dependence of the Higgs mass in a chirally invariant lattice Higgs-Yukawa model emulating the same Higgs-fermion coupling structure as in the Higgs sector of the electroweak Standard Model. Eventually, the aim is to establish upper and lower Higgs mass bounds. Here we present our preliminary results on the lower Higgs mass bound at several selected values for the cutoff and give a brief outlook towards the upper Higgs mass bound. (orig.)

  9. Simulation-Based Model Checking for Nondeterministic Systems and Rare Events

    Science.gov (United States)

    2016-03-24

    rounds of Monte Carlo sampling and Reinforcement Learning to improve the policy for nondeterminic choices with respect to satisfying a Bounded Linear ...computations for evaluating elementary functions in the Embedded GNU C Library [11]. For instance, the sine function can return values larger than 1053...Joint International Work- shop on Process Algebra and Probabilistic Methods, Performance Modeling and Verification 9 Final Report, March 14, 2016

  10. The bounded model property via step algebras and step frames

    NARCIS (Netherlands)

    Bezhanishvili, N.; Ghilardi, S.

    2014-01-01

    The paper introduces semantic and algorithmic methods for establishing a variant of the analytic subformula property (called ‘the bounded proof property’, bpp) for modal propositional logics. The bpp is much weaker property than full cut-elimination, but it is nevertheless sufficient for

  11. K-nuclear bound states in a dynamical model

    Czech Academy of Sciences Publication Activity Database

    Mareš, Jiří; Friedman, E.; Gal, A.

    2006-01-01

    Roč. 770, 1/2 (2006), s. 84-105 ISSN 0375-9474 Institutional research plan: CEZ:AV0Z10480505 Keywords : kaonic atoms * K-nuclear bound states * K-nucleus interaction Subject RIV: BE - Theoretical Physics Impact factor: 2.155, year: 2006

  12. Systematic assignment of Feshbach resonances via an asymptotic bound state model

    NARCIS (Netherlands)

    Goosen, M.; Kokkelmans, SJ.J.M.F.

    2008-01-01

    We present an Asymptotic Bound state Model (ABM), which is useful to predict Feshbach resonances. The model utilizes asymptotic properties of the interaction potentials to represent coupled molecular wavefunctions. The bound states of this system give rise to Feshbach resonances, localized at the

  13. Combinatorial bounds on the α-divergence of univariate mixture models

    KAUST Repository

    Nielsen, Frank

    2017-06-20

    We derive lower- and upper-bounds of α-divergence between univariate mixture models with components in the exponential family. Three pairs of bounds are presented in order with increasing quality and increasing computational cost. They are verified empirically through simulated Gaussian mixture models. The presented methodology generalizes to other divergence families relying on Hellinger-type integrals.

  14. Chiefly Symmetric: Results on the Scalability of Probabilistic Model Checking for Operating-System Code

    Directory of Open Access Journals (Sweden)

    Marcus Völp

    2012-11-01

    Full Text Available Reliability in terms of functional properties from the safety-liveness spectrum is an indispensable requirement of low-level operating-system (OS code. However, with evermore complex and thus less predictable hardware, quantitative and probabilistic guarantees become more and more important. Probabilistic model checking is one technique to automatically obtain these guarantees. First experiences with the automated quantitative analysis of low-level operating-system code confirm the expectation that the naive probabilistic model checking approach rapidly reaches its limits when increasing the numbers of processes. This paper reports on our work-in-progress to tackle the state explosion problem for low-level OS-code caused by the exponential blow-up of the model size when the number of processes grows. We studied the symmetry reduction approach and carried out our experiments with a simple test-and-test-and-set lock case study as a representative example for a wide range of protocols with natural inter-process dependencies and long-run properties. We quickly see a state-space explosion for scenarios where inter-process dependencies are insignificant. However, once inter-process dependencies dominate the picture models with hundred and more processes can be constructed and analysed.

  15. Model checking of safety-critical software in the nuclear engineering domain

    International Nuclear Information System (INIS)

    Lahtinen, J.; Valkonen, J.; Björkman, K.; Frits, J.; Niemelä, I.; Heljanko, K.

    2012-01-01

    Instrumentation and control (I and C) systems play a vital role in the operation of safety-critical processes. Digital programmable logic controllers (PLC) enable sophisticated control tasks which sets high requirements for system validation and verification methods. Testing and simulation have an important role in the overall verification of a system but are not suitable for comprehensive evaluation because only a limited number of system behaviors can be analyzed due to time limitations. Testing is also performed too late in the development lifecycle and thus the correction of design errors is expensive. This paper discusses the role of formal methods in software development in the area of nuclear engineering. It puts forward model checking, a computer-aided formal method for verifying the correctness of a system design model, as a promising approach to system verification. The main contribution of the paper is the development of systematic methodology for modeling safety critical systems in the nuclear domain. Two case studies are reviewed, in which we have found errors that were previously not detected. We also discuss the actions that should be taken in order to increase confidence in the model checking process.

  16. Combining Static Model Checking with Dynamic Enforcement Using the Statecall Policy Language

    Science.gov (United States)

    Madhavapeddy, Anil

    Internet protocols encapsulate a significant amount of state, making implementing the host software complex. In this paper, we define the Statecall Policy Language (SPL) which provides a usable middle ground between ad-hoc coding and formal reasoning. It enables programmers to embed automata in their code which can be statically model-checked using SPIN and dynamically enforced. The performance overheads are minimal, and the automata also provide higher-level debugging capabilities. We also describe some practical uses of SPL by describing the automata used in an SSH server written entirely in OCaml/SPL.

  17. Petri Net and Probabilistic Model Checking Based Approach for the Modelling, Simulation and Verification of Internet Worm Propagation.

    Directory of Open Access Journals (Sweden)

    Misbah Razzaq

    Full Text Available Internet worms are analogous to biological viruses since they can infect a host and have the ability to propagate through a chosen medium. To prevent the spread of a worm or to grasp how to regulate a prevailing worm, compartmental models are commonly used as a means to examine and understand the patterns and mechanisms of a worm spread. However, one of the greatest challenge is to produce methods to verify and validate the behavioural properties of a compartmental model. This is why in this study we suggest a framework based on Petri Nets and Model Checking through which we can meticulously examine and validate these models. We investigate Susceptible-Exposed-Infectious-Recovered (SEIR model and propose a new model Susceptible-Exposed-Infectious-Recovered-Delayed-Quarantined (Susceptible/Recovered (SEIDQR(S/I along with hybrid quarantine strategy, which is then constructed and analysed using Stochastic Petri Nets and Continuous Time Markov Chain. The analysis shows that the hybrid quarantine strategy is extremely effective in reducing the risk of propagating the worm. Through Model Checking, we gained insight into the functionality of compartmental models. Model Checking results validate simulation ones well, which fully support the proposed framework.

  18. Bringing Automated Model Checking to PLC Program Development - A CERN Case Study

    CERN Document Server

    Fernandez Adiego, B; Tournier, J-C; Blanco Vinuela, E; Gonzalez Suarez, V M

    2014-01-01

    Verification of critical software is a high priority but a challenging task for industrial control systems. Model checking appears to be an appropriate approach for this purpose. However, this technique is not widely used in industry yet, due to some obstacles. The main obstacles encountered when trying to apply formal verification techniques at industrial installations are the difficulty of creating models out of PLC programs and defining formally the specification requirements. In addition, models produced out of real-life programs have a huge state space, thus preventing the verification due to performance issues. Our work at CERN (European Organization for Nuclear Research) focuses on developing efficient automatic verification methods for industrial critical installations based on PLC (Programmable Logic Controller) control systems. In this paper, we present a tool generating automatically formal models out of PLC code. The tool implements a general methodology which can support several input languages, ...

  19. An Integrated Approach of Model checking and Temporal Fault Tree for System Safety Analysis

    Energy Technology Data Exchange (ETDEWEB)

    Koh, Kwang Yong; Seong, Poong Hyun [Korea Advanced Institute of Science and Technology, Daejeon (Korea, Republic of)

    2009-10-15

    Digitalization of instruments and control systems in nuclear power plants offers the potential to improve plant safety and reliability through features such as increased hardware reliability and stability, and improved failure detection capability. It however makes the systems and their safety analysis more complex. Originally, safety analysis was applied to hardware system components and formal methods mainly to software. For software-controlled or digitalized systems, it is necessary to integrate both. Fault tree analysis (FTA) which has been one of the most widely used safety analysis technique in nuclear industry suffers from several drawbacks as described in. In this work, to resolve the problems, FTA and model checking are integrated to provide formal, automated and qualitative assistance to informal and/or quantitative safety analysis. Our approach proposes to build a formal model of the system together with fault trees. We introduce several temporal gates based on timed computational tree logic (TCTL) to capture absolute time behaviors of the system and to give concrete semantics to fault tree gates to reduce errors during the analysis, and use model checking technique to automate the reasoning process of FTA.

  20. Bounds on the number of bound states in the transfer matrix spectrum for some weakly correlated lattice models

    International Nuclear Information System (INIS)

    O’Carroll, Michael

    2012-01-01

    We consider the interaction of particles in weakly correlated lattice quantum field theories. In the imaginary time functional integral formulation of these theories there is a relative coordinate lattice Schroedinger operator H which approximately describes the interaction of these particles. Scalar and vector spin, QCD and Gross-Neveu models are included in these theories. In the weakly correlated regime H=H o +W where H o =−γΔ l , 0 l is the d-dimensional lattice Laplacian: γ=β, the inverse temperature for spin systems and γ=κ 3 where κ is the hopping parameter for QCD. W is a self-adjoint potential operator which may have non-local contributions but obeys the bound ‖W(x, y)‖⩽cexp ( −a(‖x‖+‖y‖)), a large: exp−a=β/β o (1/2) (κ/κ o ) for spin (QCD) models. H o , W, and H act in l 2 (Z d ), d⩾ 1. The spectrum of H below zero is known to be discrete and we obtain bounds on the number of states below zero. This number depends on the short range properties of W, i.e., the long range tail does not increase the number of states.

  1. Re-engineering pre-employment check-up systems: a model for improving health services.

    Science.gov (United States)

    Rateb, Said Abdel Hakim; El Nouman, Azza Abdel Razek; Rateb, Moshira Abdel Hakim; Asar, Mohamed Naguib; El Amin, Ayman Mohammed; Gad, Saad abdel Aziz; Mohamed, Mohamed Salah Eldin

    2011-01-01

    The purpose of this paper is to develop a model for improving health services provided by the pre-employment medical fitness check-up system affiliated to Egypt's Health Insurance Organization (HIO). Operations research, notably system re-engineering, is used in six randomly selected centers and findings before and after re-engineering are compared. The re-engineering model follows a systems approach, focusing on three areas: structure, process and outcome. The model is based on six main components: electronic booking, standardized check-up processes, protected medical documents, advanced archiving through an electronic content management (ECM) system, infrastructure development, and capacity building. The model originates mainly from customer needs and expectations. The centers' monthly customer flow increased significantly after re-engineering. The mean time spent per customer cycle improved after re-engineering--18.3 +/- 5.5 minutes as compared to 48.8 +/- 14.5 minutes before. Appointment delay was also significantly decreased from an average 18 to 6.2 days. Both beneficiaries and service providers were significantly more satisfied with the services after re-engineering. The model proves that re-engineering program costs are exceeded by increased revenue. Re-engineering in this study involved multiple structure and process elements. The literature review did not reveal similar re-engineering healthcare packages. Therefore, each element was compared separately. This model is highly recommended for improving service effectiveness and efficiency. This research is the first in Egypt to apply the re-engineering approach to public health systems. Developing user-friendly models for service improvement is an added value.

  2. An Efficient Explicit-time Description Method for Timed Model Checking

    Directory of Open Access Journals (Sweden)

    Hao Wang

    2009-12-01

    Full Text Available Timed model checking, the method to formally verify real-time systems, is attracting increasing attention from both the model checking community and the real-time community. Explicit-time description methods verify real-time systems using general model constructs found in standard un-timed model checkers. Lamport proposed an explicit-time description method using a clock-ticking process (Tick to simulate the passage of time together with a group of global variables to model time requirements. Two methods, the Sync-based Explicit-time Description Method using rendezvous synchronization steps and the Semaphore-based Explicit-time Description Method using only one global variable were proposed; they both achieve better modularity than Lamport's method in modeling the real-time systems. In contrast to timed automata based model checkers like UPPAAL, explicit-time description methods can access and store the current time instant for future calculations necessary for many real-time systems, especially those with pre-emptive scheduling. However, the Tick process in the above three methods increments the time by one unit in each tick; the state spaces therefore grow relatively fast as the time parameters increase, a problem when the system's time period is relatively long. In this paper, we propose a more efficient method which enables the Tick process to leap multiple time units in one tick. Preliminary experimental results in a high performance computing environment show that this new method significantly reduces the state space and improves both the time and memory efficiency.

  3. Sediment yield model implementation based on check dam infill stratigraphy in a semiarid Mediterranean catchment

    Directory of Open Access Journals (Sweden)

    G. Bussi

    2013-08-01

    Full Text Available Soil loss and sediment transport in Mediterranean areas are driven by complex non-linear processes which have been only partially understood. Distributed models can be very helpful tools for understanding the catchment-scale phenomena which lead to soil erosion and sediment transport. In this study, a modelling approach is proposed to reproduce and evaluate erosion and sediment yield processes in a Mediterranean catchment (Rambla del Poyo, Valencia, Spain. Due to the lack of sediment transport records for model calibration and validation, a detailed description of the alluvial stratigraphy infilling a check dam that drains a 12.9 km2 sub-catchment was used as indirect information of sediment yield data. These dam infill sediments showed evidences of at least 15 depositional events (floods over the time period 1990–2009. The TETIS model, a distributed conceptual hydrological and sediment model, was coupled to the Sediment Trap Efficiency for Small Ponds (STEP model for reproducing reservoir retention, and it was calibrated and validated using the sedimentation volume estimated for the depositional units associated with discrete runoff events. The results show relatively low net erosion rates compared to other Mediterranean catchments (0.136 Mg ha−1 yr−1, probably due to the extensive outcrops of limestone bedrock, thin soils and rather homogeneous vegetation cover. The simulated sediment production and transport rates offer model satisfactory results, further supported by in-site palaeohydrological evidences and spatial validation using additional check dams, showing the great potential of the presented data assimilation methodology for the quantitative analysis of sediment dynamics in ungauged Mediterranean basins.

  4. Model Checking Artificial Intelligence Based Planners: Even the Best Laid Plans Must Be Verified

    Science.gov (United States)

    Smith, Margaret H.; Holzmann, Gerard J.; Cucullu, Gordon C., III; Smith, Benjamin D.

    2005-01-01

    Automated planning systems (APS) are gaining acceptance for use on NASA missions as evidenced by APS flown On missions such as Orbiter and Deep Space 1 both of which were commanded by onboard planning systems. The planning system takes high level goals and expands them onboard into a detailed of action fiat the spacecraft executes. The system must be verified to ensure that the automatically generated plans achieve the goals as expected and do not generate actions that would harm the spacecraft or mission. These systems are typically tested using empirical methods. Formal methods, such as model checking, offer exhaustive or measurable test coverage which leads to much greater confidence in correctness. This paper describes a formal method based on the SPIN model checker. This method guarantees that possible plans meet certain desirable properties. We express the input model in Promela, the language of SPIN and express the properties of desirable plans formally.

  5. Location Contexts of User Check-Ins to Model Urban Geo Life-Style Patterns

    Science.gov (United States)

    Hasan, Samiul; Ukkusuri, Satish V.

    2015-01-01

    Geo-location data from social media offers us information, in new ways, to understand people's attitudes and interests through their activity choices. In this paper, we explore the idea of inferring individual life-style patterns from activity-location choices revealed in social media. We present a model to understand life-style patterns using the contextual information (e. g. location categories) of user check-ins. Probabilistic topic models are developed to infer individual geo life-style patterns from two perspectives: i) to characterize the patterns of user interests to different types of places and ii) to characterize the patterns of user visits to different neighborhoods. The method is applied to a dataset of Foursquare check-ins of the users from New York City. The co-existence of several location contexts and the corresponding probabilities in a given pattern provide useful information about user interests and choices. It is found that geo life-style patterns have similar items—either nearby neighborhoods or similar location categories. The semantic and geographic proximity of the items in a pattern reflects the hidden regularity in user preferences and location choice behavior. PMID:25970430

  6. Dependence in probabilistic modeling Dempster-Shafer theory and probability bounds analysis

    Energy Technology Data Exchange (ETDEWEB)

    Ferson, Scott [Applied Biomathematics, Setauket, NY (United States); Nelsen, Roger B. [Lewis & Clark College, Portland OR (United States); Hajagos, Janos [Applied Biomathematics, Setauket, NY (United States); Berleant, Daniel J. [Iowa State Univ., Ames, IA (United States); Zhang, Jianzhong [Iowa State Univ., Ames, IA (United States); Tucker, W. Troy [Applied Biomathematics, Setauket, NY (United States); Ginzburg, Lev R. [Applied Biomathematics, Setauket, NY (United States); Oberkampf, William L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-05-01

    This report summarizes methods to incorporate information (or lack of information) about inter-variable dependence into risk assessments that use Dempster-Shafer theory or probability bounds analysis to address epistemic and aleatory uncertainty. The report reviews techniques for simulating correlated variates for a given correlation measure and dependence model, computation of bounds on distribution functions under a specified dependence model, formulation of parametric and empirical dependence models, and bounding approaches that can be used when information about the intervariable dependence is incomplete. The report also reviews several of the most pervasive and dangerous myths among risk analysts about dependence in probabilistic models.

  7. Evading Lyth bound in models of quintessential inflation

    International Nuclear Information System (INIS)

    Hossain, Md. Wali; Myrzakulov, R.; Sami, M.; Saridakis, Emmanuel N.

    2014-01-01

    Quintessential inflation refers to an attempt to unify inflation and late-time cosmic acceleration using a single scalar field. In this letter we consider two different classes of quintessential inflation, one of which is based upon a Lagrangian with non-canonical kinetic term k 2 (ϕ)∂ μ ϕ∂ μ ϕ and a steep exponential potential while the second class uses the concept of steep brane world inflation. We show that in both cases the Lyth bound can be evaded, despite the large tensor-to-scalar ratio of perturbations. The post-inflationary dynamics is consistent with nucleosynthesis constraint in these cases

  8. Innovative Adolescent Chemical Dependency Treatment and Its Outcome: A Model Based on Outward Bound Programming.

    Science.gov (United States)

    McPeake, John D.; And Others

    1991-01-01

    Describes adolescent chemical dependency treatment model developed at Beech Hill Hospital (New Hampshire) which integrated Twelve Step-oriented alcohol and drug rehabilitation program with experiential education school, Hurricane Island Outward Bound School. Describes Beech Hill Hurricane Island Outward Bound School Adolescent Chemical Dependency…

  9. SWAT Check: A Screening Tool to Assist Users in the Identification of Potential Model Application Problems.

    Science.gov (United States)

    White, Michael J; Harmel, R Daren; Arnold, Jeff G; Williams, Jimmy R

    2014-01-01

    The Soil and Water Assessment Tool (SWAT) is a basin-scale hydrologic model developed by the United States Department of Agriculture Agricultural Research Service. SWAT's broad applicability, user-friendly model interfaces, and automatic calibration software have led to a rapid increase in the number of new users. These advancements also allow less experienced users to conduct SWAT modeling applications. In particular, the use of automated calibration software may produce simulated values that appear appropriate because they adequately mimic measured data used in calibration and validation. Autocalibrated model applications (and often those of unexperienced modelers) may contain input data errors and inappropriate parameter adjustments not readily identified by users or the autocalibration software. The objective of this research was to develop a program to assist users in the identification of potential model application problems. The resulting "SWAT Check" is a stand-alone Microsoft Windows program that (i) reads selected SWAT output and alerts users of values outside the typical range; (ii) creates process-based figures for visualization of the appropriateness of output values, including important outputs that are commonly ignored; and (iii) detects and alerts users of common model application errors. By alerting users to potential model application problems, this software should assist the SWAT community in developing more reliable modeling applications. Copyright © by the American Society of Agronomy, Crop Science Society of America, and Soil Science Society of America, Inc.

  10. Relevance of the ICRP biokinetic model for dietary organically bound tritium

    International Nuclear Information System (INIS)

    Trivedi, A.

    1999-10-01

    Ingested dietary tritium can participate in metabolic processes, and become synthesized into organically bound tritium in the tissues and organs. The distribution and retention of the organically bound tritium throughout the body are much different than tritium in the body water. The International Commission on Radiological Protection (ICRP) Publication 56 (1989) has a biokinetic model to calculate dose from the ingestion of organically bound dietary tritium. The model predicts that the dose from the ingestion of organically bound dietary tritium is about 2.3 times higher than from the ingestion of the same activity of tritiated water. Under steady-state conditions, the calculated dose rate (using the first principle approach) from the ingestion of dietary organically bound tritium can be twice that from the ingestion of tritiated water. For an adult, the upper-bound dose estimate for the ingestion of dietary organically bound tritium is estimated to be close to 2.3 times higher than that of tritiated water. Therefore, given the uncertainty in the dose calculation with respect to the actual relevant dose, the ICRP biokinetic model for organically bound tritium is sufficient for dosimetry for adults. (author)

  11. Checking the validity of Busquet's ionization temperature with detailed collisional radiative models.

    Science.gov (United States)

    Klapisch, M.; Bar-Shalom, A.

    1997-12-01

    Busquet's RADIOM model for effective ionization temperature Tz is an appealing and simple way to introduce non LTE effects in hydrocodes. The authors report checking the validity of RADIOM in the optically thin case by comparison with two collisional radiative models, MICCRON (level-by-level) for C and Al and SCROLL (superconfiguration- by-superconfiguration) for Lu and Au. MICCRON is described in detail. The agreement between the average ion charge >ZBusquet is very good in most cases. There is however room for improvement when the departure from LTE is more pronounced for heavy atoms and for emissivity. Improvement appears possible because the concept of ionization temperature seems to hold in a broader range of parameters.

  12. Enabling model checking for collaborative process analysis: from BPMN to `Network of Timed Automata'

    Science.gov (United States)

    Mallek, Sihem; Daclin, Nicolas; Chapurlat, Vincent; Vallespir, Bruno

    2015-04-01

    Interoperability is a prerequisite for partners involved in performing collaboration. As a consequence, the lack of interoperability is now considered a major obstacle. The research work presented in this paper aims to develop an approach that allows specifying and verifying a set of interoperability requirements to be satisfied by each partner in the collaborative process prior to process implementation. To enable the verification of these interoperability requirements, it is necessary first and foremost to generate a model of the targeted collaborative process; for this research effort, the standardised language BPMN 2.0 is used. Afterwards, a verification technique must be introduced, and model checking is the preferred option herein. This paper focuses on application of the model checker UPPAAL in order to verify interoperability requirements for the given collaborative process model. At first, this step entails translating the collaborative process model from BPMN into a UPPAAL modelling language called 'Network of Timed Automata'. Second, it becomes necessary to formalise interoperability requirements into properties with the dedicated UPPAAL language, i.e. the temporal logic TCTL.

  13. Model checking of time Petri nets using the state class timed automaton

    DEFF Research Database (Denmark)

    Lime, Didier; Roux, Olivier H.

    2006-01-01

    In this paper, we propose a method for building the state class graph of a bounded time Petri net (TPN) as a timed automaton (TA), which we call the state class timed automaton. We consider bounded TPN, whose underlying net is not necessarily bounded. We prove that our translation preserves the b...

  14. Upper Higgs boson mass bounds from a chirally invariant lattice Higgs-Yukawa Model

    Energy Technology Data Exchange (ETDEWEB)

    Gerhold, P. [Humboldt-Universitaet, Berlin (Germany). Inst. fuer Physik; John von Neumann-Institut fuer Computing NIC/DESY, Zeuthen (Germany); Jansen, K. [John von Neumann-Institut fuer Computing NIC/DESY, Zeuthen (Germany)

    2010-02-15

    We establish the cutoff-dependent upper Higgs boson mass bound by means of direct lattice computations in the framework of a chirally invariant lattice Higgs-Yukawa model emulating the same chiral Yukawa coupling structure as in the Higgs-fermion sector of the Standard Model. As expected from the triviality picture of the Higgs sector, we observe the upper mass bound to decrease with rising cutoff parameter {lambda}. Moreover, the strength of the fermionic contribution to the upper mass bound is explored by comparing to the corresponding analysis in the pure {phi}{sup 4}-theory. (orig.)

  15. Two-vibron bound states in the β–Fermi–Pasta–Ulam model

    International Nuclear Information System (INIS)

    Hu Xinguang; Tang Yi

    2008-01-01

    This paper studies the two-vibron bound states in the β–Fermi–Pasta–Ulam model by means of the number conserving approximation combined with the number state method. The results indicate that on-site, adjacent-site and mixed two-vibron bound states may exist in the model. Specially, wave number has a significant effect on such bound states, which may be considered as the quantum effects of the localized states in quantum systems. (condensed matter: structure, thermal and mechanical properties)

  16. Verification of communication protocols in web services model-checking service compositions

    CERN Document Server

    Tari, Zahir; Mukherjee, Anshuman

    2014-01-01

    Gathers recent advancements in the field of self-organizing wireless sensor networks and provides readers with the essential, state-of-the-art information about sensor networking. In the near future, wireless sensor networks will become an integral part of our day-to-day life. To solve different sensor networking related issues, researchers have put a great deal of effort into coming up with innovative ideas. Verification of Communication Protocols in Web Services: Model-Checking Service Compositions gathers recent advancements in the field of self-organizing wireless sensor networks and provides readers with integral information about sensor networking. It introduces current technological trends, particularly in node organization, and provides implementation details of each networking type to help readers set up sensor networks in their related job fields. In addition, it identifies the limitations of current technologies, as well as future research directions.

  17. Tools for model-independent bounds in direct dark matter searches

    DEFF Research Database (Denmark)

    Cirelli, M.; Del Nobile, E.; Panci, P.

    2013-01-01

    We discuss a framework (based on non-relativistic operators) and a self-contained set of numerical tools to derive the bounds from some current direct detection experiments on virtually any arbitrary model of Dark Matter elastically scattering on nuclei.......We discuss a framework (based on non-relativistic operators) and a self-contained set of numerical tools to derive the bounds from some current direct detection experiments on virtually any arbitrary model of Dark Matter elastically scattering on nuclei....

  18. Fluid Petri Nets and hybrid model-checking: a comparative case study

    International Nuclear Information System (INIS)

    Gribaudo, M.; Horvath, A.; Bobbio, A.; Tronci, E.; Ciancamerla, E.; Minichino, M.

    2003-01-01

    The modeling and analysis of hybrid systems is a recent and challenging research area which is actually dominated by two main lines: a functional analysis based on the description of the system in terms of discrete state (hybrid) automata (whose goal is to ascertain conformity and reachability properties), and a stochastic analysis (whose aim is to provide performance and dependability measures). This paper investigates a unifying view between formal methods and stochastic methods by proposing an analysis methodology of hybrid systems based on Fluid Petri Nets (FPNs). FPNs can be analyzed directly using appropriate tools. Our paper shows that the same FPN model can be fed to different functional analyzers for model checking. In order to extensively explore the capability of the technique, we have converted the original FPN into languages for discrete as well as hybrid as well as stochastic model checkers. In this way, a first comparison among the modeling power of well known tools can be carried out. Our approach is illustrated by means of a 'real world' hybrid system: the temperature control system of a co-generative plant

  19. Dynamic modelling of check valves in shipping terminals; Modelagem dinamica de valvulas de retencao em terminais maritimos

    Energy Technology Data Exchange (ETDEWEB)

    Pires, Luis F.G.; Barreto, Claudio V.; Sarmento, Renata C. [Pontificia Univ. Catolica do Rio de Janeiro, RJ (Brazil). Dept. de Engenharia Mecanica. Nucleo de Simulacao Termohidraulica de Dutos (SIMDUT)

    2005-07-01

    As usual a shipping terminal contains a header and its diameter is smaller than the main pipeline diameter. This diameter reduction amplifies the effects caused by hydraulic transients. It was noticed during simulations that check valves without dynamic modeling may introduce some error in the maximum pressure results without a dynamic model approach. The current paper uses commercial pipeline simulation software to model the dynamic behavior of the check valves. It was studied the header diameter influence and how the check valve model type may change the maximum pressure in the pipeline. It was proved that even a pipeline that works with low pressure and small elevation drop needs a detailed valve modeling to prevent the calculation of unreal pressure values in the region with diameter reduction. (author)

  20. Causal model of safety-checking action of the staff of nuclear power plants and the organization climate

    International Nuclear Information System (INIS)

    Fukui, Hirokazu; Yoshida, Michio; Yamaura, Kazuho

    2000-01-01

    For those who run an organization, it is critical to identify the causal relationship between the organization's characteristics and the safety-checking action of its staff, in order to effectively implement activities for promoting safety. In this research. a causal model of the safety-checking action was developed and factors affecting it were studied. A questionnaire survey, which includes safety awareness, attitude toward safety, safety culture and others, was conducted at three nuclear power plants and eight factors were extracted by means of factor analysis of the questionnaire items. The extracted eight interrelated factors were as follows: work norm, supervisory action, interest in training, recognition of importance, safety-checking action, the subject of safety, knowledge/skills, and the attitude of an organization. Among them, seven factors except the recognition of importance were defined as latent variables and a causal model of safety-checking action was constructed. By means of covariance structure analysis, it was found that the three factors: the attitude of an organization, supervisory action and the subject of safety, have a significant effect on the safety-checking action. Moreover, it was also studied that workplaces in which these three factors are highly regarded form social environment where safety-checking action is fully supported by the workplace as a whole, while workplaces in which these three factors are poorly regarded do not fully form social environment where safety-checking action is supported. Therefore, the workplaces form an organizational environment where safety-checking action tends to depend strongly upon the knowledge or skills of individuals. On top of these, it was noted that the attitude of an organization and supervisory action are important factors that serve as the first trigger affecting the formation of the organizational climate for safety. (author)

  1. Causal model of safety-checking action of the staff of nuclear power plants and the organization climate

    Energy Technology Data Exchange (ETDEWEB)

    Fukui, Hirokazu [Institute of Nuclear Safety System Inc., Seika, Kyoto (Japan); Yoshida, Michio; Yamaura, Kazuho [Japan Institute for Group Dynamics, Fukuoka (Japan)

    2000-09-01

    For those who run an organization, it is critical to identify the causal relationship between the organization's characteristics and the safety-checking action of its staff, in order to effectively implement activities for promoting safety. In this research. a causal model of the safety-checking action was developed and factors affecting it were studied. A questionnaire survey, which includes safety awareness, attitude toward safety, safety culture and others, was conducted at three nuclear power plants and eight factors were extracted by means of factor analysis of the questionnaire items. The extracted eight interrelated factors were as follows: work norm, supervisory action, interest in training, recognition of importance, safety-checking action, the subject of safety, knowledge/skills, and the attitude of an organization. Among them, seven factors except the recognition of importance were defined as latent variables and a causal model of safety-checking action was constructed. By means of covariance structure analysis, it was found that the three factors: the attitude of an organization, supervisory action and the subject of safety, have a significant effect on the safety-checking action. Moreover, it was also studied that workplaces in which these three factors are highly regarded form social environment where safety-checking action is fully supported by the workplace as a whole, while workplaces in which these three factors are poorly regarded do not fully form social environment where safety-checking action is supported. Therefore, the workplaces form an organizational environment where safety-checking action tends to depend strongly upon the knowledge or skills of individuals. On top of these, it was noted that the attitude of an organization and supervisory action are important factors that serve as the first trigger affecting the formation of the organizational climate for safety. (author)

  2. Checking the Adequacy of Fit of Models from Split-Plot Designs

    DEFF Research Database (Denmark)

    Almini, A. A.; Kulahci, Murat; Montgomery, D. C.

    2009-01-01

    models. In this article, we propose the computation of two R-2, R-2-adjusted, prediction error sums of squares (PRESS), and R-2-prediction statistics to measure the adequacy of fit for the WP and the SP submodels in a split-plot design. This is complemented with the graphical analysis of the two types......One of the main features that distinguish split-plot experiments from other experiments is that they involve two types of experimental errors: the whole-plot (WP) error and the subplot (SP) error. Taking this into consideration is very important when computing measures of adequacy of fit for split-plot...... of errors to check for any violation of the underlying assumptions and the adequacy of fit of split-plot models. Using examples, we show how computing two measures of model adequacy of fit for each split-plot design model is appropriate and useful as they reveal whether the correct WP and SP effects have...

  3. Surface-bounded growth modeling applied to human mandibles

    DEFF Research Database (Denmark)

    Andresen, Per Rønsholt; Brookstein, F. L.; Conradsen, Knut

    2000-01-01

    From a set of longitudinal three-dimensional scans of the same anatomical structure, the authors have accurately modeled the temporal shape and size changes using a linear shape model. On a total of 31 computed tomography scans of the mandible from six patients, 14,851 semilandmarks are found...

  4. Computational and Game-Theoretic Approaches for Modeling Bounded Rationality

    NARCIS (Netherlands)

    L. Waltman (Ludo)

    2011-01-01

    textabstractThis thesis studies various computational and game-theoretic approaches to economic modeling. Unlike traditional approaches to economic modeling, the approaches studied in this thesis do not rely on the assumption that economic agents behave in a fully rational way. Instead, economic

  5. Induction, bounding, weak combinatorial principles, and the homogeneous model theorem

    CERN Document Server

    Hirschfeldt, Denis R; Shore, Richard A

    2017-01-01

    Goncharov and Peretyat'kin independently gave necessary and sufficient conditions for when a set of types of a complete theory T is the type spectrum of some homogeneous model of T. Their result can be stated as a principle of second order arithmetic, which is called the Homogeneous Model Theorem (HMT), and analyzed from the points of view of computability theory and reverse mathematics. Previous computability theoretic results by Lange suggested a close connection between HMT and the Atomic Model Theorem (AMT), which states that every complete atomic theory has an atomic model. The authors show that HMT and AMT are indeed equivalent in the sense of reverse mathematics, as well as in a strong computability theoretic sense and do the same for an analogous result of Peretyat'kin giving necessary and sufficient conditions for when a set of types is the type spectrum of some model.

  6. Restructuring of workflows to minimise errors via stochastic model checking: An automated evolutionary approach

    International Nuclear Information System (INIS)

    Herbert, L.T.; Hansen, Z.N.L.

    2016-01-01

    This paper presents a framework for the automated restructuring of stochastic workflows to reduce the impact of faults. The framework allows for the modelling of workflows by means of a formalised subset of the BPMN workflow language. We extend this modelling formalism to describe faults and incorporate an intention preserving stochastic semantics able to model both probabilistic- and non-deterministic behaviour. Stochastic model checking techniques are employed to generate the state-space of a given workflow. Possible improvements obtained by restructuring are measured by employing the framework's capacity for tracking real-valued quantities associated with states and transitions of the workflow. The space of possible restructurings of a workflow is explored by means of an evolutionary algorithm, where the goals for improvement are defined in terms of optimising quantities, typically employed to model resources, associated with a workflow. The approach is fully automated and only the modelling of the production workflows, potential faults and the expression of the goals require manual input. We present the design of a software tool implementing this framework and explore the practical utility of this approach through an industrial case study in which the risk of production failures and their impact are reduced by restructuring the workflow. - Highlights: • We present a framework which allows for the automated restructuring of workflows. • This framework seeks to minimise the impact of errors on the workflow. • We illustrate a scalable software implementation of this framework. • We explore the practical utility of this approach through an industry case. • The impact of errors can be substantially reduced by restructuring the workflow.

  7. Surface-bounded growth modeling applied to human mandibles

    DEFF Research Database (Denmark)

    Andresen, Per Rønsholt

    1999-01-01

    This thesis presents mathematical and computational techniques for three dimensional growth modeling applied to human mandibles. The longitudinal shape changes make the mandible a complex bone. The teeth erupt and the condylar processes change direction, from pointing predominantly backward...... of the common features. 3.model the process that moves the matched points (growth modeling). A local shape feature called crest line has shown itself to be structurally stable on mandibles. Registration of crest lines (from different mandibles) results in a sparse deformation field, which must be interpolated...... old mandible based on the 3 month old scan. When using successively more recent scans as basis for the model the error drops to 2.0 mm for the 11 years old scan. Thus, it seems reasonable to assume that the mandibular growth is linear....

  8. Simulation Modeling of a Check-in and Medication Reconciliation Ambulatory Clinic Kiosk

    Directory of Open Access Journals (Sweden)

    Blake Lesselroth

    2011-01-01

    Full Text Available Gaps in information about patient medication adherence may contribute to preventable adverse drug events and patient harm. Hence, health-quality advocacy groups, including the Joint Commission, have called for the implementation of standardized processes to collect and compare patient medication lists. This manuscript describes the implementation of a self-service patient kiosk intended to check in patients for a clinic appointment and collect a medication adherence history, which is then available through the electronic health record. We used business process engineering and simulation modeling to analyze existing workflow, evaluate technology impact on clinic throughput, and predict future infrastructure needs. Our empiric data indicated that a multi-function healthcare kiosk offers a feasible platform to collect medical history data. Furthermore, our simulation model showed a non-linear association between patient arrival rate, kiosk number, and estimated patient wait times. This study provides important data to help administrators and healthcare executives predict infrastructure needs when considering the use of self-service kiosks.

  9. Modeling pedestrian shopping behavior using principles of bounded rationality: model comparison and validation

    Science.gov (United States)

    Zhu, Wei; Timmermans, Harry

    2011-06-01

    Models of geographical choice behavior have been dominantly based on rational choice models, which assume that decision makers are utility-maximizers. Rational choice models may be less appropriate as behavioral models when modeling decisions in complex environments in which decision makers may simplify the decision problem using heuristics. Pedestrian behavior in shopping streets is an example. We therefore propose a modeling framework for pedestrian shopping behavior incorporating principles of bounded rationality. We extend three classical heuristic rules (conjunctive, disjunctive and lexicographic rule) by introducing threshold heterogeneity. The proposed models are implemented using data on pedestrian behavior in Wang Fujing Street, the city center of Beijing, China. The models are estimated and compared with multinomial logit models and mixed logit models. Results show that the heuristic models are the best for all the decisions that are modeled. Validation tests are carried out through multi-agent simulation by comparing simulated spatio-temporal agent behavior with the observed pedestrian behavior. The predictions of heuristic models are slightly better than those of the multinomial logit models.

  10. Composite models of hadrons and relativistic bound states

    International Nuclear Information System (INIS)

    Filippov, A.T.

    1977-01-01

    The following problems are considered: what the constituents of the hadrons are; what their quantum numbers and their broken and unbroken symmetries are; what the dynamics of the constituents (equations, binding forces and the origin of symmetry violations) is. The most puzzling question is: why the constituents ''escape from freedom'' and are confined inside the hadrons; what experimentalists can report about the hadron constituents and their dynamics if not finding them. There are no final answers to all these questions. The achievements of quark model are described, some problems concerning the comparison of the quark model with experiment are considered. The attempt is also made to present alternative views on the same problems

  11. Constructive Lower Bounds on Model Complexity of Shallow Perceptron Networks

    Czech Academy of Sciences Publication Activity Database

    Kůrková, Věra

    2018-01-01

    Roč. 29, č. 7 (2018), s. 305-315 ISSN 0941-0643 R&D Projects: GA ČR GA15-18108S Institutional support: RVO:67985807 Keywords : shallow and deep networks * model complexity and sparsity * signum perceptron networks * finite mappings * variational norms * Hadamard matrices Subject RIV: IN - Informatics, Computer Science Impact factor: 2.505, year: 2016

  12. Lower bound plane stress element for modelling 3D structures

    DEFF Research Database (Denmark)

    Herfelt, Morten Andersen; Poulsen, Peter Noe; Hoang, Linh Cao

    2017-01-01

    In-plane action is often the primary load-carrying mechanism of reinforced concrete structures. The plate bending action will be secondary, and the behaviour of the structure can be modelled with a reasonable accuracy using a generalised three-dimensional plane stress element. In this paper...

  13. Check valve

    Science.gov (United States)

    Upton, H.A.; Garcia, P.

    1999-08-24

    A check valve for use in a GDCS of a nuclear reactor and having a motor driven disk including a rotatable armature for rotating the check valve disk over its entire range of motion is described. In one embodiment, the check valve includes a valve body having a coolant flow channel extending therethrough. The coolant flow channel includes an inlet end and an outlet end. A valve body seat is located on an inner surface of the valve body. The check valve further includes a disk assembly, sometimes referred to as the motor driven disc, having a counterweight and a disk shaped valve. The disk valve includes a disk base having a seat for seating with the valve body seat. The disk assembly further includes a first hinge pin member which extends at least partially through the disk assembly and is engaged to the disk. The disk valve is rotatable relative to the first hinge pin member. The check valve also includes a motor having a stator frame with a stator bore therein. An armature is rotatably positioned within the stator bore and the armature is coupled to the disk valve to cause the disk valve to rotate about its full range of motion. 5 figs.

  14. Check valve

    International Nuclear Information System (INIS)

    Upton, H.A.; Garcia, P.

    1999-01-01

    A check valve for use in a GDCS of a nuclear reactor and having a motor driven disk including a rotatable armature for rotating the check valve disk over its entire range of motion is described. In one embodiment, the check valve includes a valve body having a coolant flow channel extending therethrough. The coolant flow channel includes an inlet end and an outlet end. A valve body seat is located on an inner surface of the valve body. The check valve further includes a disk assembly, sometimes referred to as the motor driven disc, having a counterweight and a disk shaped valve. The disk valve includes a disk base having a seat for seating with the valve body seat. The disk assembly further includes a first hinge pin member which extends at least partially through the disk assembly and is engaged to the disk. The disk valve is rotatable relative to the first hinge pin member. The check valve also includes a motor having a stator frame with a stator bore therein. An armature is rotatably positioned within the stator bore and the armature is coupled to the disk valve to cause the disk valve to rotate about its full range of motion. 5 figs

  15. Symanzik approach in modeling of bound states of Dirac particle in singular background

    Directory of Open Access Journals (Sweden)

    Pismak Yu. M.

    2017-01-01

    Full Text Available In the model of interaction of spinor field with homogeneous isotropic material plane constructed in framework of Symanzik approach, the bound states are studied. For localized near plane Dirac particle the expression for current, charge and density are presented. For bound state with massless dispersion law the current, charge and density are calculated for simplified model with 2 parameter exactly.The model can find application to a wide class of phenomena arising by the interaction of fields of quantum electrodynamics with two-dimensional materials.

  16. The Kadanoff lower-bound variational renormalization group applied to an SU(2) lattice spin model

    International Nuclear Information System (INIS)

    Thorleifsson, G.; Damgaard, P.H.

    1990-07-01

    We apply the variational lower-bound Renormalization Group transformation of Kadanoff to an SU(2) lattice spin model in 2 and 3 dimensions. Even in the one-hypercube framework of this renormalization group transformation the present model is characterised by having an infinite basis of fundamental operators. We investigate whether the lower-bound variational renormalization group transformation yields results stable under truncations of this operator basis. Our results show that for this particular spin model this is not the case. (orig.)

  17. Model analysis of check dam impacts on long-term sediment and water budgets in southeast Arizona, USA

    Science.gov (United States)

    Norman, Laura M.; Niraula, Rewati

    2016-01-01

    The objective of this study was to evaluate the effect of check dam infrastructure on soil and water conservation at the catchment scale using the Soil and Water Assessment Tool (SWAT). This paired watershed study includes a watershed treated with over 2000 check dams and a Control watershed which has none, in the West Turkey Creek watershed, Southeast Arizona, USA. SWAT was calibrated for streamflow using discharge documented during the summer of 2013 at the Control site. Model results depict the necessity to eliminate lateral flow from SWAT models of aridland environments, the urgency to standardize geospatial soils data, and the care for which modelers must document altering parameters when presenting findings. Performance was assessed using the percent bias (PBIAS), with values of ±2.34%. The calibrated model was then used to examine the impacts of check dams at the Treated watershed. Approximately 630 tons of sediment is estimated to be stored behind check dams in the Treated watershed over the 3-year simulation, increasing water quality for fish habitat. A minimum precipitation event of 15 mm was necessary to instigate the detachment of soil, sediments, or rock from the study area, which occurred 2% of the time. The resulting watershed model is useful as a predictive framework and decision-support tool to consider long-term impacts of restoration and potential for future restoration.

  18. Error assessment of biogeochemical models by lower bound methods (NOMMA-1.0)

    Science.gov (United States)

    Sauerland, Volkmar; Löptien, Ulrike; Leonhard, Claudine; Oschlies, Andreas; Srivastav, Anand

    2018-03-01

    Biogeochemical models, capturing the major feedbacks of the pelagic ecosystem of the world ocean, are today often embedded into Earth system models which are increasingly used for decision making regarding climate policies. These models contain poorly constrained parameters (e.g., maximum phytoplankton growth rate), which are typically adjusted until the model shows reasonable behavior. Systematic approaches determine these parameters by minimizing the misfit between the model and observational data. In most common model approaches, however, the underlying functions mimicking the biogeochemical processes are nonlinear and non-convex. Thus, systematic optimization algorithms are likely to get trapped in local minima and might lead to non-optimal results. To judge the quality of an obtained parameter estimate, we propose determining a preferably large lower bound for the global optimum that is relatively easy to obtain and that will help to assess the quality of an optimum, generated by an optimization algorithm. Due to the unavoidable noise component in all observations, such a lower bound is typically larger than zero. We suggest deriving such lower bounds based on typical properties of biogeochemical models (e.g., a limited number of extremes and a bounded time derivative). We illustrate the applicability of the method with two real-world examples. The first example uses real-world observations of the Baltic Sea in a box model setup. The second example considers a three-dimensional coupled ocean circulation model in combination with satellite chlorophyll a.

  19. Error assessment of biogeochemical models by lower bound methods (NOMMA-1.0

    Directory of Open Access Journals (Sweden)

    V. Sauerland

    2018-03-01

    Full Text Available Biogeochemical models, capturing the major feedbacks of the pelagic ecosystem of the world ocean, are today often embedded into Earth system models which are increasingly used for decision making regarding climate policies. These models contain poorly constrained parameters (e.g., maximum phytoplankton growth rate, which are typically adjusted until the model shows reasonable behavior. Systematic approaches determine these parameters by minimizing the misfit between the model and observational data. In most common model approaches, however, the underlying functions mimicking the biogeochemical processes are nonlinear and non-convex. Thus, systematic optimization algorithms are likely to get trapped in local minima and might lead to non-optimal results. To judge the quality of an obtained parameter estimate, we propose determining a preferably large lower bound for the global optimum that is relatively easy to obtain and that will help to assess the quality of an optimum, generated by an optimization algorithm. Due to the unavoidable noise component in all observations, such a lower bound is typically larger than zero. We suggest deriving such lower bounds based on typical properties of biogeochemical models (e.g., a limited number of extremes and a bounded time derivative. We illustrate the applicability of the method with two real-world examples. The first example uses real-world observations of the Baltic Sea in a box model setup. The second example considers a three-dimensional coupled ocean circulation model in combination with satellite chlorophyll a.

  20. Triviality bound on lightest Higgs mass in next to minimal supersymmetric model

    International Nuclear Information System (INIS)

    Choudhury, S.R.; Mamta; Dutta, Sukanta

    1998-01-01

    We study the implication of triviality on Higgs sector in next to minimal supersymmetric model (NMSSM) using variational field theory. It is shown that the mass of the lightest Higgs boson in NMSSM has an upper bound ∼ 10 M w which is of the same order as that in the standard model. (author)

  1. On the Complexity of Model-Checking Branching and Alternating-Time Temporal Logics in One-Counter Systems

    DEFF Research Database (Denmark)

    Vester, Steen

    2015-01-01

    We study the complexity of the model-checking problem for the branching-time logic CTL ∗  and the alternating-time temporal logics ATL/ATL ∗  in one-counter processes and one-counter games respectively. The complexity is determined for all three logics when integer weights are input in unary (non...

  2. Finite state projection based bounds to compare chemical master equation models using single-cell data

    Energy Technology Data Exchange (ETDEWEB)

    Fox, Zachary [School of Biomedical Engineering, Colorado State University, Fort Collins, Colorado 80523 (United States); Neuert, Gregor [Department of Molecular Physiology and Biophysics, Vanderbilt University School of Medicine, Nashville, Tennessee 37232 (United States); Department of Pharmacology, School of Medicine, Vanderbilt University, Nashville, Tennessee 37232 (United States); Department of Biomedical Engineering, Vanderbilt University School of Engineering, Nashville, Tennessee 37232 (United States); Munsky, Brian [School of Biomedical Engineering, Colorado State University, Fort Collins, Colorado 80523 (United States); Department of Chemical and Biological Engineering, Colorado State University, Fort Collins, Colorado 80523 (United States)

    2016-08-21

    Emerging techniques now allow for precise quantification of distributions of biological molecules in single cells. These rapidly advancing experimental methods have created a need for more rigorous and efficient modeling tools. Here, we derive new bounds on the likelihood that observations of single-cell, single-molecule responses come from a discrete stochastic model, posed in the form of the chemical master equation. These strict upper and lower bounds are based on a finite state projection approach, and they converge monotonically to the exact likelihood value. These bounds allow one to discriminate rigorously between models and with a minimum level of computational effort. In practice, these bounds can be incorporated into stochastic model identification and parameter inference routines, which improve the accuracy and efficiency of endeavors to analyze and predict single-cell behavior. We demonstrate the applicability of our approach using simulated data for three example models as well as for experimental measurements of a time-varying stochastic transcriptional response in yeast.

  3. Polarized quark distributions in bound nucleon and polarized EMC effect in Thermodynamical Bag Model

    Energy Technology Data Exchange (ETDEWEB)

    Ganesamurthy, Kuppusamy, E-mail: udckgm@sify.co [Research Department of Physics, Urumu Dhanalakshmi College, Trichy 620019 (India); Sambasivam, Raghavan, E-mail: udcsam@sify.co [Research Department of Physics, Urumu Dhanalakshmi College, Trichy 620019 (India)

    2011-04-15

    The polarized parton distribution functions (PDFs) and nuclear structure functions are evaluated by the phenomenological Thermodynamical Bag Model for nuclear media {sup 7}Li and {sup 27}Al. The Fermi statistical distribution function which includes the spin degree of freedom is used in this statistical model. We predict a sizeable polarized EMC effect. The results of quark spin sum and axial coupling constant of bound nucleons are compared with theoretical predictions of modified Nambu-Jona-Lasinio (NJL) model by Bentz et al.

  4. Orthogonality-condition model for bound states with a separable expansion of the potential

    International Nuclear Information System (INIS)

    Pal, K.F.

    1984-01-01

    A very efficient solution of the equation of Saito's orthogonality-condition model (OCM) is reported for bound states by means of a separable expansion of the potential (PSE method). Some simplifications of the published formulae of the PSE method is derived, which facilitate its application to the OCM and may be useful in solving the Schroedinger equation as well. (author)

  5. Boundedly rational learning and heterogeneous trading strategies with hybrid neuro-fuzzy models

    NARCIS (Netherlands)

    Bekiros, S.D.

    2009-01-01

    The present study deals with heterogeneous learning rules in speculative markets where heuristic strategies reflect the rules-of-thumb of boundedly rational investors. The major challenge for "chartists" is the development of new models that would enhance forecasting ability particularly for time

  6. Boson bound states in the β-Fermi–Pasta–Ulam model

    Indian Academy of Sciences (India)

    The bound states of four bosons in the quantum -Fermi–Pasta–Ulam model are investigated and some interesting results are presented using the number conserving approximation combined ... Proceedings of the International Workshop/Conference on Computational Condensed Matter Physics and Materials Science

  7. The Preisach hysteresis model: Error bounds for numerical identification and inversion

    Czech Academy of Sciences Publication Activity Database

    Krejčí, Pavel

    2013-01-01

    Roč. 6, č. 1 (2013), s. 101-119 ISSN 1937-1632 R&D Projects: GA ČR GAP201/10/2315 Institutional support: RVO:67985840 Keywords : hysteresis * Preisach model * error bounds Subject RIV: BA - General Mathematics http://www.aimsciences.org/journals/displayArticlesnew.jsp?paperID=7779

  8. A material optimization model to approximate energy bounds for cellular materials under multiload conditions

    DEFF Research Database (Denmark)

    Guedes, J.M.; Rodrigues, H.C.; Bendsøe, Martin P.

    2003-01-01

    This paper describes a computational model, based on inverse homogenization and topology design, for approximating energy bounds for two-phase composites under multiple load cases. The approach allows for the identification of possible single-scale cellular materials that give rise to the optimal...

  9. A Model-Free No-arbitrage Price Bound for Variance Options

    Energy Technology Data Exchange (ETDEWEB)

    Bonnans, J. Frederic, E-mail: frederic.bonnans@inria.fr [Ecole Polytechnique, INRIA-Saclay (France); Tan Xiaolu, E-mail: xiaolu.tan@polytechnique.edu [Ecole Polytechnique, CMAP (France)

    2013-08-01

    We suggest a numerical approximation for an optimization problem, motivated by its applications in finance to find the model-free no-arbitrage bound of variance options given the marginal distributions of the underlying asset. A first approximation restricts the computation to a bounded domain. Then we propose a gradient projection algorithm together with the finite difference scheme to solve the optimization problem. We prove the general convergence, and derive some convergence rate estimates. Finally, we give some numerical examples to test the efficiency of the algorithm.

  10. Bounding uncertainty in volumetric geometric models for terrestrial lidar observations of ecosystems.

    Science.gov (United States)

    Paynter, Ian; Genest, Daniel; Peri, Francesco; Schaaf, Crystal

    2018-04-06

    Volumetric models with known biases are shown to provide bounds for the uncertainty in estimations of volume for ecologically interesting objects, observed with a terrestrial laser scanner (TLS) instrument. Bounding cuboids, three-dimensional convex hull polygons, voxels, the Outer Hull Model and Square Based Columns (SBCs) are considered for their ability to estimate the volume of temperate and tropical trees, as well as geomorphological features such as bluffs and saltmarsh creeks. For temperate trees, supplementary geometric models are evaluated for their ability to bound the uncertainty in cylinder-based reconstructions, finding that coarser volumetric methods do not currently constrain volume meaningfully, but may be helpful with further refinement, or in hybridized models. Three-dimensional convex hull polygons consistently overestimate object volume, and SBCs consistently underestimate volume. Voxel estimations vary in their bias, due to the point density of the TLS data, and occlusion, particularly in trees. The response of the models to parametrization is analysed, observing unexpected trends in the SBC estimates for the drumlin dataset. Establishing that this result is due to the resolution of the TLS observations being insufficient to support the resolution of the geometric model, it is suggested that geometric models with predictable outcomes can also highlight data quality issues when they produce illogical results.

  11. Improved bounds on the epidemic threshold of exact SIS models on complex networks

    KAUST Repository

    Ruhi, Navid Azizan; Thrampoulidis, Christos; Hassibi, Babak

    2017-01-01

    The SIS (susceptible-infected-susceptible) epidemic model on an arbitrary network, without making approximations, is a 2n-state Markov chain with a unique absorbing state (the all-healthy state). This makes analysis of the SIS model and, in particular, determining the threshold of epidemic spread quite challenging. It has been shown that the exact marginal probabilities of infection can be upper bounded by an n-dimensional linear time-invariant system, a consequence of which is that the Markov chain is “fast-mixing” when the LTI system is stable, i.e. when equation (where β is the infection rate per link, δ is the recovery rate, and λmax(A) is the largest eigenvalue of the network's adjacency matrix). This well-known threshold has been recently shown not to be tight in several cases, such as in a star network. In this paper, we provide tighter upper bounds on the exact marginal probabilities of infection, by also taking pairwise infection probabilities into account. Based on this improved bound, we derive tighter eigenvalue conditions that guarantee fast mixing (i.e., logarithmic mixing time) of the chain. We demonstrate the improvement of the threshold condition by comparing the new bound with the known one on various networks with various epidemic parameters.

  12. Model-Independent Lower Bounds for $b \\to d$ Penguin Processes

    CERN Document Server

    Fleischer, Robert; Fleischer, Robert; Recksiegel, Stefan

    2005-01-01

    For the exploration of flavour physics, b -> d penguin processes are an important aspect, with the prominent example of \\bar B^0_d -> K^0 \\bar K^0. We recently derived lower bounds for the CP-averaged branching ratio of this channel in the Standard Model; they were found to be very close to the corresponding experimental upper limits, thereby suggesting that \\bar B^0_d -> K^0 \\bar K^0 should soon be observed. In fact, the BaBar collaboration subsequently announced the first signals of this transition. Here we point out that it is also possible to derive lower bounds for \\bar B -> \\rho \\gamma decays, which are again surprisingly close to the current experimental upper limits. We show that these bounds are realizations of a general bound that holds within the Standard Model for b -> d penguin processes, allowing further applications to decays of the kind B^\\pm -> K^{(\\ast)\\pm} K^{(\\ast)} and B^\\pm -> \\pi^\\pm \\ell^+ \\ell^-, \\rho^\\pm \\ell^+ \\ell^-.

  13. Improved bounds on the epidemic threshold of exact SIS models on complex networks

    KAUST Repository

    Ruhi, Navid Azizan

    2017-01-05

    The SIS (susceptible-infected-susceptible) epidemic model on an arbitrary network, without making approximations, is a 2n-state Markov chain with a unique absorbing state (the all-healthy state). This makes analysis of the SIS model and, in particular, determining the threshold of epidemic spread quite challenging. It has been shown that the exact marginal probabilities of infection can be upper bounded by an n-dimensional linear time-invariant system, a consequence of which is that the Markov chain is “fast-mixing” when the LTI system is stable, i.e. when equation (where β is the infection rate per link, δ is the recovery rate, and λmax(A) is the largest eigenvalue of the network\\'s adjacency matrix). This well-known threshold has been recently shown not to be tight in several cases, such as in a star network. In this paper, we provide tighter upper bounds on the exact marginal probabilities of infection, by also taking pairwise infection probabilities into account. Based on this improved bound, we derive tighter eigenvalue conditions that guarantee fast mixing (i.e., logarithmic mixing time) of the chain. We demonstrate the improvement of the threshold condition by comparing the new bound with the known one on various networks with various epidemic parameters.

  14. Upper and lower Higgs boson mass bounds from a chirally invariant lattice Higgs-Yukawa model

    International Nuclear Information System (INIS)

    Gerhold, Philipp Frederik Clemens

    2009-01-01

    Motivated by the advent of the Large Hadron Collider (LHC) the aim of the present work is the non-perturbative determination of the cutoff-dependent upper and lower mass bounds of the Standard Model Higgs boson based on first principle calculations, in particular not relying on additional information such as the triviality property of the Higgs- Yukawa sector or indirect arguments like vacuum stability considerations. For that purpose the lattice approach is employed to allow for a non-perturbative investigation of a chirally invariant lattice Higgs-Yukawa model, serving here as a reasonable simplification of the full Standard Model, containing only those fields and interactions which are most essential for the intended Higgs boson mass determination. These are the complex Higgs doublet as well as the top and bottom quark fields and their mutual interactions. To maintain the chiral character of the Standard Model Higgs-fermion coupling also on the lattice, the latter model is constructed on the basis of the Neuberger overlap operator, obeying then an exact global lattice chiral symmetry. Respecting the fermionic degrees of freedom in a fully dynamical manner by virtue of a PHMC algorithm appropriately adapted to the here intended lattice calculations, such mass bounds can indeed be established with the aforementioned approach. Supported by analytical calculations performed in the framework of the constraint effective potential, the lower bound is found to be approximately m low H (Λ)=80 GeV at a cutoff of Λ=1000 GeV. The emergence of a lower Higgs boson mass bound is thus a manifest property of the pure Higgs-Yukawa sector that evolves directly from the Higgs-fermion interaction for a given set of Yukawa coupling constants. Its quantitative size, however, turns out to be non-universal in the sense, that it depends on the specific form, for instance, of the Higgs boson self-interaction. The upper Higgs boson mass bound is then established in the strong coupling

  15. Fragment-based modelling of single stranded RNA bound to RNA recognition motif containing proteins

    Science.gov (United States)

    de Beauchene, Isaure Chauvot; de Vries, Sjoerd J.; Zacharias, Martin

    2016-01-01

    Abstract Protein-RNA complexes are important for many biological processes. However, structural modeling of such complexes is hampered by the high flexibility of RNA. Particularly challenging is the docking of single-stranded RNA (ssRNA). We have developed a fragment-based approach to model the structure of ssRNA bound to a protein, based on only the protein structure, the RNA sequence and conserved contacts. The conformational diversity of each RNA fragment is sampled by an exhaustive library of trinucleotides extracted from all known experimental protein–RNA complexes. The method was applied to ssRNA with up to 12 nucleotides which bind to dimers of the RNA recognition motifs (RRMs), a highly abundant eukaryotic RNA-binding domain. The fragment based docking allows a precise de novo atomic modeling of protein-bound ssRNA chains. On a benchmark of seven experimental ssRNA–RRM complexes, near-native models (with a mean heavy-atom deviation of <3 Å from experiment) were generated for six out of seven bound RNA chains, and even more precise models (deviation < 2 Å) were obtained for five out of seven cases, a significant improvement compared to the state of the art. The method is not restricted to RRMs but was also successfully applied to Pumilio RNA binding proteins. PMID:27131381

  16. Bounds on the Higgs mass in the standard model and the minimal supersymmetric standard model

    CERN Document Server

    Quiros, M.

    1995-01-01

    Depending on the Higgs-boson and top-quark masses, M_H and M_t, the effective potential of the {\\bf Standard Model} can develop a non-standard minimum for values of the field much larger than the weak scale. In those cases the standard minimum becomes metastable and the possibility of decay to the non-standard one arises. Comparison of the decay rate to the non-standard minimum at finite (and zero) temperature with the corresponding expansion rate of the Universe allows to identify the region, in the (M_H, M_t) plane, where the Higgs field is sitting at the standard electroweak minimum. In the {\\bf Minimal Supersymmetric Standard Model}, approximate analytical expressions for the Higgs mass spectrum and couplings are worked out, providing an excellent approximation to the numerical results which include all next-to-leading-log corrections. An appropriate treatment of squark decoupling allows to consider large values of the stop and/or sbottom mixing parameters and thus fix a reliable upper bound on the mass o...

  17. Strongest model-independent bound on the lifetime of Dark Matter

    CERN Document Server

    Audren, Benjamin; Mangano, Gianpiero; Serpico, Pasquale Dario; Tram, Thomas

    2014-01-01

    Dark Matter is essential for structure formation in the late Universe so it must be stable on cosmological time scales. But how stable exactly? Only assuming decays into relativistic particles, we report an otherwise model independent bound on the lifetime of Dark Matter using current cosmological data. Since these decays affect only the low-$\\ell$ multipoles of the CMB, the Dark Matter lifetime is expected to correlate with the tensor-to-scalar ratio $r$ as well as curvature $\\Omega_k$. We consider two models, including $r$ and $r+\\Omega_k$ respectively, versus data from Planck, WMAP, WiggleZ and Baryon Acoustic Oscillations, with or without the BICEP2 data (if interpreted in terms of primordial gravitational waves). This results in a lower bound on the lifetime of CDM given by 160Gyr (without BICEP2) or 200Gyr (with BICEP2) at 95% confidence level.

  18. A relativistic gauge model describing N particles bound by harmonic forces

    International Nuclear Information System (INIS)

    Filippov, A.T.

    1987-01-01

    Application of the principle of gauging to linear canonical symmetries of simplest/rudimentary/bilinear lagrangians is shown to produce a relativistic version of the Lagrangian describing N particles bound by harmonic forces. For pairwise coupled identical particles the gauge group is T 1 xU 1 , xSU N-1 . A model for the relativistic discrete string (a chain of N particles) is also discussed. All these gauge theoried of particles can be quantized by standard methods

  19. Bound state solution of the Grassmannian nonlinear sigma model with fermions

    International Nuclear Information System (INIS)

    Abdalla, E.; Lima-Santos, A.

    1987-11-01

    We construct the s matrix for bound state (gauge-invariant) scattering for nonlinear sigma models defined on the manifold SU(N)/S(U(p)x (lower casex)U(n-p)) with fermions. It is not possible to compute gauge non-singlet matrix elements. In the present language they are not submitted to sufficiently many constraints derived from higher conservation laws. (author) [pt

  20. Bag-model analyses of proton-antiproton scattering and atomic bound states

    International Nuclear Information System (INIS)

    Alberg, M.A.; Freedman, R.A.; Henley, E.M.; Hwang, W.P.; Seckel, D.; Wilets, L.

    1983-01-01

    We study proton-antiproton (pp-bar ) scattering using the static real potential of Bryan and Phillips outside a cutoff radius rsub0 and two different shapes for the imaginary potential inside a radius R*. These forms, motivated by bag models, are a one-gluon-annihilation potential and a simple geometric-overlap form. In both cases there are three adjustable parameters: the effective bag radius R*, the effective strong coupling constant αsubssup*, and rsub0. There is also a choice for the form of the real potential inside the cutoff radius rsub0. Analysis of the pp-bar scattering data in the laboratory-momentum region 0.4--0.7 GeV/c yields an effective nucleon bag radius R* in the range 0.6--1.1 fm, with the best fit obtained for R* = 0.86 fm. Arguments are presented that the deduced value of R* is likely to be an upper bound on the isolated nucleon bag radius. The present results are consistent with the range of bag radii in current bag models. We have also used the resultant optical potential to calculate the shifts and widths of the sup3Ssub1 and sup1Ssub0 atomic bound states of the pp-bar system. For both states we find upward (repulsive) shifts and widths of about 1 keV. We find no evidence for narrow, strongly bound pp-bar states in our potential model

  1. Bounding the electrostatic free energies associated with linear continuum models of molecular solvation.

    Science.gov (United States)

    Bardhan, Jaydeep P; Knepley, Matthew G; Anitescu, Mihai

    2009-03-14

    The importance of electrostatic interactions in molecular biology has driven extensive research toward the development of accurate and efficient theoretical and computational models. Linear continuum electrostatic theory has been surprisingly successful, but the computational costs associated with solving the associated partial differential equations (PDEs) preclude the theory's use in most dynamical simulations. Modern generalized-Born models for electrostatics can reproduce PDE-based calculations to within a few percent and are extremely computationally efficient but do not always faithfully reproduce interactions between chemical groups. Recent work has shown that a boundary-integral-equation formulation of the PDE problem leads naturally to a new approach called boundary-integral-based electrostatics estimation (BIBEE) to approximate electrostatic interactions. In the present paper, we prove that the BIBEE method can be used to rigorously bound the actual continuum-theory electrostatic free energy. The bounds are validated using a set of more than 600 proteins. Detailed numerical results are presented for structures of the peptide met-enkephalin taken from a molecular-dynamics simulation. These bounds, in combination with our demonstration that the BIBEE methods accurately reproduce pairwise interactions, suggest a new approach toward building a highly accurate yet computationally tractable electrostatic model.

  2. Bounding the electrostatic free energies associated with linear continuum models of molecular solvation.

    Energy Technology Data Exchange (ETDEWEB)

    Bardhan, J. P.; Knepley, M. G.; Anitescu, M. (Biosciences Division); ( MCS); (Rush Univ.)

    2009-03-01

    The importance of electrostatic interactions in molecular biology has driven extensive research toward the development of accurate and efficient theoretical and computational models. Linear continuum electrostatic theory has been surprisingly successful, but the computational costs associated with solving the associated partial differential equations (PDEs) preclude the theory's use in most dynamical simulations. Modern generalized-Born models for electrostatics can reproduce PDE-based calculations to within a few percent and are extremely computationally efficient but do not always faithfully reproduce interactions between chemical groups. Recent work has shown that a boundary-integral-equation formulation of the PDE problem leads naturally to a new approach called boundary-integral-based electrostatics estimation (BIBEE) to approximate electrostatic interactions. In the present paper, we prove that the BIBEE method can be used to rigorously bound the actual continuum-theory electrostatic free energy. The bounds are validated using a set of more than 600 proteins. Detailed numerical results are presented for structures of the peptide met-enkephalin taken from a molecular-dynamics simulation. These bounds, in combination with our demonstration that the BIBEE methods accurately reproduce pairwise interactions, suggest a new approach toward building a highly accurate yet computationally tractable electrostatic model.

  3. Resolvent-based modeling of passive scalar dynamics in wall-bounded turbulence

    Science.gov (United States)

    Dawson, Scott; Saxton-Fox, Theresa; McKeon, Beverley

    2017-11-01

    The resolvent formulation of the Navier-Stokes equations expresses the system state as the output of a linear (resolvent) operator acting upon a nonlinear forcing. Previous studies have demonstrated that a low-rank approximation of this linear operator predicts many known features of incompressible wall-bounded turbulence. In this work, this resolvent model for wall-bounded turbulence is extended to include a passive scalar field. This formulation allows for a number of additional simplifications that reduce model complexity. Firstly, it is shown that the effect of changing scalar diffusivity can be approximated through a transformation of spatial wavenumbers and temporal frequencies. Secondly, passive scalar dynamics may be studied through the low-rank approximation of a passive scalar resolvent operator, which is decoupled from velocity response modes. Thirdly, this passive scalar resolvent operator is amenable to approximation by semi-analytic methods. We investigate the extent to which this resulting hierarchy of models can describe and predict passive scalar dynamics and statistics in wall-bounded turbulence. The support of AFOSR under Grant Numbers FA9550-16-1-0232 and FA9550-16-1-0361 is gratefully acknowledged.

  4. Vacuum stability bounds in anomaly and gaugino mediated supersymmetry breaking models

    International Nuclear Information System (INIS)

    Gabrielli, Emidio; Huitu, Katri; Roy, Sourov

    2002-01-01

    We constrain the parameter space of the minimal and gaugino-assisted anomaly mediation, and gaugino mediation models by requiring that the electroweak vacuum corresponds to the deepest minimum of the scalar potential. In the framework of anomaly mediation models we find strong lower bounds on slepton and squark masses. In the gaugino mediation models the mass spectrum is forced to be at the TeV scale. We find extensive regions of the parameter space which are ruled out, even at low tanβ. The implications of these results on the g-2 of the muon are also analyzed

  5. Preparatory steps for a robust dynamic model for organically bound tritium dynamics in agricultural crops

    Energy Technology Data Exchange (ETDEWEB)

    Melintescu, A.; Galeriu, D. [' Horia Hulubei' National Institute for Physics and Nuclear Engineering, Bucharest-Magurele (Romania); Diabate, S.; Strack, S. [Institute of Toxicology and Genetics, Karlsruhe Institute of Technology - KIT, Eggenstein-Leopoldshafen (Germany)

    2015-03-15

    The processes involved in tritium transfer in crops are complex and regulated by many feedback mechanisms. A full mechanistic model is difficult to develop due to the complexity of the processes involved in tritium transfer and environmental conditions. First, a review of existing models (ORYZA2000, CROPTRIT and WOFOST) presenting their features and limits, is made. Secondly, the preparatory steps for a robust model are discussed, considering the role of dry matter and photosynthesis contribution to the OBT (Organically Bound Tritium) dynamics in crops.

  6. New bounds on the phase transition line in a non-compact abelian lattice Higgs model

    International Nuclear Information System (INIS)

    Nill, F.

    1987-01-01

    The Higgs expectation value and the 't Hooft loop are investigated as order respectively disorder parameters in a fixed-length Higgs model of Villain type with gauge group R. Based on either observable the phase transition line is shown to be monotonically decreasing and Lipschitz continuous with Lipschitz constant 4d in dimension d ≥ 3. This gives new bounds on the phase transition line in terms of its endpoints, i.e. the critical couplings of the Z-gauge model and the XY-model with Villain action, respectively. (orig.)

  7. Modelling and analysis of a compensator burst after a check valve slam with the pressure surge code DYVRO mod. 3

    International Nuclear Information System (INIS)

    Neuhaus, Thorsten; Schaffrath, Andreas

    2009-01-01

    In this contribution the analysis and calculation of a compensator burst after a pump start and check valve slam with the pressure surge code DYVRO mod. 3 are presented. The compensator burst occurred in the essential service water system (ESWS) of a pressurized water reactor (PWR) in a deviant operation mode. Due to lack of knowledge about the causes a systematic investigation has been performed by TUV NORD SysTec GmbH and Co. KG. The following scenario was identified as most likely: Because of maintenance a heat exchanger was shut off from the ESWS by a closed valve. Due to the hydrostatic pressure profile air had been sucked in through this leaky closed valve forming an air bubble. After the pump start the water was accelerated against the closed valve where the air bubble was compressed. The subsequent backflow resulted in a fast closing of a check valve and a pressure surge that caused the compensator burst. Calculations have been performed with the self developed and validated pressure surge computer code DYVRO mod. 3. The present paper is focussed on the modelling of the pipe system, the pump, the check valve and the behaviour of the air bubble as well as the simulation of the incident. The calculated maximum pressure in the ESWS is above 3 MPa, which is approx. four times higher than the design pressure of 0.7 MPa. This pressure increase has led most likely to the abrupt compensator failure. (author)

  8. How useful are delta checks in the 21st century? A stochastic-dynamic model of specimen mix-up and detection

    Directory of Open Access Journals (Sweden)

    Katie Ovens

    2012-01-01

    Full Text Available Introduction: Delta checks use two specimen test results taken in succession in order to detect test result changes greater than expected physiological variation. One of the most common and serious errors detected by delta checks is specimen mix-up errors. The positive and negative predictive values of delta checks for detecting specimen mix-up errors, however, are largely unknown. Materials and Methods: We addressed this question by first constructing a stochastic dynamic model using repeat test values for five analytes from approximately 8000 inpatients in Calgary, Alberta, Canada. The analytes examined were sodium, potassium, chloride, bicarbonate, and creatinine. The model simulated specimen mix-up errors by randomly switching a set number of pairs of second test results. Sensitivities and specificities were then calculated for each analyte for six combinations of delta check equations and cut-off values from the published literature. Results: Delta check specificities obtained from this model ranged from 50% to 99%; however the sensitivities were generally below 20% with the exception of creatinine for which the best performing delta check had a sensitivity of 82.8%. Within a plausible incidence range of specimen mix-ups the positive predictive values of even the best performing delta check equation and analyte became negligible. Conclusion: This finding casts doubt on the ongoing clinical utility of delta checks in the setting of low rates of specimen mix-ups.

  9. Emergent low-energy bound states in the two-orbital Hubbard model

    Science.gov (United States)

    Núñez-Fernández, Y.; Kotliar, G.; Hallberg, K.

    2018-03-01

    A repulsive Coulomb interaction between electrons in different orbitals in correlated materials can give rise to bound quasiparticle states. We study the nonhybridized two-orbital Hubbard model with intra- (inter)orbital interaction U (U12) and different bandwidths using an improved dynamical mean-field theory numerical technique which leads to reliable spectra on the real energy axis directly at zero temperature. We find that a finite density of states at the Fermi energy in one band is correlated with the emergence of well-defined quasiparticle states at excited energies Δ =U -U12 in the other band. These excitations are interband holon-doublon bound states. At the symmetric point U =U12 , the quasiparticle peaks are located at the Fermi energy, leading to a simultaneous and continuous Mott transition settling a long-standing controversy.

  10. Opinion formation and distribution in a bounded-confidence model on various networks

    Science.gov (United States)

    Meng, X. Flora; Van Gorder, Robert A.; Porter, Mason A.

    2018-02-01

    In the social, behavioral, and economic sciences, it is important to predict which individual opinions eventually dominate in a large population, whether there will be a consensus, and how long it takes for a consensus to form. Such ideas have been studied heavily both in physics and in other disciplines, and the answers depend strongly both on how one models opinions and on the network structure on which opinions evolve. One model that was created to study consensus formation quantitatively is the Deffuant model, in which the opinion distribution of a population evolves via sequential random pairwise encounters. To consider heterogeneity of interactions in a population along with social influence, we study the Deffuant model on various network structures (deterministic synthetic networks, random synthetic networks, and social networks constructed from Facebook data). We numerically simulate the Deffuant model and conduct regression analyses to investigate the dependence of the time to reach steady states on various model parameters, including a confidence bound for opinion updates, the number of participating entities, and their willingness to compromise. We find that network structure and parameter values both have important effects on the convergence time and the number of steady-state opinion groups. For some network architectures, we observe that the relationship between the convergence time and model parameters undergoes a transition at a critical value of the confidence bound. For some networks, the steady-state opinion distribution also changes from consensus to multiple opinion groups at this critical value.

  11. Uncertainty Quantification of Turbulence Model Closure Coefficients for Transonic Wall-Bounded Flows

    Science.gov (United States)

    Schaefer, John; West, Thomas; Hosder, Serhat; Rumsey, Christopher; Carlson, Jan-Renee; Kleb, William

    2015-01-01

    The goal of this work was to quantify the uncertainty and sensitivity of commonly used turbulence models in Reynolds-Averaged Navier-Stokes codes due to uncertainty in the values of closure coefficients for transonic, wall-bounded flows and to rank the contribution of each coefficient to uncertainty in various output flow quantities of interest. Specifically, uncertainty quantification of turbulence model closure coefficients was performed for transonic flow over an axisymmetric bump at zero degrees angle of attack and the RAE 2822 transonic airfoil at a lift coefficient of 0.744. Three turbulence models were considered: the Spalart-Allmaras Model, Wilcox (2006) k-w Model, and the Menter Shear-Stress Trans- port Model. The FUN3D code developed by NASA Langley Research Center was used as the flow solver. The uncertainty quantification analysis employed stochastic expansions based on non-intrusive polynomial chaos as an efficient means of uncertainty propagation. Several integrated and point-quantities are considered as uncertain outputs for both CFD problems. All closure coefficients were treated as epistemic uncertain variables represented with intervals. Sobol indices were used to rank the relative contributions of each closure coefficient to the total uncertainty in the output quantities of interest. This study identified a number of closure coefficients for each turbulence model for which more information will reduce the amount of uncertainty in the output significantly for transonic, wall-bounded flows.

  12. Model Checking a Self-Stabilizing Distributed Clock Synchronization Protocol for Arbitrary Digraphs

    Science.gov (United States)

    Malekpour, Mahyar R.

    2011-01-01

    This report presents the mechanical verification of a self-stabilizing distributed clock synchronization protocol for arbitrary digraphs in the absence of faults. This protocol does not rely on assumptions about the initial state of the system, other than the presence of at least one node, and no central clock or a centrally generated signal, pulse, or message is used. The system under study is an arbitrary, non-partitioned digraph ranging from fully connected to 1-connected networks of nodes while allowing for differences in the network elements. Nodes are anonymous, i.e., they do not have unique identities. There is no theoretical limit on the maximum number of participating nodes. The only constraint on the behavior of the node is that the interactions with other nodes are restricted to defined links and interfaces. This protocol deterministically converges within a time bound that is a linear function of the self-stabilization period.

  13. A gauge model describing N relativistic particles bound by linear forces

    International Nuclear Information System (INIS)

    Filippov, A.T.

    1988-01-01

    A relativistic model of N particles bound by linear forces is obtained by applying the gauging procedure to the linear canonical symmteries of a simple (rudimentary) nonrelativistic N-particle Lagrangian extended to relativistic phase space. The new (gauged) Lagrangian is formally Poincare invariant, the Hamiltonian is a linear combination of first-class constraints which are closed with respect to Pisson brackets and generate the localized canonical symmteries. The gauge potentials appear as the Lagrange multipliers of the constraints. Gauge fixing and quantization of the model are also briefly discussed. 11 refs

  14. Statistical validation of engineering and scientific models : bounds, calibration, and extrapolation.

    Energy Technology Data Exchange (ETDEWEB)

    Dowding, Kevin J.; Hills, Richard Guy (New Mexico State University, Las Cruces, NM)

    2005-04-01

    Numerical models of complex phenomena often contain approximations due to our inability to fully model the underlying physics, the excessive computational resources required to fully resolve the physics, the need to calibrate constitutive models, or in some cases, our ability to only bound behavior. Here we illustrate the relationship between approximation, calibration, extrapolation, and model validation through a series of examples that use the linear transient convective/dispersion equation to represent the nonlinear behavior of Burgers equation. While the use of these models represents a simplification relative to the types of systems we normally address in engineering and science, the present examples do support the tutorial nature of this document without obscuring the basic issues presented with unnecessarily complex models.

  15. Noninvasive estimation of bound and mobile platinum compounds in the kidney using a radiopharmacokinetic model

    International Nuclear Information System (INIS)

    Brechner, R.R.; D'Argenio, D.Z.; Dahalan, R.; Wolf, W.

    1986-01-01

    Nephrotoxicity remains a major limitation in the use of cisplatin [cis-diamminedichloroplatinum(II)]. Although several strategies are in use to limit this serious side effect, none is fully satisfactory. Classical pharmacokinetic studies of cisplatin have been based on blood and urine samples. As nephrotoxicity plays a significant role in the design of the therapeutic strategy, the kidneys should be considered as a separate state in any model formulated for ultimate control purposes. Previous studies of organ pharmacokinetics have relied on population measurements. The authors have developed an organ compartmental model from individual animal data obtained noninvasively. The eight-compartment model used to represent the distribution of cisplatin considers free and bound platinum in plasma, platinum in the erythrocytes, mobile and bound platinum in the kidneys, mobile and bound platinum in the tissues, and platinum in the urine. Data were collected from experiments with anesthetized female rats, after intravenous administration of [195mPt]cisplatin. Both arterial and bladder samples, and multiple images obtained with an Anger camera interfaced to a microcomputer were used. The model was estimated from individual data obtained after injection of a bolus of cisplatin (six animals). The model was validated by using it to predict data obtained from forcing the system with a different input function, a 0.5-h intravenous infusion (three animals). The results of this work show that it is possible to noninvasively study drug kinetics in organs that are not readily accessible to direct measurements in an individual, rather than relying on invasive measurements performed on a population.(ABSTRACT TRUNCATED AT 250 WORDS)

  16. Physical modelling of sediment transport in mountain torrents upstream of open check dams

    Science.gov (United States)

    Schwindt, Sebastian; Franca, Mario J.; Schleiss, Anton J.

    2015-04-01

    Dynamic morphological processes in mountain torrents do not only attract the attention of many contemporary researchers, but are also a relevant issue for the design of flood protection measures in the downstream sections where dwellers may be threatened by the important potential of flows with high concentration of sediments. Events which have a morphodynamic effect are simulated at the Laboratory of Hydraulic Constructions (LCH) in order to optimize the design of a flood protection measure, notably open check dams. Different scenarios with a fix bed consisting of boulders as well as mobile beds are studied and the influence of flow constrictions, i.e. distinct geometric configurations of open check dams are analysed. Three varying water pumped discharges in the order of 5 to 20 l/s are tested with progressively increasing solid discharges of 1, 3 and 6 % of the liquid discharge according to the transport capacity. The moistened sediments are introduced via a system of conveyor belts and are then mixed with the liquid discharge in an about 3 m long rough trapezoidal channel with a base width of 24 cm. The mean diameter Dm of the injected sediments is 0.86 cm and the dimensionless grain size distribution is in line with a normalized shape derived from over 60 streams in the Alps. A wide range of frequent floods in morphologically diverging types of mountain torrents is covered, in particular regarding the sediment availability in the catchment area and along the river. A basic assumption here is considering that the frequent floods are floods with return periods between 1 to 5 years and are the most important process in terms of amounts of sediment transport. This may be arguable for some mountain torrents and landscape effective processes which are driven by floods with return periods of more than several decades. In order to identify benchmarks for hydraulic parameters which lead to the obstruction of flow restrictions at mountain torrents, the water depth is

  17. Model-Checking an Alternating-time Temporal Logic with Knowledge, Imperfect Information, Perfect Recall and Communicating Coalitions

    Directory of Open Access Journals (Sweden)

    Cătălin Dima

    2010-06-01

    Full Text Available We present a variant of ATL with distributed knowledge operators based on a synchronous and perfect recall semantics. The coalition modalities in this logic are based on partial observation of the full history, and incorporate a form of cooperation between members of the coalition in which agents issue their actions based on the distributed knowledge, for that coalition, of the system history. We show that model-checking is decidable for this logic. The technique utilizes two variants of games with imperfect information and partially observable objectives, as well as a subset construction for identifying states whose histories are indistinguishable to the considered coalition.

  18. A comparison between skeleton and bounding box models for falling direction recognition

    Science.gov (United States)

    Narupiyakul, Lalita; Srisrisawang, Nitikorn

    2017-12-01

    Falling is an injury that can lead to a serious medical condition in every range of the age of people. However, in the case of elderly, the risk of serious injury is much higher. Due to the fact that one way of preventing serious injury is to treat the fallen person as soon as possible, several works attempted to implement different algorithms to recognize the fall. Our work compares the performance of two models based on features extraction: (i) Body joint data (Skeleton Data) which are the joint's positions in 3 axes and (ii) Bounding box (Box-size Data) covering all body joints. Machine learning algorithms that were chosen are Decision Tree (DT), Naïve Bayes (NB), K-nearest neighbors (KNN), Linear discriminant analysis (LDA), Voting Classification (VC), and Gradient boosting (GB). The results illustrate that the models trained with Skeleton data are performed far better than those trained with Box-size data (with an average accuracy of 94-81% and 80-75%, respectively). KNN shows the best performance in both Body joint model and Bounding box model. In conclusion, KNN with Body joint model performs the best among the others.

  19. Model Checking the Logic of Allen's Relations Meets and Started-by is P^NP-Complete

    Directory of Open Access Journals (Sweden)

    Laura Bozzelli

    2016-09-01

    Full Text Available In the plethora of fragments of Halpern and Shoham's modal logic of time intervals (HS, the logic AB of Allen's relations Meets and Started-by is at a central position. Statements that may be true at certain intervals, but at no sub-interval of them, such as accomplishments, as well as metric constraints about the length of intervals, that force, for instance, an interval to be at least (resp., at most, exactly k points long, can be expressed in AB. Moreover, over the linear order of the natural numbers N, it subsumes the (point-based logic LTL, as it can easily encode the next and until modalities. Finally, it is expressive enough to capture the ω-regular languages, that is, for each ω-regular expression R there exists an AB formula Φ such that the language defined by R coincides with the set of models of Φ over N. It has been shown that the satisfiability problem for AB over N is EXPSPACE-complete. Here we prove that, under the homogeneity assumption, its model checking problem is Δ^p_2 = P^NP-complete (for the sake of comparison, the model checking problem for full HS is EXPSPACE-hard, and the only known decision procedure is nonelementary. Moreover, we show that the modality for the Allen relation Met-by can be added to AB at no extra cost (AA'B is P^NP-complete as well.

  20. Modelling of coupled self-actuating safety, relief and damped check valve systems with the codes TRAC-PF1 and ROLAST

    International Nuclear Information System (INIS)

    Neumann, U.; Puzalowski, R.; Grimm, I.

    1985-01-01

    Numerical valve models for simulation of selfactuating safety valves and damped check valves are introduced for the computer programs TRAC-PF1 and ROLAST. As examples of application post-test calculations and stability analysis are given. (orig.)

  1. The Effectiveness of Cooperative Learning Model of Pair Checks Type on Motivation and Mathematics Learning Outcomes of 8th Grade Junior High School Students

    Directory of Open Access Journals (Sweden)

    Wahyu Budi Wicaksono

    2017-08-01

    Full Text Available The purpose of this research was to know the effectiveness of Pair Checks cooperative model towards students’ learning result and learning motivation of eight grade. Population of this research were students of eight grade Junior High School 2 Pati in the academic year 2016/1017. The research used cluster random sampling technique.Where the selected samples were students of class VIII H as experimental class and class VIII G as control class. The data collected by the method of documentation, test methods, and scale methods. The analyzed of data used completeness test and average different test. The results showed that: (1 students’ learning result who join Pair Checks cooperative model have classical study completeness; (2 students’ mathematics learning result who join Pair Checks cooperative model is better than students mathematics learning result who join ekspository learning; (3 students’ learning motivation who join Pair Checks cooperative model is better than students’ learning motivation who join ekspository learning.

  2. 12 CFR Appendix C to Part 229 - Model Availability Policy Disclosures, Clauses, and Notices; Model Substitute Check Policy...

    Science.gov (United States)

    2010-01-01

    ...-case holds) C-19Notice at automated teller machines C-20Notice at automated teller machines (delayed... would like a list of the routing numbers for these institutions. C-9—Automated Teller Machine Deposits (Extended Hold) Deposits at Automated Teller Machines Funds from any deposits (cash or checks) made at...

  3. Exponential attractors for a Cahn-Hilliard model in bounded domains with permeable walls

    Directory of Open Access Journals (Sweden)

    Ciprian G. Gal

    2006-11-01

    Full Text Available In a previous article [7], we proposed a model of phase separation in a binary mixture confined to a bounded region which may be contained within porous walls. The boundary conditions were derived from a mass conservation law and variational methods. In the present paper, we study the problem further. Using a Faedo-Galerkin method, we obtain the existence and uniqueness of a global solution to our problem, under more general assumptions than those in [7]. We then study its asymptotic behavior and prove the existence of an exponential attractor (and thus of a global attractor with finite dimension.

  4. NEW UPPER AND LOWER BOUNDS LINE OF SIGHT PATH LOSS MODELS FOR MOBILE PROPAGATION IN BUILDINGS

    Directory of Open Access Journals (Sweden)

    Supachai Phaiboon

    2017-11-01

    Full Text Available This paper proposes a method to predict line-of-sight (LOS path loss in buildings. We performed measurements in two different type of buildings at a frequency of 1.8 GHz and propose new upper and lower bounds path loss models which depend on max and min values of sample path loss data. This makes our models limit path loss within the boundary lines. The models include time-variant effects such as people moving and cars in parking areas with their influence on wave propagation that is very high.  The results have shown that the proposed models will be useful for the system and cell design of indoor wireless communication systems.

  5. Modeling and simulation in inquiry learning: Checking solutions and giving intelligent advice

    NARCIS (Netherlands)

    Bravo, C.; van Joolingen, W.R.; de Jong, T.

    2006-01-01

    Inquiry learning is a didactic approach in which students acquire knowledge and skills through processes of theory building and experimentation. Computer modeling and simulation can play a prominent role within this approach. Students construct representations of physical systems using modeling.

  6. Establishing the existence of a distance-based upper bound for a fuzzy DEA model using duality

    International Nuclear Information System (INIS)

    Soleimani-damaneh, M.

    2009-01-01

    In a recent paper [Soleimani-damaneh M. Fuzzy upper bounds and their applications. Chaos, Solitons and Fractals 2008;36:217-25.], I established the existence of a distance-based fuzzy upper bound for the objective function of a fuzzy DEA model, using the properties of a discussed signed distance, and provided an effective approach to solve that model. In this paper a new dual-based proof for the existence of the above-mentioned upper bound is provided which gives a useful insight into the theory of fuzzy DEA.

  7. Using a Water Balance Model to Bound Potential Irrigation Development in the Upper Blue Nile Basin

    Science.gov (United States)

    Jain Figueroa, A.; McLaughlin, D.

    2016-12-01

    The Grand Ethiopian Renaissance Dam (GERD), on the Blue Nile is an example of water resource management underpinning food, water and energy security. Downstream countries have long expressed concern about water projects in Ethiopia because of possible diversions to agricultural uses that could reduce flow in the Nile. Such diversions are attractive to Ethiopia as a partial solution to its food security problems but they could also conflict with hydropower revenue from GERD. This research estimates an upper bound on diversions above the GERD project by considering the potential for irrigated agriculture expansion and, in particular, the availability of water and land resources for crop production. Although many studies have aimed to simulate downstream flows for various Nile basin management plans, few have taken the perspective of bounding the likely impacts of upstream agricultural development. The approach is to construct an optimization model to establish a bound on Upper Blue Nile (UBN) agricultural development, paying particular attention to soil suitability and seasonal variability in climate. The results show that land and climate constraints impose significant limitations on crop production. Only 25% of the land area is suitable for irrigation due to the soil, slope and temperature constraints. When precipitation is also considered only 11% of current land area could be used in a way that increases water consumption. The results suggest that Ethiopia could consume an additional 3.75 billion cubic meters (bcm) of water per year, through changes in land use and storage capacity. By exploiting this irrigation potential, Ethiopia could potentially decrease the annual flow downstream of the UBN by 8 percent from the current 46 bcm/y to the modeled 42 bcm/y.

  8. Effect of precipitation spatial distribution uncertainty on the uncertainty bounds of a snowmelt runoff model output

    Science.gov (United States)

    Jacquin, A. P.

    2012-04-01

    This study analyses the effect of precipitation spatial distribution uncertainty on the uncertainty bounds of a snowmelt runoff model's discharge estimates. Prediction uncertainty bounds are derived using the Generalized Likelihood Uncertainty Estimation (GLUE) methodology. The model analysed is a conceptual watershed model operating at a monthly time step. The model divides the catchment into five elevation zones, where the fifth zone corresponds to the catchment glaciers. Precipitation amounts at each elevation zone i are estimated as the product between observed precipitation (at a single station within the catchment) and a precipitation factor FPi. Thus, these factors provide a simplified representation of the spatial variation of precipitation, specifically the shape of the functional relationship between precipitation and height. In the absence of information about appropriate values of the precipitation factors FPi, these are estimated through standard calibration procedures. The catchment case study is Aconcagua River at Chacabuquito, located in the Andean region of Central Chile. Monte Carlo samples of the model output are obtained by randomly varying the model parameters within their feasible ranges. In the first experiment, the precipitation factors FPi are considered unknown and thus included in the sampling process. The total number of unknown parameters in this case is 16. In the second experiment, precipitation factors FPi are estimated a priori, by means of a long term water balance between observed discharge at the catchment outlet, evapotranspiration estimates and observed precipitation. In this case, the number of unknown parameters reduces to 11. The feasible ranges assigned to the precipitation factors in the first experiment are slightly wider than the range of fixed precipitation factors used in the second experiment. The mean squared error of the Box-Cox transformed discharge during the calibration period is used for the evaluation of the

  9. Bounded Rational Managers Struggle with Talent Management - An Agent-based Modelling Approach

    DEFF Research Database (Denmark)

    Adamsen, Billy; Thomsen, Svend Erik

    This study applies an agent-based modeling approach to explore some aspects of an important managerial task: finding and cultivating talented individuals capable of creating value for their organization at some future state. Given that the term talent in talent management is an empty signifier...... and its denotative meaning floating, we propose that bounded rational managers base their decisions on a simple heuristic, i.e. selecting and cultivating individuals so that their capabilities resemble their own capabilities the most (Adamsen 2015). We model the consequences of this talent management...... heuristic by varying the capabilities of today’s managers, which in turn impact which individuals will be selected as talent. We model the average level of capabilities and the distribution thereof in the sample where managers identify and select individuals from. We consider varying degrees of path...

  10. A Model-Based Framework for Legal Policy Simulation and Compliance Checking

    OpenAIRE

    Soltana, Ghanem

    2017-01-01

    Information systems implementing requirements from laws and regulations, such as taxes and social benefits, need to be thoroughly verified to demonstrate their compliance. Several Verification and Validation (V&V) techniques, such as reliability testing, and modeling and simulation, can be used for assessing that such systems meet their legal. Typically, one has to model the expected (legal) behavior of the system in a form that can be executed (simulated), subject the resulting models and th...

  11. Learning and Model-checking Networks of I/O Automata

    DEFF Research Database (Denmark)

    Mao, Hua; Jaeger, Manfred

    2012-01-01

    We introduce a new statistical relational learning (SRL) approach in which models for structured data, especially network data, are constructed as networks of communicating nite probabilistic automata. Leveraging existing automata learning methods from the area of grammatical inference, we can...... learn generic models for network entities in the form of automata templates. As is characteristic for SRL techniques, the abstraction level aorded by learning generic templates enables one to apply the learned model to new domains. A main benet of learning models based on nite automata lies in the fact...

  12. Logic Model Checking of Time-Periodic Real-Time Systems

    Science.gov (United States)

    Florian, Mihai; Gamble, Ed; Holzmann, Gerard

    2012-01-01

    In this paper we report on the work we performed to extend the logic model checker SPIN with built-in support for the verification of periodic, real-time embedded software systems, as commonly used in aircraft, automobiles, and spacecraft. We first extended the SPIN verification algorithms to model priority based scheduling policies. Next, we added a library to support the modeling of periodic tasks. This library was used in a recent application of the SPIN model checker to verify the engine control software of an automobile, to study the feasibility of software triggers for unintended acceleration events.

  13. XML-based formulation of field theoretical models. A proposal for a future standard and data base for model storage, exchange and cross-checking of results

    International Nuclear Information System (INIS)

    Demichev, A.; Kryukov, A.; Rodionov, A.

    2002-01-01

    We propose an XML-based standard for formulation of field theoretical models. The goal of creation of such a standard is to provide a way for an unambiguous exchange and cross-checking of results of computer calculations in high energy physics. At the moment, the suggested standard implies that models under consideration are of the SM or MSSM type (i.e., they are just SM or MSSM, their submodels, smooth modifications or straightforward generalizations). (author)

  14. Automated evolutionary restructuring of workflows to minimise errors via stochastic model checking

    DEFF Research Database (Denmark)

    Herbert, Luke Thomas; Hansen, Zaza Nadja Lee; Jacobsen, Peter

    2014-01-01

    This paper presents a framework for the automated restructuring of workflows that allows one to minimise the impact of errors on a production workflow. The framework allows for the modelling of workflows by means of a formalised subset of the Business Process Modelling and Notation (BPMN) language...

  15. Restructuring of workflows to minimise errors via stochastic model checking: An automated evolutionary approach

    DEFF Research Database (Denmark)

    Herbert, Luke Thomas; Hansen, Zaza Nadja Lee

    2016-01-01

    This article presents a framework for the automated restructuring of stochastic workflows to reduce the impact of faults. The framework allows for the modelling of workflows by means of a formalised subset of the BPMN workflow language. We extend this modelling formalism to describe faults...

  16. Scalable and Accurate SMT-Based Model Checking of Data Flow Systems

    Science.gov (United States)

    2013-10-31

    of variable x is always less than that of variable y) can be represented in this theory. • A theory of inductive datatypes . Modeling software... datatypes can be done directly in this theory. • A theory of arrays. Software that uses arrays can be modeled with constraints in this theory, as can...Arithmetic (and specialized fragments) Arrays Inductive datatypes Bit-vectors Uninterpreted functions SMT Engine Input interfaces FEATURES Support for

  17. NLIE of Dirichlet sine-Gordon model for boundary bound states

    International Nuclear Information System (INIS)

    Ahn, Changrim; Bajnok, Zoltan; Palla, Laszlo; Ravanini, Francesco

    2008-01-01

    We investigate boundary bound states of sine-Gordon model on the finite-size strip with Dirichlet boundary conditions. For the purpose we derive the nonlinear integral equation (NLIE) for the boundary excited states from the Bethe ansatz equation of the inhomogeneous XXZ spin 1/2 chain with boundary imaginary roots discovered by Saleur and Skorik. Taking a large volume (IR) limit we calculate boundary energies, boundary reflection factors and boundary Luescher corrections and compare with the excited boundary states of the Dirichlet sine-Gordon model first considered by Dorey and Mattsson. We also consider the short distance limit and relate the IR scattering data with that of the UV conformal field theory

  18. Importance of Lorentz structure in the parton model: Target mass corrections, transverse momentum dependence, positivity bounds

    International Nuclear Information System (INIS)

    D'Alesio, U.; Leader, E.; Murgia, F.

    2010-01-01

    We show that respecting the underlying Lorentz structure in the parton model has very strong consequences. Failure to insist on the correct Lorentz covariance is responsible for the existence of contradictory results in the literature for the polarized structure function g 2 (x), whereas with the correct imposition we are able to derive the Wandzura-Wilczek relation for g 2 (x) and the target-mass corrections for polarized deep inelastic scattering without recourse to the operator product expansion. We comment briefly on the problem of threshold behavior in the presence of target-mass corrections. Careful attention to the Lorentz structure has also profound implications for the structure of the transverse momentum dependent parton densities often used in parton model treatments of hadron production, allowing the k T dependence to be derived explicitly. It also leads to stronger positivity and Soffer-type bounds than usually utilized for the collinear densities.

  19. A Framework for Relating Timed Transition Systems and Preserving TCTL Model Checking

    DEFF Research Database (Denmark)

    Jacobsen, Lasse; Jacobsen, Morten; Møller, Mikael Harkjær

    2010-01-01

    Many formal translations between time dependent models have been proposed over the years. While some of them produce timed bisimilar models, others preserve only reachability or (weak) trace equivalence. We suggest a general framework for arguing when a translation preserves Timed Computation Tree...... Logic (TCTL) or its safety fragment.The framework works at the level of timed transition systems, making it independent of the modeling formalisms and applicable to many of the translations published in the literature. Finally, we present a novel translation from extended Timed-Arc Petri Nets...... to Networks of Timed Automata and using the framework argue that itpreserves the full TCTL. The translation has been implemented in the verification tool TAPAAL....

  20. From superWIMPs to decaying dark matter. Models, bounds and indirect searches

    Energy Technology Data Exchange (ETDEWEB)

    Weniger, Christoph

    2010-06-15

    Despite lots of observational and theoretical efforts, the particle nature of dark matter remains unknown. Beyond the paradigmatic WIMPs (Weakly Interacting Massive Particles), many theoretically well motivated models exist where dark matter interacts much more weakly than electroweak with Standard Model particles. In this case new phenomena occur, like the decay of dark matter or the interference with the standard cosmology of the early Universe. In this thesis we study some of these aspects of superweakly coupled dark matter in general, and in the special case of hidden U(1){sub X} gauginos that kinetically mix with hypercharge. There, we will assume that the gauge group remains unbroken, similar to the Standard Model U(1){sub em}. We study different kinds of cosmological bounds, including bounds from thermal overproduction, from primordial nucleosynthesis and from structure formation. Furthermore, we study the possible cosmic-ray signatures predicted by this scenario, with emphasis on the electron and positron channel in light of the recent observations by PAMELA and Fermi LAT. Moreover we study the cosmic-ray signatures of decaying dark matter independently of concrete particle-physics models. In particular we analyze in how far the rise in the positron fraction above 10 GeV, as observed by PAMELA, can be explained by dark matter decay. Lastly, we concentrate on related predictions for gamma-ray observations with the Fermi LAT, and propose to use the dipole-like anisotropy of the prompt gamma-ray dark matter signal to distinguish exotic dark matter contributions from the extragalactic gamma-ray background. (orig.)

  1. From superWIMPs to decaying dark matter. Models, bounds and indirect searches

    International Nuclear Information System (INIS)

    Weniger, Christoph

    2010-06-01

    Despite lots of observational and theoretical efforts, the particle nature of dark matter remains unknown. Beyond the paradigmatic WIMPs (Weakly Interacting Massive Particles), many theoretically well motivated models exist where dark matter interacts much more weakly than electroweak with Standard Model particles. In this case new phenomena occur, like the decay of dark matter or the interference with the standard cosmology of the early Universe. In this thesis we study some of these aspects of superweakly coupled dark matter in general, and in the special case of hidden U(1) X gauginos that kinetically mix with hypercharge. There, we will assume that the gauge group remains unbroken, similar to the Standard Model U(1) em . We study different kinds of cosmological bounds, including bounds from thermal overproduction, from primordial nucleosynthesis and from structure formation. Furthermore, we study the possible cosmic-ray signatures predicted by this scenario, with emphasis on the electron and positron channel in light of the recent observations by PAMELA and Fermi LAT. Moreover we study the cosmic-ray signatures of decaying dark matter independently of concrete particle-physics models. In particular we analyze in how far the rise in the positron fraction above 10 GeV, as observed by PAMELA, can be explained by dark matter decay. Lastly, we concentrate on related predictions for gamma-ray observations with the Fermi LAT, and propose to use the dipole-like anisotropy of the prompt gamma-ray dark matter signal to distinguish exotic dark matter contributions from the extragalactic gamma-ray background. (orig.)

  2. Can We Efficiently Check Concurrent Programs Under Relaxed Memory Models in Maude?

    DEFF Research Database (Denmark)

    Arrahman, Yehia Abd; Andric, Marina; Beggiato, Alessandro

    2014-01-01

    to the state space explosion. Several techniques have been proposed to mitigate those problems so to make verification under relaxed memory models feasible. We discuss how to adopt some of those techniques in a Maude-based approach to language prototyping, and suggest the use of other techniques that have been......Relaxed memory models offer suitable abstractions of the actual optimizations offered by multi-core architectures and by compilers of concurrent programming languages. Using such abstractions for verification purposes is challenging in part due to their inherent non-determinism which contributes...

  3. Experimental checking results of mathematical modeling of the radiation environment sensor based on diamond detectors

    International Nuclear Information System (INIS)

    Gladchenkov, E V; Kolyubin, V A; Nedosekin, P G; Zaharchenko, K V; Ibragimov, R F; Kadilin, V V; Tyurin, E M

    2017-01-01

    Were conducted a series of experiments, the purpose of which had to verify the mathematical model of the radiation environment sensor. Theoretical values of the beta particles count rate from 90 Sr - 90 Y source registered by radiation environment sensor was compared with the experimental one. Theoretical (calculated) count rate of beta particles was found with using the developed mathematical model of the radiation environment sensor. Deviation of the calculated values of the beta particle count rate does not exceed 10% from the experimental. (paper)

  4. Optical coherence tomography noise modeling and fundamental bounds on human retinal layer segmentation accuracy (Conference Presentation)

    Science.gov (United States)

    DuBose, Theodore B.; Milanfar, Peyman; Izatt, Joseph A.; Farsiu, Sina

    2016-03-01

    The human retina is composed of several layers, visible by in vivo optical coherence tomography (OCT) imaging. To enhance diagnostics of retinal diseases, several algorithms have been developed to automatically segment one or more of the boundaries of these layers. OCT images are corrupted by noise, which is frequently the result of the detector noise and speckle, a type of coherent noise resulting from the presence of several scatterers in each voxel. However, it is unknown what the empirical distribution of noise in each layer of the retina is, and how the magnitude and distribution of the noise affects the lower bounds of segmentation accuracy. Five healthy volunteers were imaged using a spectral domain OCT probe from Bioptigen, Inc, centered at 850nm with 4.6µm full width at half maximum axial resolution. Each volume was segmented by expert manual graders into nine layers. The histograms of intensities in each layer were then fit to seven possible noise distributions from the literature on speckle and image processing. Using these empirical noise distributions and empirical estimates of the intensity of each layer, the Cramer-Rao lower bound (CRLB), a measure of the variance of an estimator, was calculated for each boundary layer. Additionally, the optimum bias of a segmentation algorithm was calculated, and a corresponding biased CRLB was calculated, which represents the improved performance an algorithm can achieve by using prior knowledge, such as the smoothness and continuity of layer boundaries. Our general mathematical model can be easily adapted for virtually any OCT modality.

  5. Bounds on quantum collapse models from matter-wave interferometry: calculational details

    Science.gov (United States)

    Toroš, Marko; Bassi, Angelo

    2018-03-01

    We present a simple derivation of the interference pattern in matter-wave interferometry predicted by a class of quantum master equations. We apply the obtained formulae to the following collapse models: the Ghirardi-Rimini-Weber (GRW) model, the continuous spontaneous localization (CSL) model together with its dissipative (dCSL) and non-Markovian generalizations (cCSL), the quantum mechanics with universal position localization (QMUPL), and the Diósi-Penrose (DP) model. We discuss the separability of the dynamics of the collapse models along the three spatial directions, the validity of the paraxial approximation, and the amplification mechanism. We obtain analytical expressions both in the far field and near field limits. These results agree with those already derived in the Wigner function formalism. We compare the theoretical predictions with the experimental data from two recent matter-wave experiments: the 2012 far-field experiment of Juffmann T et al (2012 Nat. Nanotechnol. 7 297-300) and the 2013 Kapitza-Dirac-Talbot-Lau (KDTL) near-field experiment of Eibenberger et al (2013 Phys. Chem. Chem. Phys. 15 14696-700). We show the region of the parameter space for each collapse model that is excluded by these experiments. We show that matter-wave experiments provide model-insensitive bounds that are valid for a wide family of dissipative and non-Markovian generalizations.

  6. Interval Abstraction Refinement for Model Checking of Timed-Arc Petri Nets

    DEFF Research Database (Denmark)

    Viesmose, Sine Lyhne; Jacobsen, Thomas Stig; Jensen, Jacob Jon

    2014-01-01

    can be considerably faster but it does not in general guarantee conclusive answers. We implement the algorithms within the open-source model checker TAPAAL and demonstrate on a number of experiments that our approximation techniques often result in a significant speed-up of the verification....

  7. Addressing challenges in obtaining high coverage when model checking android applications

    CSIR Research Space (South Africa)

    Botha, Heila-Marie

    2017-07-01

    Full Text Available -state-comparator and can be excluded from the state using JPF’s @FilterField annotation or other con€guration options discussed in [5]. JPF-Android further optimizes state-matching by pre-loading all application classes and application speci€c models. It also rede...

  8. Model checking a cache coherence protocol for a Java DSM implementation

    NARCIS (Netherlands)

    J. Pang; W.J. Fokkink (Wan); R. Hofman (Rutger); R. Veldema

    2007-01-01

    textabstractJackal is a fine-grained distributed shared memory implementation of the Java programming language. It aims to implement Java's memory model and allows multithreaded Java programs to run unmodified on a distributed memory system. It employs a multiple-writer cache coherence

  9. Model checking a cache coherence protocol of a Java DSM implementation

    NARCIS (Netherlands)

    Pang, J.; Fokkink, W.J.; Hofman, R.; Veldema, R.S.

    2007-01-01

    Jackal is a fine-grained distributed shared memory implementation of the Java programming language. It aims to implement Java's memory model and allows multithreaded Java programs to run unmodified on a distributed memory system. It employs a multiple-writer cache coherence protocol. In this paper,

  10. The Sadder the Story, the Bigger the Check: Reciprocity as an Answer to Organizational Deficit Models

    Science.gov (United States)

    Gindlesparger, Kathryn Johnson

    2010-01-01

    This ethnographic study argues that reciprocity--the attempt to equalize the power dynamics that occur in working relationships--is a way to counteract the widely-used but rarely-critiqued deficit models that dominate the nonprofit landscape. If community work is not done with a near constant attention to power dynamics, programming that is…

  11. V and V of Lexical, Syntactic and Semantic Properties for Interactive Systems Through Model Checking of Formal Description of Dialog

    Science.gov (United States)

    Brat, Guillaume P.; Martinie, Celia; Palanque, Philippe

    2013-01-01

    During early phases of the development of an interactive system, future system properties are identified (through interaction with end users in the brainstorming and prototyping phase of the application, or by other stakehold-ers) imposing requirements on the final system. They can be specific to the application under development or generic to all applications such as usability principles. Instances of specific properties include visibility of the aircraft altitude, speed… in the cockpit and the continuous possibility of disengaging the autopilot in whatever state the aircraft is. Instances of generic properties include availability of undo (for undoable functions) and availability of a progression bar for functions lasting more than four seconds. While behavioral models of interactive systems using formal description techniques provide complete and unambiguous descriptions of states and state changes, it does not provide explicit representation of the absence or presence of properties. Assessing that the system that has been built is the right system remains a challenge usually met through extensive use and acceptance tests. By the explicit representation of properties and the availability of tools to support checking these properties, it becomes possible to provide developers with means for systematic exploration of the behavioral models and assessment of the presence or absence of these properties. This paper proposes the synergistic use two tools for checking both generic and specific properties of interactive applications: Petshop and Java PathFinder. Petshop is dedicated to the description of interactive system behavior. Java PathFinder is dedicated to the runtime verification of Java applications and as an extension dedicated to User Interfaces. This approach is exemplified on a safety critical application in the area of interactive cockpits for large civil aircrafts.

  12. Charge–mass ratio bound and optimization in the Parikh–Wilczek tunneling model of Hawking radiation

    International Nuclear Information System (INIS)

    Kim, Kyung Kiu; Wen, Wen-Yu

    2014-01-01

    In this Letter, we study the mutual information hidden in the Parikh–Wilczek tunneling model of Hawking radiation for Reissner–Nordström black holes. We argue that the condition of nonnegativity of mutual information suggests bound(s) for charge–mass ratio of emitted particles. We further view the radiation as an optimization process and discuss its effect on time evolution of a charged black hole.

  13. Absolute Lower Bound on the Bounce Action

    Science.gov (United States)

    Sato, Ryosuke; Takimoto, Masahiro

    2018-03-01

    The decay rate of a false vacuum is determined by the minimal action solution of the tunneling field: bounce. In this Letter, we focus on models with scalar fields which have a canonical kinetic term in N (>2 ) dimensional Euclidean space, and derive an absolute lower bound on the bounce action. In the case of four-dimensional space, we show the bounce action is generically larger than 24 /λcr, where λcr≡max [-4 V (ϕ )/|ϕ |4] with the false vacuum being at ϕ =0 and V (0 )=0 . We derive this bound on the bounce action without solving the equation of motion explicitly. Our bound is derived by a quite simple discussion, and it provides useful information even if it is difficult to obtain the explicit form of the bounce solution. Our bound offers a sufficient condition for the stability of a false vacuum, and it is useful as a quick check on the vacuum stability for given models. Our bound can be applied to a broad class of scalar potential with any number of scalar fields. We also discuss a necessary condition for the bounce action taking a value close to this lower bound.

  14. Bounded Memory, Inertia, Sampling and Weighting Model for Market Entry Games

    Directory of Open Access Journals (Sweden)

    Yi-Shan Lee

    2011-03-01

    Full Text Available This paper describes the “Bounded Memory, Inertia, Sampling and Weighting” (BI-SAW model, which won the http://sites.google.com/site/gpredcomp/Market Entry Prediction Competition in 2010. The BI-SAW model refines the I-SAW Model (Erev et al. [1] by adding the assumption of limited memory span. In particular, we assume when players draw a small sample to weight against the average payoff of all past experience, they can only recall 6 trials of past experience. On the other hand, we keep all other key features of the I-SAW model: (1 Reliance on a small sample of past experiences, (2 Strong inertia and recency effects, and (3 Surprise triggers change. We estimate this model using the first set of experimental results run by the competition organizers, and use it to predict results of a second set of similar experiments later ran by the organizers. We find significant improvement in out-of-sample predictability (against the I-SAW model in terms of smaller mean normalized MSD, and such result is robust to resampling the predicted game set and reversing the role of the sets of experimental results. Our model’s performance is the best among all the participants.

  15. Bounds on $Z^\\prime$ from 3-3-1 model at the LHC energies

    CERN Document Server

    Coutinho, Y A; Nepomuceno, A A

    2013-01-01

    The Large Hadron Collider will restart with higher energy and luminosity in 2015. This achievement opens the possibility of discovering new phenomena hardly described by the Standard Model, that is based on two neutral gauge bosons: the photon and the $Z$. This perspective imposes a deep and systematic study of models that predicts the existence of new neutral gauge bosons. One of such models is based on the gauge group $SU(3)_C \\times SU(3)_L \\times U(1)_N$ called 3-3-1 model for short. In this paper we perform a study with $Z^\\prime$ predicted in two versions of the 3-3-1 model and compare the signature of this resonance in each model version. By considering the present and future LHC energy regimes, we obtain some distributions and the total cross section for the process $p + p \\longrightarrow \\ell^{+} + \\ell^{-} + X$. Additionally, we derive lower bounds on $Z^\\prime$ mass from the latest LHC results. Finally we analyze the LHC potential for discovering this neutral gauge boson at 14 TeV center-of-mass en...

  16. AUTOMATIC 3D BUILDING MODEL GENERATION FROM LIDAR AND IMAGE DATA USING SEQUENTIAL MINIMUM BOUNDING RECTANGLE

    Directory of Open Access Journals (Sweden)

    E. Kwak

    2012-07-01

    Full Text Available Digital Building Model is an important component in many applications such as city modelling, natural disaster planning, and aftermath evaluation. The importance of accurate and up-to-date building models has been discussed by many researchers, and many different approaches for efficient building model generation have been proposed. They can be categorised according to the data source used, the data processing strategy, and the amount of human interaction. In terms of data source, due to the limitations of using single source data, integration of multi-senor data is desired since it preserves the advantages of the involved datasets. Aerial imagery and LiDAR data are among the commonly combined sources to obtain 3D building models with good vertical accuracy from laser scanning and good planimetric accuracy from aerial images. The most used data processing strategies are data-driven and model-driven ones. Theoretically one can model any shape of buildings using data-driven approaches but practically it leaves the question of how to impose constraints and set the rules during the generation process. Due to the complexity of the implementation of the data-driven approaches, model-based approaches draw the attention of the researchers. However, the major drawback of model-based approaches is that the establishment of representative models involves a manual process that requires human intervention. Therefore, the objective of this research work is to automatically generate building models using the Minimum Bounding Rectangle algorithm and sequentially adjusting them to combine the advantages of image and LiDAR datasets.

  17. Comparison of the ASME Environmental Fatigue Design Curve with the Leax' Low Bound Model

    International Nuclear Information System (INIS)

    Jeong, Ill Seok; Kim, Wan Jae; Jun, Hyun Ik

    2010-01-01

    Environmental fatigue issue long time argued between industry and regulator. The issues of the debates are about environmental fatigue data only from experiment laboratories, no evidences in fields, and over conservatism. However, NRC issued the requirement to implement it to the construction design prior to industry practical design code. American Society of Mechanical Engineers (ASME) determined to issue non-mandatory code cases of environmental fatigue design. This paper evaluated the conservatism of the ASME proposed environmental fatigue design curve in comparison with the Leax' low bound approach model of environmental fatigue curve. A group of CF8M cast austenitic stainless steel (CASS) produced in KEPCO Research Center was introduced in the evaluation

  18. An Evaluation Framework for Energy Aware Buildings using Statistical Model Checking

    DEFF Research Database (Denmark)

    David, Alexandre; Du, DeHui; Larsen, Kim Guldstrand

    2012-01-01

    properties of this formalisms. A particular kind of cyber-physical systems are Smart Grids which together with Intelligent, Energy Aware Buildings will play a major role in achieving an energy efficient society of the future. In this paper we present a framework in Uppaal-smc for energy aware buildings...... allowing to evaluate the performance of proposed control strategies in terms of their induced comfort and energy profiles under varying environmental settings (e.g. weather, user behaviour, ...). To demonstrate the intended use and usefulness of our framework, we present an application to the Hybrid......Cyber-physical systems are to be found in numerous applications throughout society. The principal barrier to develop trustworthy cyber-physical systems is the lack of expressive modelling and specification for- malisms supported by efficient tools and methodologies. To overcome this barrier, we...

  19. Mic Check/Reality Check

    Directory of Open Access Journals (Sweden)

    Wanda Vrasti

    2012-03-01

    Full Text Available Over the past couple of months history has been unfolding with dizzying speed. The #occupy model of leaderless, demandless direct action, which in the beginning no one with only a slim understanding of how capitalism works thought could become anything more than a facile if charming jab at anti-corporate activism, has gone viral. Every morning we wake up to new reports about ‘occupying X’, where X can be anything from cities, campuses, boardrooms, buildings, highways, and public events, all the way to academic disciplines. What originally seemed like a romantic fantasy about temporary autonomous zones now feels like history. And no one likes to find themselves on thewrong side of history, especially not intellectuals, let alone intellectuals in the business of explaining global politics.

  20. Checking Consistency of C and Verilog using Predicate Abstraction and Induction

    National Research Council Canada - National Science Library

    Clarke, Edmund; Kroening, Daniel

    2004-01-01

    .... In contrast to existing tools that perform predicate abstraction, our approach is SAT-based and allows all ANSI-C and Verilog operators in the predicates. We report experimental results on an out-of-order RISC processor. We compare the performance of the new technique to Bounded Model Checking (BMC).

  1. Solution of the spatial neutral model yields new bounds on the Amazonian species richness

    Science.gov (United States)

    Shem-Tov, Yahav; Danino, Matan; Shnerb, Nadav M.

    2017-02-01

    Neutral models, in which individual agents with equal fitness undergo a birth-death-mutation process, are very popular in population genetics and community ecology. Usually these models are applied to populations and communities with spatial structure, but the analytic results presented so far are limited to well-mixed or mainland-island scenarios. Here we combine analytic results and numerics to obtain an approximate solution for the species abundance distribution and the species richness for the neutral model on continuous landscape. We show how the regional diversity increases when the recruitment length decreases and the spatial segregation of species grows. Our results are supported by extensive numerical simulations and allow one to probe the numerically inaccessible regime of large-scale systems with extremely small mutation/speciation rates. Model predictions are compared with the findings of recent large-scale surveys of tropical trees across the Amazon basin, yielding new bounds for the species richness (between 13100 and 15000) and the number of singleton species (between 455 and 690).

  2. Modeling pedestrian shopping behavior using principles of bounded rationality: model comparison and validation

    NARCIS (Netherlands)

    Zhu, W.; Timmermans, H.J.P.

    2011-01-01

    Models of geographical choice behavior have been dominantly based on rational choice models, which assume that decision makers are utility-maximizers. Rational choice models may be less appropriate as behavioral models when modeling decisions in complex environments in which decision makers may

  3. Bioavailability of organically bound Fe to model phytoplankton of the Southern Ocean

    Directory of Open Access Journals (Sweden)

    C. S. Hassler

    2009-10-01

    Full Text Available Iron (Fe is known to be mostly bound to organic ligands and to limit primary productivity in the Southern Ocean. It is thus important to investigate the bioavailability of organically bound Fe. In this study, we used four phytoplankton species of the Southern Ocean (Phaeocystis sp., Chaetoceros sp., Fragilariopsis kerguelensis and Thalassiosira antarctica Comber to measure the influence of various organic ligands on Fe solubility and bioavailability. Short-term uptake Fe:C ratios were inversely related to the surface area to volume ratios of the phytoplankton. The ratio of extracellular to intracellular Fe is used to discuss the relative importance of diffusive supply and uptake to control Fe bioavailability. The effect of excess organic ligands on Fe bioavailability cannot be solely explained by their effect on Fe solubility. For most strains studied, the bioavailability of Fe can be enhanced relative to inorganic Fe in the presence of porphyrin, catecholate siderophore and saccharides whereas it was decreased in presence of hydroxamate siderophore and organic amine. For Thalassiosira, iron bioavailability was not affected by the presence of porphyrin, catecholate siderophore and saccharides. The enhancement of Fe bioavailability in presence of saccharides is presented as the result from both the formation of bioavailable (or chemically labile organic form of Fe and the stabilisation of Fe within the dissolved phase. Given the ubiquitous presence of saccharides in the ocean, these compounds might represent an important factor to control the basal level of soluble and bioavailable Fe. Results show that the use of model phytoplankton is promising to improve mechanistic understanding of Fe bioavailability and primary productivity in HNLC regions of the ocean.

  4. Localized modelling and feedback control of linear instabilities in 2-D wall bounded shear flows

    Science.gov (United States)

    Tol, Henry; Kotsonis, Marios; de Visser, Coen

    2016-11-01

    A new approach is presented for control of instabilities in 2-D wall bounded shear flows described by the linearized Navier-Stokes equations (LNSE). The control design accounts both for spatially localized actuators/sensors and the dominant perturbation dynamics in an optimal control framework. An inflow disturbance model is proposed for streamwise instabilities that drive laminar-turbulent transition. The perturbation modes that contribute to the transition process can be selected and are included in the control design. A reduced order model is derived from the LNSE that captures the input-output behavior and the dominant perturbation dynamics. This model is used to design an optimal controller for suppressing the instability growth. A 2-D channel flow and a 2-D boundary layer flow over a flat plate are considered as application cases. Disturbances are generated upstream of the control domain and the resulting flow perturbations are estimated/controlled using wall shear measurements and localized unsteady blowing and suction at the wall. It will be shown that the controller is able to cancel the perturbations and is robust to unmodelled disturbances.

  5. Comments upon a bound state model for a two body system

    International Nuclear Information System (INIS)

    Micu, L.

    2005-01-01

    We show that in classical mechanics, classical and relativistic quantum mechanics it is possible to replace the equation of the relative motion for a two-body bound system at rest by individual dynamical equations with correlated solutions. We compare the representations of a bound system in terms of the relative and individual coordinates and mention some of the observable differences. (author)

  6. Regular health checks

    DEFF Research Database (Denmark)

    Grønhøj Larsen, Christian; Jørgensen, Karsten Juhl; Gøtzsche, Peter C

    2012-01-01

    To investigate whether Danish providers of general health checks present a balanced account of possible benefits and harms on their websites and whether the health checks are evidence-based.......To investigate whether Danish providers of general health checks present a balanced account of possible benefits and harms on their websites and whether the health checks are evidence-based....

  7. Effects of soft interactions and bound mobility on diffusion in crowded environments: a model of sticky and slippery obstacles

    Science.gov (United States)

    Stefferson, Michael W.; Norris, Samantha L.; Vernerey, Franck J.; Betterton, Meredith D.; E Hough, Loren

    2017-08-01

    Crowded environments modify the diffusion of macromolecules, generally slowing their movement and inducing transient anomalous subdiffusion. The presence of obstacles also modifies the kinetics and equilibrium behavior of tracers. While previous theoretical studies of particle diffusion have typically assumed either impenetrable obstacles or binding interactions that immobilize the particle, in many cellular contexts bound particles remain mobile. Examples include membrane proteins or lipids with some entry and diffusion within lipid domains and proteins that can enter into membraneless organelles or compartments such as the nucleolus. Using a lattice model, we studied the diffusive movement of tracer particles which bind to soft obstacles, allowing tracers and obstacles to occupy the same lattice site. For sticky obstacles, bound tracer particles are immobile, while for slippery obstacles, bound tracers can hop without penalty to adjacent obstacles. In both models, binding significantly alters tracer motion. The type and degree of motion while bound is a key determinant of the tracer mobility: slippery obstacles can allow nearly unhindered diffusion, even at high obstacle filling fraction. To mimic compartmentalization in a cell, we examined how obstacle size and a range of bound diffusion coefficients affect tracer dynamics. The behavior of the model is similar in two and three spatial dimensions. Our work has implications for protein movement and interactions within cells.

  8. Physical Uncertainty Bounds (PUB)

    Energy Technology Data Exchange (ETDEWEB)

    Vaughan, Diane Elizabeth [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Preston, Dean L. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-03-19

    This paper introduces and motivates the need for a new methodology for determining upper bounds on the uncertainties in simulations of engineered systems due to limited fidelity in the composite continuum-level physics models needed to simulate the systems. We show that traditional uncertainty quantification methods provide, at best, a lower bound on this uncertainty. We propose to obtain bounds on the simulation uncertainties by first determining bounds on the physical quantities or processes relevant to system performance. By bounding these physics processes, as opposed to carrying out statistical analyses of the parameter sets of specific physics models or simply switching out the available physics models, one can obtain upper bounds on the uncertainties in simulated quantities of interest.

  9. Cell-bound lipases from Burkholderia sp. ZYB002: gene sequence analysis, expression, enzymatic characterization, and 3D structural model.

    Science.gov (United States)

    Shu, Zhengyu; Lin, Hong; Shi, Shaolei; Mu, Xiangduo; Liu, Yanru; Huang, Jianzhong

    2016-05-03

    The whole-cell lipase from Burkholderia cepacia has been used as a biocatalyst in organic synthesis. However, there is no report in the literature on the component or the gene sequence of the cell-bound lipase from this species. Qualitative analysis of the cell-bound lipase would help to illuminate the regulation mechanism of gene expression and further improve the yield of the cell-bound lipase by gene engineering. Three predictive cell-bound lipases, lipA, lipC21 and lipC24, from Burkholderia sp. ZYB002 were cloned and expressed in E. coli. Both LipA and LipC24 displayed the lipase activity. LipC24 was a novel mesophilic enzyme and displayed preference for medium-chain-length acyl groups (C10-C14). The 3D structural model of LipC24 revealed the open Y-type active site. LipA displayed 96 % amino acid sequence identity with the known extracellular lipase. lipA-inactivation and lipC24-inactivation decreased the total cell-bound lipase activity of Burkholderia sp. ZYB002 by 42 % and 14 %, respectively. The cell-bound lipase activity from Burkholderia sp. ZYB002 originated from a multi-enzyme mixture with LipA as the main component. LipC24 was a novel lipase and displayed different enzymatic characteristics and structural model with LipA. Besides LipA and LipC24, other type of the cell-bound lipases (or esterases) should exist.

  10. Putting theory to the test: Examining family context, caregiver motivation, and conflict in the Family Check-Up model

    Science.gov (United States)

    Fosco, Gregory M.; Van Ryzin, Mark; Stormshak, Elizabeth A.; Dishion, Thomas J.

    2014-01-01

    This study examined contextual factors (caregiver depression, family resources, ethnicity, and initial levels of youth problem behavior) related to the effectiveness of the Family Check-Up (FCU) and evaluated family processes as a mediator of FCU intervention response and adolescent antisocial behavior. We followed a sample of 180 ethnically diverse youths of families who engaged in the FCU intervention. Family data were collected as part of the FCU assessment, and youth data were collected over 4 years, from sixth through ninth grade. Findings indicated that caregiver depression and minority status predicted greater caregiver motivation to change. In turn, caregiver motivation was the only direct predictor of FCU intervention response during a 1-year period. Growth in family conflict from sixth through eighth grade mediated the link between FCU response and ninth-grade antisocial behavior. This study explicitly tested core aspects of the FCU intervention model and demonstrated that caregiver motivation is a central factor that underlies family response to the FCU. The study also provided support for continued examination of family process mechanisms that account for enduring effects of the FCU and other family-centered interventions. PMID:24438894

  11. Putting theory to the test: examining family context, caregiver motivation, and conflict in the Family Check-Up model.

    Science.gov (United States)

    Fosco, Gregory M; Van Ryzin, Mark; Stormshak, Elizabeth A; Dishion, Thomas J

    2014-05-01

    This study examined contextual factors (caregiver depression, family resources, ethnicity, and initial levels of youth problem behavior) related to the effectiveness of the Family Check-Up (FCU) and evaluated family processes as a mediator of FCU intervention response and adolescent antisocial behavior. We followed a sample of 180 ethnically diverse youths of families who engaged in the FCU intervention. Family data were collected as part of the FCU assessment, and youth data were collected over 4 years, from sixth through ninth grade. Findings indicated that caregiver depression and minority status predicted greater caregiver motivation to change. In turn, caregiver motivation was the only direct predictor of FCU intervention response during a 1-year period. Growth in family conflict from sixth through eighth grade mediated the link between FCU response and ninth-grade antisocial behavior. This study explicitly tested core aspects of the FCU intervention model and demonstrated that caregiver motivation is a central factor that underlies family response to the FCU. The study also provided support for continued examination of family process mechanisms that account for enduring effects of the FCU and other family-centered interventions.

  12. An Artificially Intelligent Physical Model-Checking Approach to Detect Switching-Related Attacks on Power Systems

    Energy Technology Data Exchange (ETDEWEB)

    El Hariri, Mohamad [Florida Intl Univ., Miami, FL (United States); Faddel, Samy [Florida Intl Univ., Miami, FL (United States); Mohammed, Osama [Florida Intl Univ., Miami, FL (United States)

    2017-11-01

    Decentralized and hierarchical microgrid control strategies have lain the groundwork for shaping the future smart grid. Such control approaches require the cooperation between microgrid operators in control centers, intelligent microcontrollers, and remote terminal units via secure and reliable communication networks. In order to enhance the security and complement the work of network intrusion detection systems, this paper presents an artificially intelligent physical model-checking that detects tampered-with circuit breaker switching control commands whether, due to a cyber-attack or human error. In this technique, distributed agents, which are monitoring sectionalized areas of a given microgrid, will be trained and continuously adapted to verify that incoming control commands do not violate the physical system operational standards and do not put the microgrid in an insecure state. The potential of this approach has been tested by deploying agents that monitor circuit breakers status commands on a 14-bus IEEE benchmark system. The results showed the accuracy of the proposed framework in characterizing the power system and successfully detecting malicious and/or erroneous control commands.

  13. RG running in a minimal UED model in light of recent LHC Higgs mass bounds

    International Nuclear Information System (INIS)

    Blennow, Mattias; Melbéus, Henrik; Ohlsson, Tommy; Zhang, He

    2012-01-01

    We study how the recent ATLAS and CMS Higgs mass bounds affect the renormalization group running of the physical parameters in universal extra dimensions. Using the running of the Higgs self-coupling constant, we derive bounds on the cutoff scale of the extra-dimensional theory itself. We show that the running of physical parameters, such as the fermion masses and the CKM mixing matrix, is significantly restricted by these bounds. In particular, we find that the running of the gauge couplings cannot be sufficient to allow gauge unification at the cutoff scale.

  14. Robust nonlinear model predictive control for nuclear power plants in load following operations with bounded xenon oscillations

    International Nuclear Information System (INIS)

    Eliasi, H.; Menhaj, M.B.; Davilu, H.

    2011-01-01

    Research highlights: → In this work, a robust nonlinear model predictive control algorithm is developed. → This algorithm is applied to control the power level for load following. → The state constraints are imposed on the predicted trajectory during optimization. → The xenon oscillations are the main constraint for the load following problem. → In this algorithm, xenon oscillations are bounded within acceptable limits. - Abstract: One of the important operations in nuclear power plants is load-following in which imbalance of axial power distribution induces xenon oscillations. These oscillations must be maintained within acceptable limits otherwise the nuclear power plant could become unstable. Therefore, bounded xenon oscillation considered to be a constraint for the load-following operation. In this paper, a robust nonlinear model predictive control for the load-following operation problem is proposed that ensures xenon oscillations are kept bounded within acceptable limits. The proposed controller uses constant axial offset (AO) strategy to maintain xenon oscillations to be bounded. The constant AO is a robust state constraint for load-following problem. The controller imposes restricted state constraints on the predicted trajectory during optimization which guarantees robust satisfaction of state constraints without restoring to a min-max optimization problem. Simulation results show that the proposed controller for the load-following operation is so effective so that the xenon oscillations kept bounded in the given region.

  15. Bounded Gaussian process regression

    DEFF Research Database (Denmark)

    Jensen, Bjørn Sand; Nielsen, Jens Brehm; Larsen, Jan

    2013-01-01

    We extend the Gaussian process (GP) framework for bounded regression by introducing two bounded likelihood functions that model the noise on the dependent variable explicitly. This is fundamentally different from the implicit noise assumption in the previously suggested warped GP framework. We...... with the proposed explicit noise-model extension....

  16. Super-Grid Modeling of the Elastic Wave Equation in Semi-Bounded Domains

    Energy Technology Data Exchange (ETDEWEB)

    Petersson, N. Anders; Sjögreen, Björn

    2014-10-01

    Abstract

    We develop a super-grid modeling technique for solving the elastic wave equation in semi-bounded two- and three-dimensional spatial domains. In this method, waves are slowed down and dissipated in sponge layers near the far-field boundaries. Mathematically, this is equivalent to a coordinate mapping that transforms a very large physical domain to a significantly smaller computational domain, where the elastic wave equation is solved numerically on a regular grid. To damp out waves that become poorly resolved because of the coordinate mapping, a high order artificial dissipation operator is added in layers near the boundaries of the computational domain. We prove by energy estimates that the super-grid modeling leads to a stable numerical method with decreasing energy, which is valid for heterogeneous material properties and a free surface boundary condition on one side of the domain. Our spatial discretization is based on a fourth order accurate finite difference method, which satisfies the principle of summation by parts. We show that the discrete energy estimate holds also when a centered finite difference stencil is combined with homogeneous Dirichlet conditions at several ghost points outside of the far-field boundaries. Therefore, the coefficients in the finite difference stencils need only be boundary modified near the free surface. This allows for improved computational efficiency and significant simplifications of the implementation of the proposed method in multi-dimensional domains. Numerical experiments in three space dimensions show that the modeling error from truncating the domain can be made very small by choosing a sufficiently wide super-grid damping layer. The numerical accuracy is first evaluated against analytical solutions of Lamb’s problem, where fourth order accuracy is observed with a sixth order artificial dissipation. We then use successive grid refinements to study the numerical accuracy in the more

  17. On devising Boussinesq-type models with bounded eigenspectra: One horizontal dimension

    DEFF Research Database (Denmark)

    Eskilsson, Claes; Engsig-Karup, Allan Peter

    2014-01-01

    ) are introduced. Using spectral element simulations of stream function waves it is illustrated that (i) the bounded equations capture the physics of the wave motion as well as the standard unbounded equations, and (ii) the bounded equations are computationally more efficient when explicit time-stepping schemes...... using a spectral element method of arbitrary spatial order p. It is shown that existing sets of parameters, found by optimising the linear dispersion relation, give rise to unbounded eigenspectra which govern stability. For explicit time-stepping schemes the global CFL time-step restriction typically...... requires Δt∝p−2. We derive and present conditions on the parameters under which implicitly-implicit Boussinesq-type equations will exhibit bounded eigenspectra. Two new bounded versions having comparable nonlinear and dispersive properties as the equations of Nwogu (1993) and Schäffer and Madsen (1995...

  18. Lower Bounds for Sorted Geometric Queries in the I/O Model

    DEFF Research Database (Denmark)

    Afshani, Peyman; Zeh, Norbert

    2012-01-01

    . This is highly relevant in an I/O context because storing a massive data set in a superlinear-space data structure is often infeasible. We also prove that answering queries using I/Os requires space, where N is the input size, B is the block size, and M is the size of the main memory. This bound is unlikely...... to be optimal and in fact we can show that, for a particular class of “persistence-based” data structures, the space lower bound can be improved to Ω(N2 / MO(1)). Both these lower bounds are a first step towards understanding the complexity of sorted geometric query problems. All our lower bounds assume...

  19. Neutron scattering from elemental indium, the optical model, and the bound-state potential

    Energy Technology Data Exchange (ETDEWEB)

    Chiba, S. (Japan Atomic Energy Research Inst., Tokai, Ibaraki (Japan)); Guenther, P.T.; Lawson, R.D.; Smith, A.B. (Argonne National Lab., IL (USA))

    1990-06-01

    Neutron differential elastic-scattering cross sections of elemental indium are measured from 4.5 to 10 MeV at incident-energy intervals of {approx}500 keV. Seventy or more differential values are obtained at each incident energy, distributed between {approx}18{degree} and 160{degree}. These experimental results are combined with lower-energy values previously obtained at this laboratory, and with 11 and 14 MeV results in the literature, to form a comprehensive elastic-scattering database extending from {approx}1.5 to 14 MeV. These data are interpreted in terms of a conventional spherical optical model. The resulting potential is extrapolated to the bound-state regime. It is shown that in the middle of the 50--82 neutron shell, the potential derived from the scattering results adequately describes the binding energies of article states, but does not do well for hole states. The latter shortcoming is attributed to the holes states having occupational probabilities sufficiently different from unity, so that the exclusion principle become a factor, and to the rearrangement of the neutron core. 68 refs.

  20. Neutron scattering from elemental indium, the optical model, and the bound-state potential

    International Nuclear Information System (INIS)

    Chiba, S.; Guenther, P.T.; Lawson, R.D.; Smith, A.B.

    1990-01-01

    Neutron differential elastic-scattering cross sections of elemental indium are measured from 4.5 to 10 MeV at incident-energy intervals of ∼500 keV. Seventy or more differential values are obtained at each incident energy, distributed between ∼18 degree and 160 degree. These experimental results are combined with lower-energy values previously obtained at this laboratory, and with 11 and 14 MeV results in the literature, to form a comprehensive elastic-scattering database extending from ∼1.5 to 14 MeV. These data are interpreted in terms of a conventional spherical optical model. The resulting potential is extrapolated to the bound-state regime. It is shown that in the middle of the 50--82 neutron shell, the potential derived from the scattering results adequately describes the binding energies of article states, but does not do well for hole states. The latter shortcoming is attributed to the holes states having occupational probabilities sufficiently different from unity, so that the exclusion principle become a factor, and to the rearrangement of the neutron core. 68 refs

  1. Simulation-based model checking approach to cell fate specification during Caenorhabditis elegans vulval development by hybrid functional Petri net with extension

    Directory of Open Access Journals (Sweden)

    Ueno Kazuko

    2009-04-01

    Full Text Available Abstract Background Model checking approaches were applied to biological pathway validations around 2003. Recently, Fisher et al. have proved the importance of model checking approach by inferring new regulation of signaling crosstalk in C. elegans and confirming the regulation with biological experiments. They took a discrete and state-based approach to explore all possible states of the system underlying vulval precursor cell (VPC fate specification for desired properties. However, since both discrete and continuous features appear to be an indispensable part of biological processes, it is more appropriate to use quantitative models to capture the dynamics of biological systems. Our key motivation of this paper is to establish a quantitative methodology to model and analyze in silico models incorporating the use of model checking approach. Results A novel method of modeling and simulating biological systems with the use of model checking approach is proposed based on hybrid functional Petri net with extension (HFPNe as the framework dealing with both discrete and continuous events. Firstly, we construct a quantitative VPC fate model with 1761 components by using HFPNe. Secondly, we employ two major biological fate determination rules – Rule I and Rule II – to VPC fate model. We then conduct 10,000 simulations for each of 48 sets of different genotypes, investigate variations of cell fate patterns under each genotype, and validate the two rules by comparing three simulation targets consisting of fate patterns obtained from in silico and in vivo experiments. In particular, an evaluation was successfully done by using our VPC fate model to investigate one target derived from biological experiments involving hybrid lineage observations. However, the understandings of hybrid lineages are hard to make on a discrete model because the hybrid lineage occurs when the system comes close to certain thresholds as discussed by Sternberg and Horvitz in

  2. Analytical models for lower and upper bounds of the condensation-induced water hammer in long horizontal pipes

    International Nuclear Information System (INIS)

    Chun, Moon Hyun; Park, Joo Wan; Nam, Ho Yun

    1992-01-01

    Improved analytical models have been proposed that can predict the lower and upper limits of the water hammer region for given flow conditions by incorporation of recent advances made in the understanding of phenomena associated with the condensation-induced water hammer into existing methods. Present models are applicable for steam-water counterflow in a long horizontal pipe geometry. Both lower and upper bounds of the water hammer region are expressed in terms of the 'critical inlet water flow rate' as a function of axial position. Water hammer region boundaries predicted by present and typical existing models are compared for particular flow conditions of the water hammer event occurred at San Onofre Unit 1 to assess the applicability of the models examined. The result shows that present models for lower and upper bounds of the water hammer region compare favorably with the best performing existing models

  3. Gender-Specific Models of Work-Bound Korean Adolescents' Social Supports and Career Adaptability on Subsequent Job Satisfaction

    Science.gov (United States)

    Han, Hyojung; Rojewski, Jay W.

    2015-01-01

    A Korean national database, the High School Graduates Occupational Mobility Survey, was used to examine the influence of perceived social supports (family and school) and career adaptability on the subsequent job satisfaction of work-bound adolescents 4 months after their transition from high school to work. Structural equation modeling analysis…

  4. Multi-Higgs doublet models: physical parametrization, sum rules and unitarity bounds

    Science.gov (United States)

    Bento, Miguel P.; Haber, Howard E.; Romão, J. C.; Silva, João P.

    2017-11-01

    If the scalar sector of the Standard Model is non-minimal, one might expect multiple generations of the hypercharge-1/2 scalar doublet analogous to the generational structure of the fermions. In this work, we examine the structure of a Higgs sector consisting of N Higgs doublets (where N ≥ 2). It is particularly convenient to work in the so-called charged Higgs basis, in which the neutral Higgs vacuum expectation value resides entirely in the first Higgs doublet, and the charged components of remaining N - 1 Higgs doublets are mass-eigenstate fields. We elucidate the interactions of the gauge bosons with the physical Higgs scalars and the Goldstone bosons and show that they are determined by an N × 2 N matrix. This matrix depends on ( N - 1)(2 N - 1) real parameters that are associated with the mixing of the neutral Higgs fields in the charged Higgs basis. Among these parameters, N - 1 are unphysical (and can be removed by rephasing the physical charged Higgs fields), and the remaining 2( N - 1)2 parameters are physical. We also demonstrate a particularly simple form for the cubic interaction and some of the quartic interactions of the Goldstone bosons with the physical Higgs scalars. These results are applied in the derivation of Higgs coupling sum rules and tree-level unitarity bounds that restrict the size of the quartic scalar couplings. In particular, new applications to three Higgs doublet models with an order-4 CP symmetry and with a Z_3 symmetry, respectively, are presented.

  5. Robust model predictive control of nonlinear systems with unmodeled dynamics and bounded uncertainties based on neural networks.

    Science.gov (United States)

    Yan, Zheng; Wang, Jun

    2014-03-01

    This paper presents a neural network approach to robust model predictive control (MPC) for constrained discrete-time nonlinear systems with unmodeled dynamics affected by bounded uncertainties. The exact nonlinear model of underlying process is not precisely known, but a partially known nominal model is available. This partially known nonlinear model is first decomposed to an affine term plus an unknown high-order term via Jacobian linearization. The linearization residue combined with unmodeled dynamics is then modeled using an extreme learning machine via supervised learning. The minimax methodology is exploited to deal with bounded uncertainties. The minimax optimization problem is reformulated as a convex minimization problem and is iteratively solved by a two-layer recurrent neural network. The proposed neurodynamic approach to nonlinear MPC improves the computational efficiency and sheds a light for real-time implementability of MPC technology. Simulation results are provided to substantiate the effectiveness and characteristics of the proposed approach.

  6. FAO/IAEA model protocol for the determination of bound residues in soil

    International Nuclear Information System (INIS)

    1986-01-01

    A protocol for determining bound pesticide residue content in soils was developed and collaboratively tested by 11 members of the FAO/IAEA Research Co-ordination Committee. The method assumes prior incubation of soil with a radioactive pesticide or related organic compound. The major process steps of the protocol include: (a) Soxhlet extraction of air-dry soil with methanol for 24 h; (b) determination of radioactivity in unextracted soil, in methanol-extracted soil (yielding bound residue content), and in the methanol extract (yielding extractable residue content); and (c) use of triplicate samples per analysis. The participants received lysimeter soils treated six to seven years earlier with 14 C-allyl alcohol (Soil A) or 14 C-hexachloro-benzene (Soil H). The inter-laboratory results first indicated non-homogeneity of Soil A sub-samples, since the initial and bound radioactivity for four laboratories was about half of that found by the remaining seven laboratories. Intra-laboratory (in one laboratory) analyses of sub-subsamples from six 'high-group' laboratories, two 'low-group' laboratories and two additional laboratories confirmed the homogeneity of Soil A and implicated error in the combustion methods at 'low-group' laboratories. The intra- and inter-laboratory coefficients of variation for initial 14 C-content were 4.7% and 7.0%, respectively. Of the residual 14 C in Soil A, 95% was bound; in contrast, only 15% of 14 C in Soil H was bound. The coefficients of variation among ten laboratories, for Soil H, were 8.4% and 18.1% for percentage extractable residue and percentage bound residue, respectively. Some limited testing of alternative protocols, using other solvents or batch extraction, confirmed that the IAEA protocol was most efficient in the extraction of non-bound radioactivity; pre-wetting Soil A may, however, improve extraction. (author)

  7. A mechanistic model of an upper bound on oceanic carbon export as a function of mixed layer depth and temperature

    Directory of Open Access Journals (Sweden)

    Z. Li

    2017-11-01

    Full Text Available Export production reflects the amount of organic matter transferred from the ocean surface to depth through biological processes. This export is in large part controlled by nutrient and light availability, which are conditioned by mixed layer depth (MLD. In this study, building on Sverdrup's critical depth hypothesis, we derive a mechanistic model of an upper bound on carbon export based on the metabolic balance between photosynthesis and respiration as a function of MLD and temperature. We find that the upper bound is a positively skewed bell-shaped function of MLD. Specifically, the upper bound increases with deepening mixed layers down to a critical depth, beyond which a long tail of decreasing carbon export is associated with increasing heterotrophic activity and decreasing light availability. We also show that in cold regions the upper bound on carbon export decreases with increasing temperature when mixed layers are deep, but increases with temperature when mixed layers are shallow. A meta-analysis shows that our model envelopes field estimates of carbon export from the mixed layer. When compared to satellite export production estimates, our model indicates that export production in some regions of the Southern Ocean, particularly the subantarctic zone, is likely limited by light for a significant portion of the growing season.

  8. Checking Java Programs

    CERN Document Server

    Darwin, Ian

    2007-01-01

    This Short Cut tells you about tools that will improve the quality of your Java code, using checking above and beyond what the standard tools do, including: Using javac options, JUnit and assertions Making your IDE work harder Checking your source code with PMD Checking your compiled code (.class files) with FindBugs Checking your program's run-time behavior with Java PathFinder

  9. Large N Chern-Simons with massive fundamental fermions — A model with no bound states

    International Nuclear Information System (INIS)

    Frishman, Yitzhak; Sonnenschein, Jacob

    2014-01-01

    In a previous paper http://dx.doi.org/10.1007/JHEP12(2013)091, we analyzed the theory of massive fermions in the fundamental representation coupled to a U(N) Chern-Simons gauge theory in three dimensions at level K. It was done in the large N, large K limits where λ=(N/K) was kept fixed. Among other results, we showed there that there are no high mass “quark anti-quark" bound states. Here we show that there are no bound states at all.

  10. Upper bound on the efficiency of certain nonimaging concentrators in the physical-optics model

    Science.gov (United States)

    Welford, W. T.; Winston, R.

    1982-09-01

    Upper bounds on the performance of nonimaging concentrators are obtained within the framework of scalar-wave theory by using a simple approach to avoid complex calculations on multiple phase fronts. The approach consists in treating a theoretically perfect image-forming device and postulating that no non-image-forming concentrator can have a better performance than such an ideal image-forming system. The performance of such a system can be calculated according to wave theory, and this will provide, in accordance with the postulate, upper bounds on the performance of nonimaging systems. The method is demonstrated for a two-dimensional compound parabolic concentrator.

  11. Atmospheric inverse modeling with known physical bounds: an example from trace gas emissions

    Directory of Open Access Journals (Sweden)

    S. M. Miller

    2014-02-01

    the relative merits of each. This paper investigates the applicability of several approaches to bounded inverse problems. A common method of data transformations is found to unrealistically skew estimates for the examined example application. The method of Lagrange multipliers and two Markov chain Monte Carlo (MCMC methods yield more realistic and accurate results. In general, the examined MCMC approaches produce the most realistic result but can require substantial computational time. Lagrange multipliers offer an appealing option for large, computationally intensive problems when exact uncertainty bounds are less central to the analysis. A synthetic data inversion of US anthropogenic methane emissions illustrates the strengths and weaknesses of each approach.

  12. Boson bound states in the β-Fermi–Pasta–Ulam model

    Indian Academy of Sciences (India)

    5. — journal of. November 2013 physics pp. 839–848. Boson bound states in the ... of Basic Sciences, The First Aeronautical Institute of the Air Force, Xinyang 464000, ..... [4] N Boechler, G Theocharis, S Job, P G Kevrekidis, M A Porter and C ...

  13. Optimal Bounds in Parametric LTL Games

    Directory of Open Access Journals (Sweden)

    Martin Zimmermann

    2011-06-01

    Full Text Available We consider graph games of infinite duration with winning conditions in parameterized linear temporal logic, where the temporal operators are equipped with variables for time bounds. In model checking such specifications were introduced as "PLTL" by Alur et al. and (in a different version called "PROMPT-LTL" by Kupferman et al.. We present an algorithm to determine optimal variable valuations that allow a player to win a game. Furthermore, we show how to determine whether a player wins a game with respect to some, infinitely many, or all valuations. All our algorithms run in doubly-exponential time; so, adding bounded temporal operators does not increase the complexity compared to solving plain LTL games.

  14. Checking behavioral conformance of artifacts

    NARCIS (Netherlands)

    Fahland, D.; Leoni, de M.; Dongen, van B.F.; Aalst, van der W.M.P.

    2011-01-01

    The usefulness of process models (e.g., for analysis, improvement, or execution) strongly depends on their ability to describe reality. Conformance checking is a technique to validate how good a given process model describes recorded executions of the actual process. Recently, artifacts have been

  15. Bound Flavin-Cytochrome Model of Extracellular Electron Transfer in Shewanella oneidensis: Analysis by Free Energy Molecular (Postprint)

    Science.gov (United States)

    2016-06-06

    cathodic conditions, oxidized and reduced heme states were assumed, respectively. The calculated results are summarized in Table 2. The solvation free...reports favor a flavin-bound model, proposing two one- electron reductions of flavin, namely, oxidized (Ox) to semiquinone (Sq) and semiquinone to...hydroquinone (Hq), at anodic and cathodic conditions, respectively. In this work, to provide a mechanistic understanding of riboflavin (RF) binding at

  16. Deregulated electricity markets with thermal losses and production bounds: models and optimality conditions

    Czech Academy of Sciences Publication Activity Database

    Aussel, D.; Červinka, Michal; Marechal, M.

    2016-01-01

    Roč. 50, č. 1 (2016), s. 19-38 ISSN 0399-0559 R&D Projects: GA ČR GAP402/12/1309; GA ČR GA201/09/1957 Institutional support: RVO:67985556 Keywords : Deregulated electricity market * production bounds * mathematical program with complementarity constraints * M-stationarity * calmness Subject RIV: BA - General Mathematics Impact factor: 0.550, year: 2016

  17. G protein- and agonist-bound serotonin 5-HT2A receptor model activated by steered molecular dynamics simulations

    DEFF Research Database (Denmark)

    Ísberg, Vignir; Balle, Thomas; Sander, Tommy

    2011-01-01

    molecular dynamics (MD) simulations. The driving force for the transformation was the addition of several known intermolecular and receptor interhelical hydrogen bonds enforcing the necessary helical and rotameric movements. Subsquent MD simulations without constraints confirmed the stability......A 5-HT(2A) receptor model was constructed by homology modeling based on the ß(2)-adrenergic receptor and the G protein-bound opsin crystal structures. The 5-HT(2A) receptor model was transferred into an active conformation by an agonist ligand and a G(aq) peptide in four subsequent steered...

  18. Upper and lower Higgs boson mass bounds from a lattice Higgs-Yukawa model with dynamical overlap fermions

    International Nuclear Information System (INIS)

    Gerhold, Philipp; Jansen, Karl

    2009-12-01

    We study a lattice Higgs-Yukawa model emulating the same Higgs-fermion coupling structure as in the Higgs sector of the electroweak Standard Model, in particular, obeying a Ginsparg- Wilson version of the underlying SU(2) L x U(1) Y symmetry, being a global symmetry here due to the neglection of gauge fields in this model. In this paper we present our results on the cutoffdependent upper Higgs boson mass bound at several selected values of the cutoff parameter Λ. (orig.)

  19. checkCIF/PLATON (full publication check)

    Indian Academy of Sciences (India)

    editor handling your paper, to upload your CIF via our web site. PLATON version of 05/02/2014; check.def file version of 05/02/2014. Datablock I - ellipsoid plot http://vm02b.iucr.org/cgi-bin/checkcif_hkl.pl(第 3/4 页)2014-2-12 09:09:12 ...

  20. Upper bounds on Higgs and top quark masses in the flipped SU(5)xU(1) superstring model

    Energy Technology Data Exchange (ETDEWEB)

    Durand, L.; Lopez, J.L.

    1989-02-02

    In this letter, we use a simplified method to calculate high-energy unitarity constraints on grand unified broken supersymmetric models. We apply the method to the ''flipped'' SU(5)xU(1) superstring model, obtain the constraints at a grand unified mass scale M/sub G/=4x10/sup 16/ GeV, and then use the renormalization group equations to evolve the constraints to the low-energy mass scale M/sub W/. We find upper bounds on the low-energy superpotential parameters which in turn imply absolute upper bounds on the top quark mass, m/sub t/< or approx.200 GeV, and on the lightest neutral Higgs boson mass, Msub(H/sub 1//sup 0/)< or approx.155 GeV. We also obtain an upper bound on Msub(H/sub 1//sup 0/) as a function of m/sub t/ which shows that for favored values of the ratio of Higgs vacuum expectation values Msub(H/sub 1//sup 0/)< or approx.125 GeV.

  1. Water hammer analysis. Dynamic simulation model check valve piston; Analisis del golpe de airete. Modelo de simulacion dinamica de valvula de retencion piston

    Energy Technology Data Exchange (ETDEWEB)

    Royo, B.; Valdes, R.

    2012-11-01

    This report contains the description and the results of the dynamic simulation model that has been developed to predict the behaviour of one of our lift check valve design. The aim of the model is not only to simulate the closing process of the valve and to product the magnitude of the water hammer effect that may appear immediately after the valve closing, but also to simulate several design version until obtain the optimum which further minimizes such effect. the input data used for this study ensure reliable results since they represent a real system. (Author)

  2. Organically bound tritium

    International Nuclear Information System (INIS)

    Diabate, S.; Strack, S.

    1993-01-01

    Tritium released into the environment may be incorporated into organic matter. Organically bound tritium in that case will show retention times in organisms that are considerably longer than those of tritiated water which has significant consequences on dose estimates. This article reviews the most important processes of organically bound tritium production and transport through food networks. Metabolic reactions in plant and animal organisms with tritiated water as a reaction partner are of great importance in this respect. The most important production process, in quantitative terms, is photosynthesis in green plants. The translocation of organically bound tritium from the leaves to edible parts of crop plants should be considered in models of organically bound tritium behavior. Organically bound tritium enters the human body on several pathways, either from the primary producers (vegetable food) or at a higher tropic level (animal food). Animal experiments have shown that the dose due to ingestion of organically bound tritium can be up to twice as high as a comparable intake of tritiated water in gaseous or liquid form. In the environment, organically bound tritium in plants and animals is often found to have higher specific tritium concentrations than tissue water. This is not due to some tritium enrichment effects but to the fact that no equilibrium conditions are reached under natural conditions. 66 refs

  3. Scan Order in Gibbs Sampling: Models in Which it Matters and Bounds on How Much.

    Science.gov (United States)

    He, Bryan; De Sa, Christopher; Mitliagkas, Ioannis; Ré, Christopher

    2016-01-01

    Gibbs sampling is a Markov Chain Monte Carlo sampling technique that iteratively samples variables from their conditional distributions. There are two common scan orders for the variables: random scan and systematic scan. Due to the benefits of locality in hardware, systematic scan is commonly used, even though most statistical guarantees are only for random scan. While it has been conjectured that the mixing times of random scan and systematic scan do not differ by more than a logarithmic factor, we show by counterexample that this is not the case, and we prove that that the mixing times do not differ by more than a polynomial factor under mild conditions. To prove these relative bounds, we introduce a method of augmenting the state space to study systematic scan using conductance.

  4. Effects of quantum chemistry models for bound electrons on positron annihilation spectra for atoms and small molecules

    International Nuclear Information System (INIS)

    Wang Feng; Ma Xiaoguang; Selvam, Lalitha; Gribakin, Gleb; Surko, Clifford M

    2012-01-01

    The Doppler-shift spectra of the γ-rays from positron annihilation in molecules were determined by using the momentum distribution of the annihilation electron–positron pair. The effect of the positron wavefunction on spectra was analysed in a recent paper (Green et al 2012 New J. Phys. 14 035021). In this companion paper, we focus on the dominant contribution to the spectra, which arises from the momenta of the bound electrons. In particular, we use computational quantum chemistry models (Hartree–Fock with two basis sets and density functional theory (DFT)) to calculate the wavefunctions of the bound electrons. Numerical results are presented for noble gases and small molecules such as H 2 , N 2 , O 2 , CH 4 and CF 4 . The calculations reveal relatively small effects on the Doppler-shift spectra from the level of inclusion of electron correlation energy in the models. For atoms, the difference in the full-width at half-maximum of the spectra obtained using the Hartree–Fock and DFT models does not exceed 2%. For molecules the difference can be much larger, reaching 8% for some molecular orbitals. These results indicate that the predicted positron annihilation spectra for molecules are generally more sensitive to inclusion of electron correlation energies in the quantum chemistry model than the spectra for atoms are. (paper)

  5. NLO+NLL collider bounds, Dirac fermion and scalar dark matter in the B-L model

    Energy Technology Data Exchange (ETDEWEB)

    Klasen, Michael [Westfaelische Wilhelms-Universitaet Muenster, Institut fuer Theoretische Physik, Muenster (Germany); Lyonnet, Florian [Southern Methodist University, Dallas, TX (United States); Queiroz, Farinaldo S. [Max-Planck-Institut fuer Kernphysik, Particle and Astroparticle Physics Division, Heidelberg (Germany)

    2017-05-15

    Baryon and lepton numbers being accidental global symmetries of the Standard Model (SM), it is natural to promote them to local symmetries. However, to preserve anomaly-freedom, only combinations of B-L are viable. In this spirit, we investigate possible dark matter realizations in the context of the U(1){sub B-L} model: (i) Dirac fermion with unbroken B-L; (ii) Dirac fermion with broken B-L; (iii) scalar dark matter; (iv) two-component dark matter. We compute the relic abundance, direct and indirect detection observables and confront them with recent results from Planck, LUX-2016, and Fermi-LAT and prospects from XENON1T. In addition to the well-known LEP bound M{sub Z}{sup {sub '}}/g{sub BL} >or similar 7 TeV, we include often ignored LHC bounds using 13 TeV dilepton (dimuon + dielectron) data at next-to-leading order plus next-to-leading logarithmic accuracy. We show that, for gauge couplings smaller than 0.4, the LHC gives rise to the strongest collider limit. In particular, we find M{sub Z}{sup {sub '}}/g{sub BL} > 8.7 TeV for g{sub BL} = 0.3. We conclude that the NLO+NLL corrections improve the dilepton bounds on the Z{sup '} mass and that both dark matter candidates are only viable in the Z{sup '} resonance region, with the parameter space for scalar dark matter being fully probed by XENON1T. Lastly, we show that one can successfully have a minimal two-component dark matter model. (orig.)

  6. Environmental Reality Check.

    Science.gov (United States)

    Manicone, Santo

    2001-01-01

    Discusses the importance of educational facilities conducting "reality check" self-audits to uncover the real truth behind underlying environmental problems. An environmental compliance multimedia checklist is included. (GR)

  7. check cif.pdf

    Indian Academy of Sciences (India)

    AMMIN

    Calculated. Reported. Volume ... PLAT094_ALERT_2_C Ratio of Maximum / Minimum Residual Density .... 3.24 Report ... checkCIF was carefully designed to identify outliers and unusual parameters, but every test has its limitations and alerts ...

  8. Bound and rebound states

    International Nuclear Information System (INIS)

    Orzalesi, C.A.

    1979-01-01

    In relativistic quantum theory, bound states generate forces in the crossed channel; such forces can affect the binding and self-consistent solutions should be sought for the bound-state problem. The author investigates how self-consistency can be achieved by successive approximations, in a simple scalar model and with successive relativistic eikonal approximations (EAs). Within the generalized ladder approximation, some exact properties of the resulting ''first generation'' bound states are discussed. The binding energies in this approximation are rather small even for rather large values of the primary coupling constant. The coupling of the constituent particles to the first-generation reggeon is determined by a suitable EA and a new generalized ladder amplitude is constructed with rungs given either by the primary gluons or by the first-generation reggeons. The resulting new (second-generation) bound states are found in a reggeized EA. The size of the corrections to the binding energies due to the rebinding effects is surprisingly large. The procedure is then iterated, so as to find - again in an EA - the third-generation bound states. The procedure is found to be self-consistent already at this stage: the third-generation bound states coincide with those of second generation, and no further rebinding takes place in the higher iterations of the approximation method. Features - good and bad - of the model are discussed, as well as the possible relevance of rebinding mechanisms in hadron dynamics. (author)

  9. Solvable light-front model of the electromagnetic form factor of the relativistic two-body bound state in 1+1 dimensions

    International Nuclear Information System (INIS)

    Mankiewicz, L.; Sawicki, M.

    1989-01-01

    Within a relativistically correct yet analytically solvable model of light-front quantum mechanics we construct the electromagnetic form factor of the two-body bound state and we study the validity of the static approximation to the full form factor. Upon comparison of full form factors calculated for different values of binding energy we observe an unexpected effect that for very strongly bound states further increase in binding leads to an increase in the size of the bound system. A similar effect is found for another quantum-mechanical model of relativistic dynamics

  10. Goat production check list

    DEFF Research Database (Denmark)

    Henriksen, Jørgen; Nielsen, Mette Benedicte Olaf; Madsen, Jørgen

    2009-01-01

    This check list, financed by DanChurchAid, highlights all issues should be carefully investigated before investing in distribution of goats and in interventions to assist poor rural communities to improve their livelihood through goat production.......This check list, financed by DanChurchAid, highlights all issues should be carefully investigated before investing in distribution of goats and in interventions to assist poor rural communities to improve their livelihood through goat production....

  11. Preoperative teaching and stoma marking in an inpatient population: a quality improvement process using a FOCUS-Plan-Do-Check-Act model.

    Science.gov (United States)

    Zimnicki, Katherine M

    2015-01-01

    Preoperative teaching and stoma marking are supported by research and included in clinical practice guidelines from the WOCN Society and others. Using a FOCUS-Plan-Do-Check-Act model of Total Quality Management, a multidisciplinary team was formed that developed a flow chart outlining the process of care for patients undergoing planned ostomy surgery that included an educational intervention that enabled staff nurses to perform preoperative stoma site marking and education. After 3 months, we found a statistically significant increase in the number of surgical patients who received these evidence-based interventions (14% vs 64%; χ = 9.32; P = .002).

  12. Large Eddy Simulation of Wall-Bounded Turbulent Flows with the Lattice Boltzmann Method: Effect of Collision Model, SGS Model and Grid Resolution

    Science.gov (United States)

    Pradhan, Aniruddhe; Akhavan, Rayhaneh

    2017-11-01

    Effect of collision model, subgrid-scale model and grid resolution in Large Eddy Simulation (LES) of wall-bounded turbulent flows with the Lattice Boltzmann Method (LBM) is investigated in turbulent channel flow. The Single Relaxation Time (SRT) collision model is found to be more accurate than Multi-Relaxation Time (MRT) collision model in well-resolved LES. Accurate LES requires grid resolutions of Δ+ LBM requires either grid-embedding in the near-wall region, with grid resolutions comparable to DNS, or a wall model. Results of LES with grid-embedding and wall models will be discussed.

  13. Modelling aggregate domestic electricity demand in Ghana: An autoregressive distributed lag bounds cointegration approach

    International Nuclear Information System (INIS)

    Adom, Philip Kofi; Bekoe, William; Akoena, Sesi Kutri Komla

    2012-01-01

    In spite of the varying supply boosting efforts made by various governments to deal with the existing demand–supply gap in the electricity sector, the incessant growth in aggregate domestic electricity demand has made these efforts futile. As an objective, this paper attempts to identify the factors responsible for the historical growth trends in aggregate domestic electricity demand quantifying their effects both in the short-run and long-run periods using the ARDL Bounds cointegration approach and the sample period 1975 to 2005. In the long-run, real per capita GDP, industry efficiency, structural changes in the economy, and degree of urbanisation are identified as the main driving force behind the historical growth trend in aggregate domestic electricity demand. However, in the short-run, real per capita GDP, industry efficiency, and degree of urbanisation are the main drivers of aggregate domestic electricity demand. Industry efficiency is the only factor that drives aggregate domestic electricity demand downwards. However, the negative efficiency effect is insufficient to have outweighed the positive income, output, and demographic effects, hence the continual growth in aggregate domestic electricity demand. As a policy option, we recommend that appropriate electricity efficiency standards be implemented at the industry level. - Highlights: ► Real per capita GDP is the primary determinant of electricity demand both in the short and long-run. ► Industrial efficiency, structural changes and urbanisation rate play secondary role. ► The positive income, output, and demographic effects outweigh the negative efficiency effects.

  14. The dopamine D2/D3 receptor agonist quinpirole increases checking-like behaviour in an operant observing response task with uncertain reinforcement: a novel possible model of OCD.

    Science.gov (United States)

    Eagle, Dawn M; Noschang, Cristie; d'Angelo, Laure-Sophie Camilla; Noble, Christie A; Day, Jacob O; Dongelmans, Marie Louise; Theobald, David E; Mar, Adam C; Urcelay, Gonzalo P; Morein-Zamir, Sharon; Robbins, Trevor W

    2014-05-01

    Excessive checking is a common, debilitating symptom of obsessive-compulsive disorder (OCD). In an established rodent model of OCD checking behaviour, quinpirole (dopamine D2/3-receptor agonist) increased checking in open-field tests, indicating dopaminergic modulation of checking-like behaviours. We designed a novel operant paradigm for rats (observing response task (ORT)) to further examine cognitive processes underpinning checking behaviour and clarify how and why checking develops. We investigated i) how quinpirole increases checking, ii) dependence of these effects on D2/3 receptor function (following treatment with D2/3 receptor antagonist sulpiride) and iii) effects of reward uncertainty. In the ORT, rats pressed an 'observing' lever for information about the location of an 'active' lever that provided food reinforcement. High- and low-checkers (defined from baseline observing) received quinpirole (0.5mg/kg, 10 treatments) or vehicle. Parametric task manipulations assessed observing/checking under increasing task demands relating to reinforcement uncertainty (variable response requirement and active-lever location switching). Treatment with sulpiride further probed the pharmacological basis of long-term behavioural changes. Quinpirole selectively increased checking, both functional observing lever presses (OLPs) and non-functional extra OLPs (EOLPs). The increase in OLPs and EOLPs was long-lasting, without further quinpirole administration. Quinpirole did not affect the immediate ability to use information from checking. Vehicle and quinpirole-treated rats (VEH and QNP respectively) were selectively sensitive to different forms of uncertainty. Sulpiride reduced non-functional EOLPs in QNP rats but had no effect on functional OLPs. These data have implications for treatment of compulsive checking in OCD, particularly for serotonin-reuptake-inhibitor treatment-refractory cases, where supplementation with dopamine receptor antagonists may be beneficial

  15. The dopamine D2/D3 receptor agonist quinpirole increases checking-like behaviour in an operant observing response task with uncertain reinforcement: A novel possible model of OCD?

    Science.gov (United States)

    Eagle, Dawn M.; Noschang, Cristie; d’Angelo, Laure-Sophie Camilla; Noble, Christie A.; Day, Jacob O.; Dongelmans, Marie Louise; Theobald, David E.; Mar, Adam C.; Urcelay, Gonzalo P.; Morein-Zamir, Sharon; Robbins, Trevor W.

    2014-01-01

    Excessive checking is a common, debilitating symptom of obsessive-compulsive disorder (OCD). In an established rodent model of OCD checking behaviour, quinpirole (dopamine D2/3-receptor agonist) increased checking in open-field tests, indicating dopaminergic modulation of checking-like behaviours. We designed a novel operant paradigm for rats (observing response task (ORT)) to further examine cognitive processes underpinning checking behaviour and clarify how and why checking develops. We investigated i) how quinpirole increases checking, ii) dependence of these effects on D2/3 receptor function (following treatment with D2/3 receptor antagonist sulpiride) and iii) effects of reward uncertainty. In the ORT, rats pressed an ‘observing’ lever for information about the location of an ‘active’ lever that provided food reinforcement. High- and low-checkers (defined from baseline observing) received quinpirole (0.5 mg/kg, 10 treatments) or vehicle. Parametric task manipulations assessed observing/checking under increasing task demands relating to reinforcement uncertainty (variable response requirement and active-lever location switching). Treatment with sulpiride further probed the pharmacological basis of long-term behavioural changes. Quinpirole selectively increased checking, both functional observing lever presses (OLPs) and non-functional extra OLPs (EOLPs). The increase in OLPs and EOLPs was long-lasting, without further quinpirole administration. Quinpirole did not affect the immediate ability to use information from checking. Vehicle and quinpirole-treated rats (VEH and QNP respectively) were selectively sensitive to different forms of uncertainty. Sulpiride reduced non-functional EOLPs in QNP rats but had no effect on functional OLPs. These data have implications for treatment of compulsive checking in OCD, particularly for serotonin-reuptake-inhibitor treatment-refractory cases, where supplementation with dopamine receptor antagonists may be

  16. An Implicit Model Development Process for Bounding External, Seemingly Intangible/Non-Quantifiable Factors

    Science.gov (United States)

    2017-06-01

    This research expands the modeling and simulation (M and S) body of knowledge through the development of an Implicit Model Development Process (IMDP...When augmented to traditional Model Development Processes (MDP), the IMDP enables the development of models that can address a broader array of...potential impacts on operational effectiveness. Specifically, the IMDP provides a formalized methodology for developing an improved model definition

  17. Pedestrian simulation model based on principles of bounded rationality: results of validation tests

    NARCIS (Netherlands)

    Zhu, W.; Timmermans, H.J.P.; Lo, H.P.; Leung, Stephen C.H.; Tan, Susanna M.L.

    2009-01-01

    Over the years, different modelling approaches to simulating pedestrian movement have been suggested. The majority of pedestrian decision models are based on the concept of utility maximization. To explore alternatives, we developed the heterogeneous heuristic model (HHM), based on principles of

  18. Modelling and simulation of turbulence and heat transfer in wall-bounded flows

    NARCIS (Netherlands)

    Popovac, M.

    2006-01-01

    At present it is widely accepted that there is no universal turbulence model, i.e. no turbulence model can give acceptably good predictions for all turbulent flows that are found in nature or engineering. Every turbulence model is based on certain assumptions, and hence it is aimed at certain type

  19. Computational modeling of chemical reactions and interstitial growth and remodeling involving charged solutes and solid-bound molecules.

    Science.gov (United States)

    Ateshian, Gerard A; Nims, Robert J; Maas, Steve; Weiss, Jeffrey A

    2014-10-01

    Mechanobiological processes are rooted in mechanics and chemistry, and such processes may be modeled in a framework that couples their governing equations starting from fundamental principles. In many biological applications, the reactants and products of chemical reactions may be electrically charged, and these charge effects may produce driving forces and constraints that significantly influence outcomes. In this study, a novel formulation and computational implementation are presented for modeling chemical reactions in biological tissues that involve charged solutes and solid-bound molecules within a deformable porous hydrated solid matrix, coupling mechanics with chemistry while accounting for electric charges. The deposition or removal of solid-bound molecules contributes to the growth and remodeling of the solid matrix; in particular, volumetric growth may be driven by Donnan osmotic swelling, resulting from charged molecular species fixed to the solid matrix. This formulation incorporates the state of strain as a state variable in the production rate of chemical reactions, explicitly tying chemistry with mechanics for the purpose of modeling mechanobiology. To achieve these objectives, this treatment identifies the specific theoretical and computational challenges faced in modeling complex systems of interacting neutral and charged constituents while accommodating any number of simultaneous reactions where reactants and products may be modeled explicitly or implicitly. Several finite element verification problems are shown to agree with closed-form analytical solutions. An illustrative tissue engineering analysis demonstrates tissue growth and swelling resulting from the deposition of chondroitin sulfate, a charged solid-bound molecular species. This implementation is released in the open-source program FEBio ( www.febio.org ). The availability of this framework may be particularly beneficial to optimizing tissue engineering culture systems by examining the

  20. Check valves aging assessment

    International Nuclear Information System (INIS)

    Haynes, H.D.

    1991-01-01

    In support of the NRC Nuclear Plant Aging Research (NPAR) program, the Oak Ridge National Laboratory (ORNL) has carried out an assessment of several check value diagnostic monitoring methods, in particular, those based on measurements of acoustic emission, ultrasonics, and magnetic flux. The evaluations have focussed on the capabilities of each method to provide information useful in determining check valve aging and service wear effects, check valve failures, and undesirable operating modes. This paper describes the benefits and limitations associated with each method and includes recent laboratory and field test data, including data obtained from the vendors who recently participated in a comprehensive series of tests directed by a nuclear industry users group. In addition, as part of the ORNL Advanced Diagnostic Engineering Research and Development Center (ADEC), two novel nonintrusive monitoring methods were developed that provide several unique capabilities. These methods, based on external ac- an dc-magnetic monitoring are also described. None of the examined methods could, by themselves, monitor both the instantaneous position and motion of check valve internals and valve leakage; however, the combination of acoustic emission monitoring with one of the other methods provides the means to determine vital check valve operational information

  1. Bounds on the slope and curvature of Isgur-Wise function in a QCD-inspired quark model

    Energy Technology Data Exchange (ETDEWEB)

    Hazarika, Bhaskar Jyoti [Department of Physics, Pandu College, Guwahati (India); Choudhury, D.K. [Department of Physics, Gauhati University, Guwahati (India)

    2011-09-15

    The quantum chromodynamics-inspired potential model pursued by us earlier has been recently modified to incorporate an additional factor 'c' in the linear cum Coulomb potential. While it felicitates the inclusion of standard confinement parameter b = 0.183 GeV{sup 2} unlike in previous work, it still falls short of explaining the Isgur-Wise function for the B mesons without ad hoc adjustment of the strong coupling constant. In this work, we determine the factor 'c' from the experimental values of decay constants and masses and show that the reality constraint on 'c' yields bounds on the strong coupling constant as well as on slope and curvature of Isgur-Wise function allowing more flexibility to the model. (author)

  2. Inference on population history and model checking using DNA sequence and microsatellite data with the software DIYABC (v1.0

    Directory of Open Access Journals (Sweden)

    Estoup Arnaud

    2010-07-01

    Full Text Available Abstract Background Approximate Bayesian computation (ABC is a recent flexible class of Monte-Carlo algorithms increasingly used to make model-based inference on complex evolutionary scenarios that have acted on natural populations. The software DIYABC offers a user-friendly interface allowing non-expert users to consider population histories involving any combination of population divergences, admixtures and population size changes. We here describe and illustrate new developments of this software that mainly include (i inference from DNA sequence data in addition or separately to microsatellite data, (ii the possibility to analyze five categories of loci considering balanced or non balanced sex ratios: autosomal diploid, autosomal haploid, X-linked, Y-linked and mitochondrial, and (iii the possibility to perform model checking computation to assess the "goodness-of-fit" of a model, a feature of ABC analysis that has been so far neglected. Results We used controlled simulated data sets generated under evolutionary scenarios involving various divergence and admixture events to evaluate the effect of mixing autosomal microsatellite, mtDNA and/or nuclear autosomal DNA sequence data on inferences. This evaluation included the comparison of competing scenarios and the quantification of their relative support, and the estimation of parameter posterior distributions under a given scenario. We also considered a set of scenarios often compared when making ABC inferences on the routes of introduction of invasive species to illustrate the interest of the new model checking option of DIYABC to assess model misfit. Conclusions Our new developments of the integrated software DIYABC should be particularly useful to make inference on complex evolutionary scenarios involving both recent and ancient historical events and using various types of molecular markers in diploid or haploid organisms. They offer a handy way for non-expert users to achieve model checking

  3. Estimating Multivariate Exponentail-Affine Term Structure Models from Coupon Bound Prices using Nonlinear Filtering

    DEFF Research Database (Denmark)

    Baadsgaard, Mikkel; Nielsen, Jan Nygaard; Madsen, Henrik

    2000-01-01

    An econometric analysis of continuous-timemodels of the term structure of interest rates is presented. A panel of coupon bond prices with different maturities is used to estimate the embedded parameters of a continuous-discrete state space model of unobserved state variables: the spot interest rate...... noise term should account for model errors. A nonlinear filtering method is used to compute estimates of the state variables, and the model parameters are estimated by a quasimaximum likelihood method provided that some assumptions are imposed on the model residuals. Both Monte Carlo simulation results...

  4. From preventive to permissive checks

    DEFF Research Database (Denmark)

    Weisdorf, Jacob Louis; Sharp, Paul Richard

    2009-01-01

    The Malthusian "preventive check" mechanism has been well documented for pre-industrial England through evidence for a negative correlation between the marriage rate and the price of wheat. Other literature, however, speculates that the correlation was in fact positive from the early nineteenth c...... model shows that this result is not in fact inconsistent with a stylised Malthusian mechanism, and can be understood within the context of an increasing dominance of shocks to aggregate demand rather than to aggregate supply....

  5. CMM Interim Check (U)

    Energy Technology Data Exchange (ETDEWEB)

    Montano, Joshua Daniel [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-03-23

    Coordinate Measuring Machines (CMM) are widely used in industry, throughout the Nuclear Weapons Complex and at Los Alamos National Laboratory (LANL) to verify part conformance to design definition. Calibration cycles for CMMs at LANL are predominantly one year in length. Unfortunately, several nonconformance reports have been generated to document the discovery of a certified machine found out of tolerance during a calibration closeout. In an effort to reduce risk to product quality two solutions were proposed – shorten the calibration cycle which could be costly, or perform an interim check to monitor the machine’s performance between cycles. The CMM interim check discussed makes use of Renishaw’s Machine Checking Gauge. This off-the-shelf product simulates a large sphere within a CMM’s measurement volume and allows for error estimation. Data was gathered, analyzed, and simulated from seven machines in seventeen different configurations to create statistical process control run charts for on-the-floor monitoring.

  6. New efficient utility upper bounds for the fully adaptive model of attack trees

    NARCIS (Netherlands)

    Buldas, Ahto; Lenin, Aleksandr

    2013-01-01

    We present a new fully adaptive computational model for attack trees that allows attackers to repeat atomic attacks if they fail and to play on if they are caught and have to pay penalties. The new model allows safer conclusions about the security of real-life systems and is somewhat

  7. Extending the bounds of ‘steady’ RANS closures: Toward an instability-sensitive Reynolds stress model

    International Nuclear Information System (INIS)

    Jakirlić, S.; Maduta, R.

    2015-01-01

    Highlights: • A grid-spacing free, instability-sensitive Reynolds stress model is formulated. • The model is capable of capturing turbulence fluctuations. • Substantial improvement concerning proper turbulence activity enhancement is achieved. • The model is intensively validated in a series of 2D and 3D separating flows. • The model feasibility is also checked in some attached flows. - Abstract: The incapability of the conventional Unsteady RANS (Reynolds–Averaged Navier Stokes) models to adequately capture turbulence unsteadiness presents the prime motivation of the present work, which focuses on formulating an instability-sensitive, eddy-resolving turbulence model on the Second-Moment Closure level. The model scheme adopted, functioning as a ‘sub-scale’ model in the Unsteady RANS framework, represents a differential near-wall Reynolds stress model formulated in conjunction with the scale-supplying equation governing the homogeneous part of the inverse turbulent time scale ω h (ω h = ε h /k). The latter equation was straightforwardly obtained from the model equation describing the dynamics of the homogeneous part of the total viscous dissipation rate ε, defined as ε h = ε − 0.5ν∂ 2 k/(∂x j ∂x j ) (Jakirlic and Hanjalic, 2002), by applying the derivation rules to the expression for ω h . The model capability to account for vortex length and time scales variability was enabled through an additional term in the corresponding length-scale determining equation, providing a selective enhancement of its production, pertinent particularly to the highly unsteady separated shear layer region, modeled in terms of the von Karman length scale (comprising the second derivative of the velocity field) in line with the SAS (Scale-Adaptive Simulation) proposal (Menter and Egorov, 2010). The present model formulation, termed as SRANS model (Sensitized RANS), does not comprise any parameter depending explicitly on grid spacing. The predictive

  8. Giving Work a Rain Check: Relationship Between Soldiering and Positive Work Outcomes Within the Job Demands-Resources Model

    Directory of Open Access Journals (Sweden)

    Ümit Baran Metin

    2015-07-01

    Full Text Available Soldiering is defined as engaging behaviourally or cognitively into non-work-related activities during working hours with no intention of harming the employer, co-workers, and/or clients. The present study will investigate this phenomenon using the Job-Demands Resources Model. The proposed model will consider the influence of job demands and resources on soldiering, as well as the relationship of soldiering with employee wellbeing and performance. The data, collected via online questionnaires across seven European countries, will be analysed using structural equation modelling in order to explore the goodness-of-fit of the proposed model as well as its potential cross cultural variations.

  9. Relativistic Model of Hamiltonian Renormalization for Bound States and Scattering Amplitudes

    International Nuclear Information System (INIS)

    Serafin, Kamil

    2017-01-01

    We test the renormalization group procedure for effective particles on a model of fermion–scalar interaction based on the Yukawa theory. The model is obtained by truncating the Yukawa theory to just two Fock sectors in the Dirac front form of Hamiltonian dynamics, a fermion, and a fermion and a boson, for the purpose of simple analytic calculation that exhibits steps of the procedure. (author)

  10. Thermodynamic and kinetics models of hydrogen absorption bound to phase transformations

    International Nuclear Information System (INIS)

    Gondor, G.; Lexcellent, Ch.

    2007-01-01

    In order to design hydrogen gaseous pressure tanks, the absorption (desorption) of hydrogen has to be described and modelled. The equilibrium state can be described by the 'H 2 gas pressure - H 2 composition in the intermetallic compounds - isotherms' (PCI) curves. Several models of PCI curves already exist. At the beginning of the absorption, the hydrogen atoms and the intermetallic compounds form a solid solution (α phase). When the hydrogen concentration increases, a phase transformation appears changing the α solid solution into an hydride (β phase) (solid solution + H 2 ↔ hydride). When all the solid solution has been transformed into hydride, the absorbed hydrogen atoms are in β phase. A new thermodynamic model has been developed in order to take into account this transition phase. The equilibrium state is then given by a relation between the H 2 gas pressure and the H 2 concentration in the intermetallic compound for a fixed external temperature. Two kinetics models have been developed too; at first has been considered that the kinetics depend only of the entire concentration in the intermetallic compound and of the difference between the applied pressure and the equilibrium pressure. Then, has been considered that the hydrogen concentration changes in the metallic matrix. In this last case, for each hydrogenation process, the absorption velocity is calculated to determine the slowest local process which regulates the local evolution of the hydrogen concentration. These two models are based on the preceding thermodynamic model of the PCI curves. (O.M.)

  11. Inner-outer predictive wall model for wall-bounded turbulence in hypersonic flow

    Science.gov (United States)

    Martin, M. Pino; Helm, Clara M.

    2017-11-01

    The inner-outer predictive wall model of Mathis et al. is modified for hypersonic turbulent boundary layers. The model is based on a modulation of the energized motions in the inner layer by large scale momentum fluctuations in the logarithmic layer. Using direct numerical simulation (DNS) data of turbulent boundary layers with free stream Mach number 3 to 10, it is shown that the variation of the fluid properties in the compressible flows leads to large Reynolds number (Re) effects in the outer layer and facilitate the modulation observed in high Re incompressible flows. The modulation effect by the large scale increases with increasing free-stream Mach number. The model is extended to include spanwise and wall-normal velocity fluctuations and is generalized through Morkovin scaling. Temperature fluctuations are modeled using an appropriate Reynolds Analogy. Density fluctuations are calculated using an equation of state and a scaling with Mach number. DNS data are used to obtain the universal signal and parameters. The model is tested by using the universal signal to reproduce the flow conditions of Mach 3 and Mach 7 turbulent boundary layer DNS data and comparing turbulence statistics between the modeled flow and the DNS data. This work is supported by the Air Force Office of Scientific Research under Grant FA9550-17-1-0104.

  12. Logical-Rule Models of Classification Response Times: A Synthesis of Mental-Architecture, Random-Walk, and Decision-Bound Approaches

    Science.gov (United States)

    Fific, Mario; Little, Daniel R.; Nosofsky, Robert M.

    2010-01-01

    We formalize and provide tests of a set of logical-rule models for predicting perceptual classification response times (RTs) and choice probabilities. The models are developed by synthesizing mental-architecture, random-walk, and decision-bound approaches. According to the models, people make independent decisions about the locations of stimuli…

  13. Checking BEBC superconducting magnet

    CERN Multimedia

    CERN PhotoLab

    1974-01-01

    The superconducting coils of the magnet for the 3.7 m Big European Bubble Chamber (BEBC) had to be checked, see Annual Report 1974, p. 60. The photo shows a dismantled pancake. By December 1974 the magnet reached again the field design value of 3.5 T.

  14. [Memory Checking Tests].

    Science.gov (United States)

    Hart, Joseph T.

    Two basic tests for checking memory skills are included in these appendices. The first, the General Information Test, uses the same 150 items for each of its two versions. One version is a completion-type test which measures recall by requiring the examinee to supply a specific response. The other version supplements each of the 150 items with…

  15. Check Sample Abstracts.

    Science.gov (United States)

    Alter, David; Grenache, David G; Bosler, David S; Karcher, Raymond E; Nichols, James; Rajadhyaksha, Aparna; Camelo-Piragua, Sandra; Rauch, Carol; Huddleston, Brent J; Frank, Elizabeth L; Sluss, Patrick M; Lewandrowski, Kent; Eichhorn, John H; Hall, Janet E; Rahman, Saud S; McPherson, Richard A; Kiechle, Frederick L; Hammett-Stabler, Catherine; Pierce, Kristin A; Kloehn, Erica A; Thomas, Patricia A; Walts, Ann E; Madan, Rashna; Schlesinger, Kathie; Nawgiri, Ranjana; Bhutani, Manoop; Kanber, Yonca; Abati, Andrea; Atkins, Kristen A; Farrar, Robert; Gopez, Evelyn Valencerina; Jhala, Darshana; Griffin, Sonya; Jhala, Khushboo; Jhala, Nirag; Bentz, Joel S; Emerson, Lyska; Chadwick, Barbara E; Barroeta, Julieta E; Baloch, Zubair W; Collins, Brian T; Middleton, Owen L; Davis, Gregory G; Haden-Pinneri, Kathryn; Chu, Albert Y; Keylock, Joren B; Ramoso, Robert; Thoene, Cynthia A; Stewart, Donna; Pierce, Arand; Barry, Michelle; Aljinovic, Nika; Gardner, David L; Barry, Michelle; Shields, Lisa B E; Arnold, Jack; Stewart, Donna; Martin, Erica L; Rakow, Rex J; Paddock, Christopher; Zaki, Sherif R; Prahlow, Joseph A; Stewart, Donna; Shields, Lisa B E; Rolf, Cristin M; Falzon, Andrew L; Hudacki, Rachel; Mazzella, Fermina M; Bethel, Melissa; Zarrin-Khameh, Neda; Gresik, M Vicky; Gill, Ryan; Karlon, William; Etzell, Joan; Deftos, Michael; Karlon, William J; Etzell, Joan E; Wang, Endi; Lu, Chuanyi M; Manion, Elizabeth; Rosenthal, Nancy; Wang, Endi; Lu, Chuanyi M; Tang, Patrick; Petric, Martin; Schade, Andrew E; Hall, Geraldine S; Oethinger, Margret; Hall, Geraldine; Picton, Avis R; Hoang, Linda; Imperial, Miguel Ranoa; Kibsey, Pamela; Waites, Ken; Duffy, Lynn; Hall, Geraldine S; Salangsang, Jo-Anne M; Bravo, Lulette Tricia C; Oethinger, Margaret D; Veras, Emanuela; Silva, Elvia; Vicens, Jimena; Silva, Elvio; Keylock, Joren; Hempel, James; Rushing, Elizabeth; Posligua, Lorena E; Deavers, Michael T; Nash, Jason W; Basturk, Olca; Perle, Mary Ann; Greco, Alba; Lee, Peng; Maru, Dipen; Weydert, Jamie Allen; Stevens, Todd M; Brownlee, Noel A; Kemper, April E; Williams, H James; Oliverio, Brock J; Al-Agha, Osama M; Eskue, Kyle L; Newlands, Shawn D; Eltorky, Mahmoud A; Puri, Puja K; Royer, Michael C; Rush, Walter L; Tavora, Fabio; Galvin, Jeffrey R; Franks, Teri J; Carter, James Elliot; Kahn, Andrea Graciela; Lozada Muñoz, Luis R; Houghton, Dan; Land, Kevin J; Nester, Theresa; Gildea, Jacob; Lefkowitz, Jerry; Lacount, Rachel A; Thompson, Hannis W; Refaai, Majed A; Quillen, Karen; Lopez, Ana Ortega; Goldfinger, Dennis; Muram, Talia; Thompson, Hannis

    2009-02-01

    The following abstracts are compiled from Check Sample exercises published in 2008. These peer-reviewed case studies assist laboratory professionals with continuing medical education and are developed in the areas of clinical chemistry, cytopathology, forensic pathology, hematology, microbiology, surgical pathology, and transfusion medicine. Abstracts for all exercises published in the program will appear annually in AJCP.

  16. Solusi Optimal Model Optimisasi Robust Untuk Masalah Traveling Salesman Dengan Ketidaktentuan Kotak Dan Pendekatan Metode Branch And Bound

    Directory of Open Access Journals (Sweden)

    Poppy Amriyati

    2015-12-01

    Full Text Available Traveling Salesman Problem (TSP merupakan teknik pencarian rute yang dimulai dari satu titik awal, setiap kota harus dikunjungi sekali dan kemudian kembali ke tempat asal sehingga total jarak atau waktu perjalanan adalah minimum. Untuk mengatasi kedakpastian jarak atau waktu perjalanan, maka perlu dilakukan pengembangan model TSP. Salah satu bidang Optimisasi yang mampu menyelesaikan permasalahan terkait ketidakpastian adalah Optimisasi Robust. Dalam makalah ini dibahas mengenai penerapan Optimisasi Robust pada TSP (RTSP menggunakan pendekatan Box Uncertainty dan diselesaikan dengan menggunakan Metode Branch and Bound. Disajikan simulasi numerik pada software aplikasi Maple untuk beberapa kasus nyata terkait penerapan Optimisasi RTSP , seperti masalah manajemen konstruksi, penentuan jarak tempuh kota di Pulau Jawa, dan Penentuan Rute Mandiri Fun Run.

  17. A Time-Regularized, Multiple Gravity-Assist Low-Thrust, Bounded-Impulse Model for Trajectory Optimization

    Science.gov (United States)

    Ellison, Donald H.; Englander, Jacob A.; Conway, Bruce A.

    2017-01-01

    The multiple gravity assist low-thrust (MGALT) trajectory model combines the medium-fidelity Sims-Flanagan bounded-impulse transcription with a patched-conics flyby model and is an important tool for preliminary trajectory design. While this model features fast state propagation via Keplers equation and provides a pleasingly accurate estimation of the total mass budget for the eventual flight suitable integrated trajectory it does suffer from one major drawback, namely its temporal spacing of the control nodes. We introduce a variant of the MGALT transcription that utilizes the generalized anomaly from the universal formulation of Keplers equation as a decision variable in addition to the trajectory phase propagation time. This results in two improvements over the traditional model. The first is that the maneuver locations are equally spaced in generalized anomaly about the orbit rather than time. The second is that the Kepler propagator now has the generalized anomaly as its independent variable instead of time and thus becomes an iteration-free propagation method. The new algorithm is outlined, including the impact that this has on the computation of Jacobian entries for numerical optimization, and a motivating application problem is presented that illustrates the improvements that this model has over the traditional MGALT transcription.

  18. Astronomical bounds on a cosmological model allowing a general interaction in the dark sector

    Science.gov (United States)

    Pan, Supriya; Mukherjee, Ankan; Banerjee, Narayan

    2018-06-01

    Non-gravitational interaction between two barotropic dark fluids, namely the pressureless dust and the dark energy in a spatially flat Friedmann-Lemaître-Robertson-Walker model, has been discussed. It is shown that for the interactions that are linear in terms the energy densities of the dark components and their first order derivatives, the net energy density is governed by a second-order differential equation with constant coefficients. Taking a generalized interaction, which includes a number of already known interactions as special cases, the dynamics of the universe is described for three types of the dark energy equation of state, namely that of interacting quintessence, interacting vacuum energy density, and interacting phantom. The models have been constrained using the standard cosmological probes, Supernovae Type Ia data from joint light curve analysis and the observational Hubble parameter data. Two geometric tests, the cosmographic studies, and the Om diagnostic have been invoked so as to ascertain the behaviour of the present model vis-a-vis the Λ-cold dark matter model. We further discussed the interacting scenarios taking into account the thermodynamic considerations.

  19. Lower bound element and submodel for modelling of joints between precast concrete panels

    DEFF Research Database (Denmark)

    Herfelt, Morten Andersen; Poulsen, Peter Noe; Hoang, Linh Cao

    2015-01-01

    In practice, precast concrete structures are designed using either analytical methods or linear finite element tools, and the in-situ cast joints between the precast panels are assessed using conservative empirical design formulas. This often leads to a suboptimal design, and local mechanisms ins....... The computational time and problem size of the joint element and detailed model will be discussed....

  20. A (2 d,3 v) cylindrical, kinetic model of a time-independent, collisionless bounded plasma

    International Nuclear Information System (INIS)

    Pedit, H.; Kuhn, S.

    1994-01-01

    A (2 d,3 v) cylindrical, electrostatic, collisionless kinetic model for a wide class of negative-bias de states of the single-ended Q machine is developed. Based on the method presented recently by the authors for an analogous cartesian model, the self-consistent plasma state is found by means of an iterative scheme in which the charge-density and potential distributions are alternately advanced. The electron an ion velocity distribution functions are calculated via trajectory integration, which ensures high accuracy and resolution in both configuration and velocity space. The main differences between cartesian and cylindrical geometry are discussed, and typical macroscopic as well as microscopic quantities for an exemplary special case are presented. (author). 3 refs, 5 figs

  1. Decreasing Damaging Effects of Stress-Bound Situations: Toward a New Model of Leadership Under Stress

    Science.gov (United States)

    1990-07-01

    Economia 5001 Eisenhower Avenue Travessa Estevio Pinto Alexandria, VA 22333-5600 Lisboa, Portugal 8a. NAME OF FUNDING/SPONSORING 8b. OFFICE SYMBOL 9...should be contingent upon the particular organizational pattern and culture . To test a possible model, a quasi-experimental study trained 18 instructors...cohesion, the particular organizational pattern and the culture related to it. (Pereira and Jesuino, 1987, final report). An important shortcoming of the

  2. An internal reference model-based PRF temperature mapping method with Cramer-Rao lower bound noise performance analysis.

    Science.gov (United States)

    Li, Cheng; Pan, Xinyi; Ying, Kui; Zhang, Qiang; An, Jing; Weng, Dehe; Qin, Wen; Li, Kuncheng

    2009-11-01

    The conventional phase difference method for MR thermometry suffers from disturbances caused by the presence of lipid protons, motion-induced error, and field drift. A signal model is presented with multi-echo gradient echo (GRE) sequence using a fat signal as an internal reference to overcome these problems. The internal reference signal model is fit to the water and fat signals by the extended Prony algorithm and the Levenberg-Marquardt algorithm to estimate the chemical shifts between water and fat which contain temperature information. A noise analysis of the signal model was conducted using the Cramer-Rao lower bound to evaluate the noise performance of various algorithms, the effects of imaging parameters, and the influence of the water:fat signal ratio in a sample on the temperature estimate. Comparison of the calculated temperature map and thermocouple temperature measurements shows that the maximum temperature estimation error is 0.614 degrees C, with a standard deviation of 0.06 degrees C, confirming the feasibility of this model-based temperature mapping method. The influence of sample water:fat signal ratio on the accuracy of the temperature estimate is evaluated in a water-fat mixed phantom experiment with an optimal ratio of approximately 0.66:1. (c) 2009 Wiley-Liss, Inc.

  3. Lower bounds for ν and Q2 values leading to scaling in the simple parton model

    International Nuclear Information System (INIS)

    Nataf, R.S.

    1979-06-01

    The simple parton model leads to the Bjorken scaling law only for rather large values of the transfer. For small values, the scale invariance is broken by a purely kinematical effect which is shown to depend on: (1+(4M 2 x 2 /Q 2 ))sup(1/2)-1, M being the mass of the target nucleon. Thus, one has to consider: ν>=5M (5GeV) and: Q 2 >=10M 2 x (9GeV/c) 2 for the whole x range) if it is demanded that scaling holds within 10% to error

  4. Trust but Verify: a spot check for the new stratified model of upper mantle anisotropy beneath North America

    Science.gov (United States)

    Levin, V. L.; Yuan, H.

    2011-12-01

    A newly developed 3D model of shear wave velocity and anisotropy beneath the North American continent (Yuan et al, 2011) offers a Solomonic solution to the long-standing dispute regarding the provenance of seismic anisotropy, with directional dependency of wave speed placed into both the lithosphere and the asthenosphere. However, due to its continent-wide coverage, the new model has lateral resolution on the scale of 500 km and is expected to average, and thus misrepresent, structure in regions with abrupt lateral changes in properties. The north-eastern US, especially along the coast, presents an example of such complex region. One of the earliest cases for stratified anisotropy was built on data from this part of North America (Levin et al., 1999), and also this is a region with significant, and enigmatic, lateral changes in isotropic velocity (van der Lee and Nolet, 1997; Nettles and Dziewonski, 2008). A decade since the initial studies of the region were performed, we have vastly more data that facilitate a new look at the seismic anisotropy parameters of the upper mantle beneath this region. We use shear wave splitting observations and anisotropy-aware receiver functions to develop high-quality constraints on the vertical and lateral variation in attributes of anisotropy, which we then compare (and contrast) with structure predicted for this region by the Yuan et al. (2011) model. Our goals are both to test the new model in one place, and to develop a strategy for such testing. Our primary data set comes from one of the longest-operating broad-band stations, HRV (Harvard, MA). Here, P wave receiver functions (PRFs) confirm the presence of features previously associated with the LAB and a mid-lithosphere discontinuity by Rychert et al. (2007). Notably, both features have very significant anisotropic components, with likely orientation of anisotropic symmetry axes being ~130SE or ~220SW. Similar symmetry is seen in PRFs constructed for other nearby sites

  5. Deterioration Models for Cement Bound Materials in Structural Design and Evaluation of Heavy Duty Pavements

    DEFF Research Database (Denmark)

    Skar, Asmus; Holst, Mogens Løvendorf

    Ports and industries require special types of pavements to resist the heavy static load from containers and continuous loads from operation vehicles. To reduce the risk of rutting and settlements over time concrete or compositepavement systems are typically applied. The structural design of such ......Ports and industries require special types of pavements to resist the heavy static load from containers and continuous loads from operation vehicles. To reduce the risk of rutting and settlements over time concrete or compositepavement systems are typically applied. The structural design...... of such pavements are today based on Mechanistic-Empirical (M-E) methods. The M-E method is appropriate for many situations, in other situations it may lead to overdesign, or maybe worse, underdesign. The method has limited capabilities and cannot account for signicant factors affecting the pavement response...... number of model parameters. In order to move a step towards more generalised structural design methods for analysis of heavy duty pavements, this study aims at developing a mechanistic approach based on constitutive models. A simple framework for engineering application is sought; creating a rational...

  6. Bounding the heterogeneous gas uptake on aerosols and ground using resistance model

    Science.gov (United States)

    Su, H.; Li, M.; Cheng, Y.

    2017-12-01

    Heterogeneous uptake on aerosols and ground are potential important atmospheric sinks for gases. Different schemes have been used to characterize the dry deposition and heterogeneous aerosol gas uptake, although they share similar characteristics. In this work, we propose a unified resistance model to compare the uptake flux on both ground and aerosols, to identify the dominate heterogeneous process within the planetary boundary layer (PBL). The Gamma(eq) is introduced to represent the reactive uptake coefficient on aerosols when these two processes are equally important. It's shown that Gamma(eq) is proportional to the dry deposition velocity, inversely proportional to aerosol surface area concentration. Under typical regional background condition, Gamma(eq) vary from 1x10-5 to 4x10-4 with gas species, land-use type and season, which indicates that aerosol gas uptake should be included in atmospheric models when uptake coefficient higher than 10-5. We address the importance of heterogeneous gas uptake on aerosols over ground especially for ozone uptake on liquid organic aerosols and for marine PBL atmosphere.

  7. Estimating global arthropod species richness: refining probabilistic models using probability bounds analysis

    Czech Academy of Sciences Publication Activity Database

    Hamilton, A. J.; Novotný, Vojtěch; Waters, E. K.; Basset, Y.; Benke, K. K.; Grimbacher, P. S.; Miller, S. E.; Samuelson, G. A.; Weiblen, G. D.; Yen, J. D. L.; Stork, N. E.

    2013-01-01

    Roč. 171, č. 2 (2013), s. 357-365 ISSN 0029-8549 R&D Projects: GA MŠk(CZ) LH11008; GA ČR GA206/09/0115 Grant - others:Czech Ministry of Education(CZ) CZ.1.07/2.3.00/20.0064; National Science Foundarion(US) DEB-0841885; Otto Kinne Foundation, Darwin Initiative(GB) 19-008 Institutional research plan: CEZ:AV0Z50070508 Institutional support: RVO:60077344 Keywords : host specificity * model * Monte Carlo Subject RIV: EH - Ecology, Behaviour Impact factor: 3.248, year: 2013 http://link.springer.com/article/10.1007%2Fs00442-012-2434-5

  8. Metabolism of organically bound tritium

    International Nuclear Information System (INIS)

    Travis, C.C.

    1984-01-01

    The classic methodology for estimating dose to man from environmental tritium ignores the fact that organically bound tritium in foodstuffs may be directly assimilated in the bound compartment of tissues without previous oxidation. We propose a four-compartment model consisting of a free body water compartment, two organic compartments, and a small, rapidly metabolizing compartment. The utility of this model lies in the ability to input organically bound tritium in foodstuffs directly into the organic compartments of the model. We found that organically bound tritium in foodstuffs can increase cumulative total body dose by a factor of 1.7 to 4.5 times the free body water dose alone, depending on the bound-to-loose ratio of tritium in the diet. Model predictions are compared with empirical measurements of tritium in human urine and tissue samples, and appear to be in close agreement. 10 references, 4 figures, 3 tables

  9. Swing check valve

    International Nuclear Information System (INIS)

    Eminger, H.E.

    1977-01-01

    A swing check valve which includes a valve body having an inlet and outlet is described. A recess in the valve body designed to hold a seal ring and a check valve disc swingable between open and closed positions. The disc is supported by a high strength wire secured at one end in a support spacer pinned through bearing blocks fixed to the valve body and at its other end in a groove formed on the outer peripheral surface of the disc. The parts are designed and chosen such to provide a lightweight valve disc which is held open by minimum velocity of fluid flowing through the valve which thus reduces oscillations and accompanying wear of bearings supporting the valve operating parts. (Auth.)

  10. Check Verbraucherpolitik und Verbraucherbeteiligung

    DEFF Research Database (Denmark)

    Hagen, Kornelia; Micklitz, Hans-W.; Oehler, Andreas

    2013-01-01

    The paper discusses the opportunities for an empirically grounded decision support system as an instrument for independent and scientifically based consumer policy consulting. To date, consumer policy is dominated by the information paradigm and the leitbild of the rational, sovereign...... and information-seeking consumer. Yet, both everyday practice and research in behavioural economics show that this view lacks empirical ground. In fact, there are different consumer types and different forms of rationalities at work. Effective consumer policy making should be based on the empirically revealed...... an empirically based “Check Consumer Policy and Consumer Participation” as a systematic decision and evaluation tool for policy makers. This check should be independent from the government and should be grounded on an empirical view of the consumer. Consumer policy tools should be tested with real consumers...

  11. The η′N interaction from a chiral effective model and η′-N bound state

    International Nuclear Information System (INIS)

    Sakai, Shuntaro; Jido, Daisuke

    2015-01-01

    The η ′ mass reduction in the nuclear medium is expected owing to the degeneracy of the pseudoscalar-singlet and octet mesons in the restoration of the spontaneous chiral symmetry breaking. In this study, we investigate the η ′ N 2body interaction, which is the fundamental interaction of the in-medium η ′ properties, using the linear sigma model as a chiral effective model. The η ′ N interaction in the linear sigma model comes from the scalar meson exchange with U A (1) symmetry effect and is found to be fairly strong attraction. The transition amplitude of η ′ N to the ηN channel is relatively small compared to that of elastic channel. From the analysis of the η ′ N 2body system, we find a η ′ N bound state with the binding energy 12.3-3.3iMeV. We expect that this strongly attractive two body interaction leads to a deep and attractive optical potential

  12. Magnetically operated check valve

    Science.gov (United States)

    Morris, Brian G.; Bozeman, Richard J., Jr.

    1994-06-01

    A magnetically operated check valve is disclosed. The valve is comprised of a valve body and a movable poppet disposed therein. A magnet attracts the poppet to hold the valve shut until the force of fluid flow through the valve overcomes the magnetic attraction and moves the poppet to an unseated, open position. The poppet and magnet are configured and disposed to trap a magnetically attracted particulate and prevent it from flowing to a valve seating region.

  13. Model-based virtual VSB mask writer verification for efficient mask error checking and optimization prior to MDP

    Science.gov (United States)

    Pack, Robert C.; Standiford, Keith; Lukanc, Todd; Ning, Guo Xiang; Verma, Piyush; Batarseh, Fadi; Chua, Gek Soon; Fujimura, Akira; Pang, Linyong

    2014-10-01

    A methodology is described wherein a calibrated model-based `Virtual' Variable Shaped Beam (VSB) mask writer process simulator is used to accurately verify complex Optical Proximity Correction (OPC) and Inverse Lithography Technology (ILT) mask designs prior to Mask Data Preparation (MDP) and mask fabrication. This type of verification addresses physical effects which occur in mask writing that may impact lithographic printing fidelity and variability. The work described here is motivated by requirements for extreme accuracy and control of variations for today's most demanding IC products. These extreme demands necessitate careful and detailed analysis of all potential sources of uncompensated error or variation and extreme control of these at each stage of the integrated OPC/ MDP/ Mask/ silicon lithography flow. The important potential sources of variation we focus on here originate on the basis of VSB mask writer physics and other errors inherent in the mask writing process. The deposited electron beam dose distribution may be examined in a manner similar to optical lithography aerial image analysis and image edge log-slope analysis. This approach enables one to catch, grade, and mitigate problems early and thus reduce the likelihood for costly long-loop iterations between OPC, MDP, and wafer fabrication flows. It moreover describes how to detect regions of a layout or mask where hotspots may occur or where the robustness to intrinsic variations may be improved by modification to the OPC, choice of mask technology, or by judicious design of VSB shots and dose assignment.

  14. Influence of low-energy scattering on loosely bound states

    International Nuclear Information System (INIS)

    Sparenberg, Jean-Marc; Capel, Pierre; Baye, Daniel

    2010-01-01

    Compact algebraic equations are derived that connect the binding energy and the asymptotic normalization constant (ANC) of a subthreshold bound state with the effective-range expansion of the corresponding partial wave. These relations are established for positively charged and neutral particles, using the analytic continuation of the scattering (S) matrix in the complex wave-number plane. Their accuracy is checked on simple local potential models for the 16 O+n, 16 O+p, and 12 C+α nuclear systems, with exotic nuclei and nuclear astrophysics applications in mind.

  15. Identifying optimum performance trade-offs using a cognitively bounded rational analysis model of discretionary task interleaving.

    Science.gov (United States)

    Janssen, Christian P; Brumby, Duncan P; Dowell, John; Chater, Nick; Howes, Andrew

    2011-01-01

    We report the results of a dual-task study in which participants performed a tracking and typing task under various experimental conditions. An objective payoff function was used to provide explicit feedback on how participants should trade off performance between the tasks. Results show that participants' dual-task interleaving strategy was sensitive to changes in the difficulty of the tracking task and resulted in differences in overall task performance. To test the hypothesis that people select strategies that maximize payoff, a Cognitively Bounded Rational Analysis model was developed. This analysis evaluated a variety of dual-task interleaving strategies to identify the optimal strategy for maximizing payoff in each condition. The model predicts that the region of optimum performance is different between experimental conditions. The correspondence between human data and the prediction of the optimal strategy is found to be remarkably high across a number of performance measures. This suggests that participants were honing their behavior to maximize payoff. Limitations are discussed. Copyright © 2011 Cognitive Science Society, Inc.

  16. Bounds and inequalities relating h-index, g-index, e-index and generalized impact factor: an improvement over existing models.

    Science.gov (United States)

    Abbas, Ash Mohammad

    2012-01-01

    In this paper, we describe some bounds and inequalities relating h-index, g-index, e-index, and generalized impact factor. We derive the bounds and inequalities relating these indexing parameters from their basic definitions and without assuming any continuous model to be followed by any of them. We verify the theorems using citation data for five Price Medalists. We observe that the lower bound for h-index given by Theorem 2, [formula: see text], g ≥ 1, comes out to be more accurate as compared to Schubert-Glanzel relation h is proportional to C(2/3)P(-1/3) for a proportionality constant of 1, where C is the number of citations and P is the number of papers referenced. Also, the values of h-index obtained using Theorem 2 outperform those obtained using Egghe-Liang-Rousseau power law model for the given citation data of Price Medalists. Further, we computed the values of upper bound on g-index given by Theorem 3, g ≤ (h + e), where e denotes the value of e-index. We observe that the upper bound on g-index given by Theorem 3 is reasonably tight for the given citation record of Price Medalists.

  17. 40 CFR 86.327-79 - Quench checks; NOX analyzer.

    Science.gov (United States)

    2010-07-01

    ... any flow rate into the reaction chamber. This includes, but is not limited to, sample capillary, ozone... Quench checks; NOX analyzer. (a) Perform the reaction chamber quench check for each model of high vacuum reaction chamber analyzer prior to initial use. (b) Perform the reaction chamber quench check for each new...

  18. Magnetic Check Valve

    Science.gov (United States)

    Morris, Brian G.; Bozeman, Richard J., Jr.

    1994-01-01

    Poppet in proposed check valve restored to closed condition by magnetic attraction instead of spring force. Oscillations suppressed, with consequent reduction of wear. Stationary magnetic disk mounted just upstream of poppet, also containing magnet. Valve body nonmagnetic. Forward pressure or flow would push poppet away from stationary magnetic disk so fluid flows easily around poppet. Stop in valve body prevents poppet from being swept away. When flow stopped or started to reverse, magnetic attraction draws poppet back to disk. Poppet then engages floating O-ring, thereby closing valve and preventing reverse flow. Floating O-ring facilitates sealing at low loads.

  19. Improved Range Searching Lower Bounds

    DEFF Research Database (Denmark)

    Larsen, Kasper Green; Nguyen, Huy L.

    2012-01-01

    by constructing a hard input set and query set, and then invoking Chazelle and Rosenberg's [CGTA'96] general theorem on the complexity of navigation in the pointer machine. For the group model, we show that input sets and query sets that are hard for range reporting in the pointer machine (i.e. by Chazelle...... and Rosenberg's theorem), are also hard for dynamic range searching in the group model. This theorem allows us to reuse decades of research on range reporting lower bounds to immediately obtain a range of new group model lower bounds. Amongst others, this includes an improved lower bound for the fundamental...

  20. Check, check, double check: checking the autopilot causes distrust : Experimental studies on the effects of compulsive perseveration

    NARCIS (Netherlands)

    Dek, E.C.P.

    2015-01-01

    Obsessive-compulsive disorder (OCD) is characterized by persistent doubt. The majority of patients with OCD engage in repeated checking to reduce these feelings of uncertainty. However, numerous studies demonstrated that repetitive behavior ironically increases uncertainty: perseverative checking

  1. Model Checking Multivariate State Rewards

    DEFF Research Database (Denmark)

    Nielsen, Bo Friis; Nielson, Flemming; Nielson, Hanne Riis

    2010-01-01

    We consider continuous stochastic logics with state rewards that are interpreted over continuous time Markov chains. We show how results from multivariate phase type distributions can be used to obtain higher-order moments for multivariate state rewards (including covariance). We also generalise...

  2. Program Analysis as Model Checking

    DEFF Research Database (Denmark)

    Olesen, Mads Chr.

    Software programs are proliferating throughout modern life, to a point where even the simplest appliances such as lightbulbs contain software, in addition to the software embedded in cars and airplanes. The correct functioning of these programs is therefore of the utmost importance, for the quality...

  3. Modeling personal particle-bound polycyclic aromatic hydrocarbon (pb-pah) exposure in human subjects in Southern California.

    Science.gov (United States)

    Wu, Jun; Tjoa, Thomas; Li, Lianfa; Jaimes, Guillermo; Delfino, Ralph J

    2012-07-11

    Exposure to polycyclic aromatic hydrocarbon (PAH) has been linked to various adverse health outcomes. Personal PAH exposures are usually measured by personal monitoring or biomarkers, which are costly and impractical for a large population. Modeling is a cost-effective alternative to characterize personal PAH exposure although challenges exist because the PAH exposure can be highly variable between locations and individuals in non-occupational settings. In this study we developed models to estimate personal inhalation exposures to particle-bound PAH (PB-PAH) using data from global positioning system (GPS) time-activity tracking data, traffic activity, and questionnaire information. We conducted real-time (1-min interval) personal PB-PAH exposure sampling coupled with GPS tracking in 28 non-smoking women for one to three sessions and one to nine days each session from August 2009 to November 2010 in Los Angeles and Orange Counties, California. Each subject filled out a baseline questionnaire and environmental and behavior questionnaires on their typical activities in the previous three months. A validated model was used to classify major time-activity patterns (indoor, in-vehicle, and other) based on the raw GPS data. Multiple-linear regression and mixed effect models were developed to estimate averaged daily and subject-level PB-PAH exposures. The covariates we examined included day of week and time of day, GPS-based time-activity and GPS speed, traffic- and roadway-related parameters, meteorological variables (i.e. temperature, wind speed, relative humidity), and socio-demographic variables and occupational exposures from the questionnaire. We measured personal PB-PAH exposures for 180 days with more than 6 h of valid data on each day. The adjusted R2 of the model was 0.58 for personal daily exposures, 0.61 for subject-level personal exposures, and 0.75 for subject-level micro-environmental exposures. The amount of time in vehicle (averaging 4.5% of total

  4. Repeated checking causes memory distrust

    NARCIS (Netherlands)

    van den Hout, M.; Kindt, M.

    2003-01-01

    This paper attempts to explain why in obsessive-compulsive disorder (OCD) checkers distrust in memory persists despite extensive checking. It is argued that: (1) repeated checking increases familiarity with the issues checked; (2) increased familiarity promotes conceptual processing which inhibits

  5. Beyond Maslow's culture-bound linear theory: a preliminary statement of the double-Y model of basic human needs.

    Science.gov (United States)

    Yang, Kuo-Shu

    2003-01-01

    Maslow's theory of basic human needs is criticized with respect to two of its major aspects, unidimensional linearity and cross-cultural validity. To replace Maslow's linear theory, a revised Y model is proposed on the base of Y. Yu's original Y model. Arranged on the stem of the Y are Maslow's physiological needs (excluding sexual needs) and safety needs. Satisfaction of these needs is indispensable to genetic survival. On the left arm of the Y are interpersonal and belongingness needs, esteem needs, and the self-actualization need. The thoughts and behaviors required for the fulfillment of these needs lead to genetic expression. Lastly, on the right arm of the Y are sexual needs, childbearing needs, and parenting needs. The thoughts and behaviors entailed in the satisfaction of these needs result in genetic transmission. I contend that needs for genetic survival and transmission are universal and that needs for genetic expression are culture-bound. Two major varieties of culture-specific expression needs are distinguished for each of the three levels of needs on the left arm of the Y model. Collectivistic needs for interpersonal affiliation and belongingness, esteem, and self-actualization prevail in collectivist cultures like those found in East Asian countries. Individualistic needs are dominant in individualist cultures like those in North America and certain European nations. I construct two separate Y models, one for people in collectivist cultures and the other for those in individualist ones. In the first (the Yc model), the three levels of expression needs on the left arm are collectivistic in nature, whereas in the second (the Yi model), the three levels of needs on the left arm are individualistic in nature. Various forms of the double-Y model are formulated by conceptually combining the Yc and Yi models at the cross-cultural, crossgroup, and intra-individual levels. Research directions for testing the various aspects of the double-Y model are

  6. UV laser photoactivation of hexachloroplatinate bound to individual nucleobases in vacuo as molecular level probes of a model photopharmaceutical.

    Science.gov (United States)

    Matthews, Edward; Sen, Ananya; Yoshikawa, Naruo; Bergström, Ed; Dessent, Caroline E H

    2016-06-01

    Isolated molecular clusters of adenine, cytosine, thymine and uracil bound to hexachloroplatinate, PtCl6(2-), have been studied using laser electronic photodissociation spectroscopy to investigate photoactivation of a platinum complex in the vicinity of a nucleobase. These metal complex-nucleobase clusters represent model systems for identifying the fundamental photochemical processes occurring in photodynamic platinum drug therapies that target DNA. This is the first study to explore the specific role of a strongly photoactive platinum compound in the aggregate complex. Each of the clusters studied displays a broadly similar absorption spectra, with a strong λmax ∼ 4.6 eV absorption band and a subsequent increase in the absorption intensity towards higher spectral-energy. The absorption bands are traced to ligand-to-metal-charge-transfer excitations on the PtCl6(2-) moiety within the cluster, and result in Cl(-)·nucleobase and PtCl5(-) as primary photofragments. These results demonstrate how selective photoexcitation can drive distinctive photodecay channels for a model photo-pharmaceutical. In addition, cluster absorption due to excitation of nucleobase-centred chromophores is observed in the region around 5 eV. For the uracil cluster, photofragments consistent with ultrafast decay of the excited state and vibrational predissociation on the ground-state surface are observed. However, this decay channel becomes successively weaker on going from thymine to cytosine to adenine, due to differential coupling of the excited states to the electron detachment continuum. These effects demonstrate the distinctive photophysical characteristics of the different nucleobases, and are discussed in the context of the recently recorded photoelectron spectra of theses clusters.

  7. Non intrusive check valve diagnostics at Bruce A

    International Nuclear Information System (INIS)

    Marsch, S.P.

    1997-01-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  8. Non intrusive check valve diagnostics at Bruce A

    Energy Technology Data Exchange (ETDEWEB)

    Marsch, S.P. [Ontario Hydro, Bruce Nuclear Generating Station A, Tiverton, ON (Canada)

    1997-07-01

    Bruce A purchased non intrusive check valve diagnostic equipment in 1995 to ensure operability and availability of critical check valves in the Station. Diagnostics can be used to locate and monitor check valve degradation modes. Bruce A initiated a pilot program targeting check valves with flow through them and ones that completed open or close cycles. Approaches to determine how to confirm operability of passive check valves using non intrusive techniques were explored. A sample population of seventy-three check valves was selected to run the pilot program on prior to complete implementation. The pilot program produced some significant results and some inconclusive results. The program revealed a major finding that check valve performance modeling is required to ensure continuous operability of check valves. (author)

  9. Ball check valve

    International Nuclear Information System (INIS)

    Bevilacqua, F.

    1978-01-01

    A pressurized nuclear reactor having an instrument assembly sheathed in a metallic tube which is extended vertically upward into the reactor core by traversing a metallic guide tube which is welded to the wall of the vessel is described. Sensors in each instrument assembly are connected to instruments outside the vessel to manifest the conditions within the core. Each instrument assembly probe is moved into position within a metallic guide channel. The guide channel penetrates the wall of the vessel and forms part of the barrier to the environment within the pressure vessel. Each channel includes a ball check valve which is opened by the instrument assembly probe when the probe passes through the valve. A ball valve element is moved from its seat by the probe to a position lateral of the bore of the channel and is guided to its seat along a sloped path within the valve body when the probe is removed. 5 claims, 3 figures

  10. Perceptron Mistake Bounds

    OpenAIRE

    Mohri, Mehryar; Rostamizadeh, Afshin

    2013-01-01

    We present a brief survey of existing mistake bounds and introduce novel bounds for the Perceptron or the kernel Perceptron algorithm. Our novel bounds generalize beyond standard margin-loss type bounds, allow for any convex and Lipschitz loss function, and admit a very simple proof.

  11. Modeling personal particle-bound polycyclic aromatic hydrocarbon (pb-pah exposure in human subjects in Southern California

    Directory of Open Access Journals (Sweden)

    Wu Jun

    2012-07-01

    Full Text Available Abstract Background Exposure to polycyclic aromatic hydrocarbon (PAH has been linked to various adverse health outcomes. Personal PAH exposures are usually measured by personal monitoring or biomarkers, which are costly and impractical for a large population. Modeling is a cost-effective alternative to characterize personal PAH exposure although challenges exist because the PAH exposure can be highly variable between locations and individuals in non-occupational settings. In this study we developed models to estimate personal inhalation exposures to particle-bound PAH (PB-PAH using data from global positioning system (GPS time-activity tracking data, traffic activity, and questionnaire information. Methods We conducted real-time (1-min interval personal PB-PAH exposure sampling coupled with GPS tracking in 28 non-smoking women for one to three sessions and one to nine days each session from August 2009 to November 2010 in Los Angeles and Orange Counties, California. Each subject filled out a baseline questionnaire and environmental and behavior questionnaires on their typical activities in the previous three months. A validated model was used to classify major time-activity patterns (indoor, in-vehicle, and other based on the raw GPS data. Multiple-linear regression and mixed effect models were developed to estimate averaged daily and subject-level PB-PAH exposures. The covariates we examined included day of week and time of day, GPS-based time-activity and GPS speed, traffic- and roadway-related parameters, meteorological variables (i.e. temperature, wind speed, relative humidity, and socio-demographic variables and occupational exposures from the questionnaire. Results We measured personal PB-PAH exposures for 180 days with more than 6 h of valid data on each day. The adjusted R2 of the model was 0.58 for personal daily exposures, 0.61 for subject-level personal exposures, and 0.75 for subject-level micro-environmental exposures. The amount

  12. Kinetic and modelling studies of NAD+ and poly(ethylene glycol)-bound NAD+ in horse liver alcohol dehydrogenase

    NARCIS (Netherlands)

    Vanhommerig, S.A.M.; Sluyterman, L.A.A.E.; Meijer, E.M.

    1996-01-01

    Poly(ethylene glycol)-bound nicotinamide adenine dinucleotide (PEG-NAD+) has been successfully employed in the continuous production of L-amino acids from the corresponding alpha-keto acids by stereospecific reductive amination. Like many other dehydrogenases also horse liver alcohol dehydrogenase

  13. Circuit lower bounds in bounded arithmetics

    Czech Academy of Sciences Publication Activity Database

    Pich, Ján

    2015-01-01

    Roč. 166, č. 1 (2015), s. 29-45 ISSN 0168-0072 R&D Projects: GA AV ČR IAA100190902 Keywords : bounded arithmetic * circuit lower bounds Subject RIV: BA - General Mathematics Impact factor: 0.582, year: 2015 http://www.sciencedirect.com/science/article/pii/S0168007214000888

  14. Curvature bound from gravitational catalysis

    Science.gov (United States)

    Gies, Holger; Martini, Riccardo

    2018-04-01

    We determine bounds on the curvature of local patches of spacetime from the requirement of intact long-range chiral symmetry. The bounds arise from a scale-dependent analysis of gravitational catalysis and its influence on the effective potential for the chiral order parameter, as induced by fermionic fluctuations on a curved spacetime with local hyperbolic properties. The bound is expressed in terms of the local curvature scalar measured in units of a gauge-invariant coarse-graining scale. We argue that any effective field theory of quantum gravity obeying this curvature bound is safe from chiral symmetry breaking through gravitational catalysis and thus compatible with the simultaneous existence of chiral fermions in the low-energy spectrum. With increasing number of dimensions, the curvature bound in terms of the hyperbolic scale parameter becomes stronger. Applying the curvature bound to the asymptotic safety scenario for quantum gravity in four spacetime dimensions translates into bounds on the matter content of particle physics models.

  15. Wegner-type Bounds for a Two-particle Lattice Model with a Generic 'Rough' Quasi-periodic Potential

    International Nuclear Information System (INIS)

    Gaume, Martin

    2010-01-01

    In this paper, we consider a class of two-particle tight-binding Hamiltonians, describing pairs of interacting quantum particles on the lattice Z d , d ≥ 1, subject to a common external potential V(x) which we assume quasi-periodic and depending on auxiliary parameters. Such parametric families of ergodic deterministic potentials ('grands ensembles') have been introduced earlier in Chulaevsky (2007), in the framework of single-particle lattice systems, where it was proved that a non-uniform analog of the Wegner bound holds true for a class of quasi-periodic grands ensembles. Using the approach proposed in Chulaevsky and Suhov (Commun Math Phys 283(2):479-489, 2008), we establish volume-dependent Wegner-type bounds for a class of quasi-periodic two-particle lattice systems with a non-random short-range interaction.

  16. Meson-meson bound state in a 2+1 lattice QCD model with two flavors and strong coupling

    International Nuclear Information System (INIS)

    Faria da Veiga, Paulo A.; O'Carroll, Michael; Neto, Antonio Francisco

    2005-01-01

    We consider the existence of bound states of two mesons in an imaginary-time formulation of lattice QCD. We analyze an SU(3) theory with two flavors in 2+1 dimensions and two-dimensional spin matrices. For a small hopping parameter and a sufficiently large glueball mass, as a preliminary, we show the existence of isoscalar and isovector mesonlike particles that have isolated dispersion curves (upper gap up to near the two-particle threshold ∼-4lnκ). The corresponding meson masses are equal up to and including O(κ 3 ) and are asymptotically of order -2lnκ-κ 2 . Considering the zero total isospin sector, we show that there is a meson-meson bound state solution to the Bethe-Salpeter equation in a ladder approximation, below the two-meson threshold, and with binding energy of order bκ 2 ≅0.02359κ 2 . In the context of the strong coupling expansion in κ, we show that there are two sources of meson-meson attraction. One comes from a quark-antiquark exchange. This is not a meson exchange, as the spin indices are not those of the meson particle, and we refer to this as a quasimeson exchange. The other arises from gauge field correlations of four overlapping bonds, two positively oriented and two of opposite orientation. Although the exchange part gives rise to a space range-one attractive potential, the main mechanism for the formation of the bound state comes from the gauge contribution. In our lattice Bethe-Salpeter equation approach, this mechanism is manifested by an attractive distance-zero energy-dependent potential. We recall that no bound state appeared in the one-flavor case, where the repulsive effect of Pauli exclusion is stronger

  17. Improving the hadron physics of non-Standard-Model decays: example bounds on R-parity violation

    Science.gov (United States)

    Daub, J. T.; Dreiner, H. K.; Hanhart, C.; Kubis, B.; Meißner, U.-G.

    2013-01-01

    Using the example of selected decays driven by R-parity-violating supersymmetric operators, we demonstrate how strong final-state interactions can be controlled quantitatively with high precision, thus allowing for a more accurate extraction of effective parameters from data. In our examples we focus on the lepton-flavor-violating decays τ → μπ + π - . InR-parityviolationthesecanariseduetotheproductoftwocouplings. We find bounds that are an order of magnitude stronger than previous ones.

  18. Weak radiative decays of the B meson and bounds on M{sub H}± in the Two-Higgs-Doublet Model

    Energy Technology Data Exchange (ETDEWEB)

    Misiak, Mikolaj [University of Warsaw, Faculty of Physics, Institute of Theoretical Physics, Warsaw (Poland); CERN, Theoretical Physics Department, Geneva 23 (Switzerland); Steinhauser, Matthias [Karlsruhe Institute of Technology (KIT), Institut fuer Theoretische Teilchenphysik, Karlsruhe (Germany)

    2017-03-15

    In a recent publication (Abdesselam et al. arXiv:1608.02344), the Belle collaboration updated their analysis of the inclusive weak radiative B-meson decay, including the full dataset of (772 ± 11) x 10{sup 6} B anti B pairs. Their result for the branching ratio is now below the Standard Model prediction (Misiak et al. Phys Rev Lett 114:221801, 2015, Czakon et al. JHEP 1504:168, 2015), though it remains consistent with it. However, bounds on the charged Higgs boson mass in the Two-Higgs-Doublet Model get affected in a significant manner. In the so-called Model II, the 95% C.L. lower bound on M{sub H}± is now in the 570-800 GeV range, depending quite sensitively on the method applied for its determination. Our present note is devoted to presenting and discussing the updated bounds, as well as to clarifying several ambiguities that one might encounter in evaluating them. One of such ambiguities stems from the photon energy cutoff choice, which deserves re-consideration in view of the improved experimental accuracy. (orig.)

  19. Viscosity of bound water and model of proton relaxation in fine-dispersed substances at the presence of adsorbed paramagnetic ions

    International Nuclear Information System (INIS)

    Fedodeev, V.I.

    1975-01-01

    A microviscosity model of proton relaxation in pure liquids and in solutions of paramagnetic ions is examined. It is shown that the influence of adsorbed paramagnetic centers on proton relaxation in finely dispersed substances is significantly weaker than in solutions. A 'two-phase' relaxation model is used in determining the parameters of the bound liquid (water) using nuclear magnetic resonance data. The relations obtained with the model are used to compute the viscosity of water in clay. The value is of the same order of magnitude as that obtained by other methods

  20. Viscosity of bound water and model of proton relaxation in fine-dispersed substances at the presence of adsorbed paramagnetic ions

    Energy Technology Data Exchange (ETDEWEB)

    Fedodeev, V I

    1975-09-01

    A microviscosity model of proton relaxation in pure liquids and in solutions of paramagnetic ions is examined. It is shown that the influence of adsorbed paramagnetic centers on proton relaxation in finely dispersed substances is significantly weaker than in solutions. A 'two-phase' relaxation model is used in determining the parameters of the bound liquid (water) using nuclear magnetic resonance data. The relations obtained with the model are used to compute the viscosity of water in clay. The value is of the same order of magnitude as that obtained by other methods.

  1. Diagnostic information in compliance checking

    NARCIS (Netherlands)

    Ramezani Taghiabadi, E.; Fahland, D.; Aalst, van der W.M.P.

    2012-01-01

    Compliance checking is gaining importance as today's organizations need to show that operational processes are executed in a controlled manner while satisfying predefined (legal) requirements. Deviations may be costly and expose the organization to severe risks. Compliance checking is of growing

  2. Type Checking with XML Schema in XACT

    DEFF Research Database (Denmark)

    Kirkegaard, Christian; Møller, Anders

    to support XML Schema as type formalism. The technique is able to model advanced features, such as type derivations and overloaded local element declarations, and also datatypes of attribute values and character data. Moreover, we introduce optional type annotations to improve modularity of the type checking...

  3. checkCIF/PLATON report Datablock: shelxl

    Indian Academy of Sciences (India)

    6 ALERT level G = General information/check it is not something unexpected. 1 ALERT type 1 CIF construction/syntax error, inconsistent or missing data. 15 ALERT type 2 Indicator that the structure model may be wrong or deficient. 9 ALERT type 3 Indicator that the structure quality may be low. 1 ALERT type 4 Improvement, ...

  4. Fuzzy upper bounds and their applications

    Energy Technology Data Exchange (ETDEWEB)

    Soleimani-damaneh, M. [Department of Mathematics, Faculty of Mathematical Science and Computer Engineering, Teacher Training University, 599 Taleghani Avenue, Tehran 15618 (Iran, Islamic Republic of)], E-mail: soleimani_d@yahoo.com

    2008-04-15

    This paper considers the concept of fuzzy upper bounds and provides some relevant applications. Considering a fuzzy DEA model, the existence of a fuzzy upper bound for the objective function of the model is shown and an effective approach to solve that model is introduced. Some dual interpretations are provided, which are useful for practical purposes. Applications of the concept of fuzzy upper bounds in two physical problems are pointed out.

  5. Scattering by bound nucleons

    International Nuclear Information System (INIS)

    Tezuka, Hirokazu.

    1984-10-01

    Scattering of a particle by bound nucleons is discussed. Effects of nucleons that are bound in a nucleus are taken as a structure function. The way how to calculate the structure function is given. (author)

  6. The Derivation of the Stability Bound of the Feedback ANC System That Has an Error in the Estimated Secondary Path Model

    Directory of Open Access Journals (Sweden)

    Seong-Pil Moon

    2018-01-01

    Full Text Available This paper investigates the stability problem of the feedback active noise control (ANC system, which can be caused by the modeling error of the electro-acoustic path estimation in its feedback mechanism. A stability analysis method is proposed to obtain the stability bound as a form of a closed-form equation in terms of the delay error length of the secondary path, the ANC filter length, and the primary noise frequency. In the proposed method, the system’s open loop magnitude and phase response equations are separately exploited and approximated within the Nyquist stability criterion. The stability bound of the proposed method is verified by comparing both the original Nyquist stability condition and the simulation results.

  7. Scram system with continuos check

    International Nuclear Information System (INIS)

    Rodriguez Sacco, Walter.

    1976-02-01

    The equipment described pretends to be a further step to the use of integrated circuits in nuclear instrumentation, considering that this type of control was traditionally carried out on the bases of electromechanical elements. A continuous self-check method has been applied in accordance with the high reliability requiered for this type of equipments. The developed equipment fulfils the condition that any deficiency in its component elements, causes an anormal self-detected operation. The equipment covers two systems: the Scram one, that includes the sequence generator-detector, the rods check and scram chain, and the Check system that uses pulses from the sequence detector. (author) [es

  8. Alignment based precision checking

    NARCIS (Netherlands)

    Adriansyah, A.; Munoz-Gama, J.; Carmona, J.; Dongen, van B.F.; Aalst, van der W.M.P.; La Rosa, M.; Soffer, P.

    2013-01-01

    Most organizations have process models describing how cases need to be handled. In fact, legislation and standardization (cf. the Sarbanes-Oxley Act, the Basel II Accord, and the ISO 9000 family of standards) are forcing organizations to document their processes. These processes are often not

  9. Soluble and cell wall-bound phenolic acids and ferulic acid dehydrodimers in rye flour and five bread model systems: insight into mechanisms of improved availability.

    Science.gov (United States)

    Dynkowska, Wioletta M; Cyran, Malgorzata R; Ceglińska, Alicja

    2015-03-30

    The bread-making process influences bread components, including phenolics that significantly contribute to its antioxidant properties. Five bread model systems made from different rye cultivars were investigated to compare their impact on concentration of ethanol-soluble (free and ester-bound) and insoluble phenolics. Breads produced by a straight dough method without acid addition (A) and three-stage sourdough method with 12 h native starter preparation (C) exhibited the highest, genotype-dependent concentrations of free phenolic acids. Dough acidification by direct acid addition (method B) or by gradual production during prolonged starter fermentation (24 and 48 h, for methods D and E) considerably decreased their level. However, breads B were enriched in soluble ester-bound fraction. Both direct methods, despite substantial differences in dough pH, caused a similar increase in the amount of insoluble ester-bound fraction. The contents of phenolic fractions in rye bread were positively related to activity level of feruloyl esterase and negatively to those of arabinoxylan-hydrolysing enzymes in wholemeal flour. The solubility of rye bread phenolics may be enhanced by application of a suitable bread-making procedure with respect to rye cultivar, as the mechanisms of this process are also governed by a response of an individual genotype with specific biochemical profile. © 2014 The Authors. Journal of the Science of Food and Agriculture published by John Wiley & Sons Ltd on behalf of Society of Chemical Industry.

  10. Treasury Check Verification Query (TCVQ)

    Data.gov (United States)

    Social Security Administration — The TCVQ system determines the SSN of an individual whose check has been returned to a local field office. The FO is able to request this information via the TCVQ...

  11. Do alcohol compliance checks decrease underage sales at neighboring establishments?

    Science.gov (United States)

    Erickson, Darin J; Smolenski, Derek J; Toomey, Traci L; Carlin, Bradley P; Wagenaar, Alexander C

    2013-11-01

    Underage alcohol compliance checks conducted by law enforcement agencies can reduce the likelihood of illegal alcohol sales at checked alcohol establishments, and theory suggests that an alcohol establishment that is checked may warn nearby establishments that compliance checks are being conducted in the area. In this study, we examined whether the effects of compliance checks diffuse to neighboring establishments. We used data from the Complying with the Minimum Drinking Age trial, which included more than 2,000 compliance checks conducted at more than 900 alcohol establishments. The primary outcome was the sale of alcohol to a pseudo-underage buyer without the need for age identification. A multilevel logistic regression was used to model the effect of a compliance check at each establishment as well as the effect of compliance checks at neighboring establishments within 500 m (stratified into four equal-radius concentric rings), after buyer, license, establishment, and community-level variables were controlled for. We observed a decrease in the likelihood of establishments selling alcohol to underage youth after they had been checked by law enforcement, but these effects quickly decayed over time. Establishments that had a close neighbor (within 125 m) checked in the past 90 days were also less likely to sell alcohol to young-appearing buyers. The spatial effect of compliance checks on other establishments decayed rapidly with increasing distance. Results confirm the hypothesis that the effects of police compliance checks do spill over to neighboring establishments. These findings have implications for the development of an optimal schedule of police compliance checks.

  12. Checking the mathematical model of the radionuclides migration velocity in the system: bitumen-spent ion-exchange resins; Provera matematickog modela za brzinu izluzivanja radionukluda u sistemu: bitumen-istrosene jonoizmenjivacke smole

    Energy Technology Data Exchange (ETDEWEB)

    Peric, A; Plecas, I; Kostadinovic, A [Institute of Nuclear Sciences VINCA, Belgrade (Yugoslavia)

    1992-07-01

    Immobilization process of the spent ion-exchange resins was performed in bitumen matrix. from the twelve investigated formulations, one was chosen: BIT 200-40% I.I. resin, on which the mathematical model of the migration velocity for radionuclides Co-60 and Cs-137 was checked. Behaviour of the migration velocity trend obtained by mathematical modeling was compared with the measured results. Leaching level trends obtained by measurements and by mathematical modeling of the process do not show great differences in the nearly two years of investigation, and pointed out the stability of the bitumenized rad-waste form in the relatively relevant period of time. (author)

  13. Simulation bounds for system availability

    International Nuclear Information System (INIS)

    Tietjen, G.L.; Waller, R.A.

    1976-01-01

    System availability is a dominant factor in the practicality of nuclear power electrical generating plants. A proposed model for obtaining either lower bounds or interval estimates on availability uses observed data on ''n'' failure-to-repair cycles of the system to estimate the parameters in the time-to-failure and time-to-repair models. These estimates are then used in simulating failure/repair cycles of the system. The availability estimate is obtained for each of 5000 samples of ''n'' failure/repair cycles to form a distribution of estimates. Specific percentile points of those simulated distributions are selected as lower simulation bounds or simulation interval bounds for the system availability. The method is illustrated with operational data from two nuclear plants for which an exponential time-to-failure and a lognormal time-to-repair are assumed

  14. Next-generation nozzle check valve significantly reduces operating costs

    Energy Technology Data Exchange (ETDEWEB)

    Roorda, O. [SMX International, Toronto, ON (Canada)

    2009-01-15

    Check valves perform an important function in preventing reverse flow and protecting plant and mechanical equipment. However, the variety of different types of valves and extreme differences in performance even within one type can change maintenance requirements and life cycle costs, amounting to millions of dollars over the typical 15-year design life of piping components. A next-generation non-slam nozzle check valve which prevents return flow has greatly reduced operating costs by protecting the mechanical equipment in a piping system. This article described the check valve varieties such as the swing check valve, a dual-plate check valve, and nozzle check valves. Advancements in optimized design of a non-slam nozzle check valve were also discussed, with particular reference to computer flow modelling such as computational fluid dynamics; computer stress modelling such as finite element analysis; and flow testing (using rapid prototype development and flow loop testing), both to improve dynamic performance and reduce hydraulic losses. The benefits of maximized dynamic performance and minimized pressure loss from the new designed valve were also outlined. It was concluded that this latest non-slam nozzle check valve design has potential applications in natural gas, liquefied natural gas, and oil pipelines, including subsea applications, as well as refineries, and petrochemical plants among others, and is suitable for horizontal and vertical installation. The result of this next-generation nozzle check valve design is not only superior performance, and effective protection of mechanical equipment but also minimized life cycle costs. 1 fig.

  15. Braneworld black holes and entropy bounds

    Directory of Open Access Journals (Sweden)

    Y. Heydarzade

    2018-01-01

    Full Text Available The Bousso's D-bound entropy for the various possible black hole solutions on a 4-dimensional brane is checked. It is found that the D-bound entropy here is apparently different from that of obtained for the 4-dimensional black hole solutions. This difference is interpreted as the extra loss of information, associated to the extra dimension, when an extra-dimensional black hole is moved outward the observer's cosmological horizon. Also, it is discussed that N-bound entropy is hold for the possible solutions here. Finally, by adopting the recent Bohr-like approach to black hole quantum physics for the excited black holes, the obtained results are written also in terms of the black hole excited states.

  16. One-loop corrections to the perturbative unitarity bounds in the CP-conserving two-Higgs doublet model with a softly broken ℤ{sub 2} symmetry

    Energy Technology Data Exchange (ETDEWEB)

    Grinstein, Benjamín [Department of Physics, University of California, San Diego, 9500 Gilman Drive, La Jolla, CA 92093 (United States); Murphy, Christopher W. [Scuola Normale Superiore, Piazza dei Cavalieri 7, Pisa 56126 (Italy); Uttayarat, Patipan [Department of Physics, Srinakharinwirot University, Wattana, Bangkok 10110 (Thailand)

    2016-06-13

    We compute all of the one-loop corrections that are enhanced, O(λ{sub i}λ{sub j}/16π{sup 2}), in the limit s≫|λ{sub i}|v{sup 2}≫M{sub W}{sup 2}, s≫m{sub 12}{sup 2} to all the 2→2 longitudinal vector boson and Higgs boson scattering amplitudes in the CP-conserving two-Higgs doublet model with a softly broken ℤ{sub 2} symmetry. In the two simplified scenarios we study, the typical bound we find is |λ{sub i}(s)|⪅4.

  17. Some Improved Nonperturbative Bounds for Fermionic Expansions

    Energy Technology Data Exchange (ETDEWEB)

    Lohmann, Martin, E-mail: marlohmann@gmail.com [Universita di Roma Tre, Dipartimento di Matematica (Italy)

    2016-06-15

    We reconsider the Gram-Hadamard bound as it is used in constructive quantum field theory and many body physics to prove convergence of Fermionic perturbative expansions. Our approach uses a recursion for the amplitudes of the expansion, discovered in a model problem by Djokic (2013). It explains the standard way to bound the expansion from a new point of view, and for some of the amplitudes provides new bounds, which avoid the use of Fourier transform, and are therefore superior to the standard bounds for models like the cold interacting Fermi gas.

  18. Photon virtual bound state

    International Nuclear Information System (INIS)

    Inoue, J.; Ohtaka, K.

    2004-01-01

    We study virtual bound states in photonics, which are a vectorial extension of electron virtual bound states. The condition for these states is derived. It is found that the Mie resonant state which satisfies the condition that the size parameter is less than the angular momentum should be interpreted as a photon virtual bound state. In order to confirm the validity of the concept, we compare the photonic density of states, the width of which represents the lifetime of the photon virtual bound states, with numerical results

  19. The DMM Bound

    DEFF Research Database (Denmark)

    Emiris, Ioannis Z.; Mourrain, Bernard; Tsigaridas, Elias

    2010-01-01

    ) resultant by means of mixed volume, as well as recent advances on aggregate root bounds for univariate polynomials, and are applicable to arbitrary positive dimensional systems. We improve upon Canny's gap theorem [7] by a factor of O(dn-1), where d bounds the degree of the polynomials, and n is the number...... bound on the number of steps that subdivision-based algorithms perform in order to isolate all real roots of a polynomial system. This leads to the first complexity bound of Milne's algorithm [22] in 2D....

  20. Four-quark bound states

    International Nuclear Information System (INIS)

    Zouzou, S.

    1986-01-01

    In the framework of simple non-relativistic potential models, we examine the system consisting of two quarks and two antiquarks with equal or unequal masses. We search for possible bound states below the threshold for the spontaneous dissociation into two mesons. We solve the four body problem by empirical or systematic variational methods and we include the virtual meson-meson components of the wave function. With standard two-body potentials, there is no proliferation of multiquarks. With unequal quark masses, we obtain however exotic (anti Qanti Qqq) bound states with a baryonic antidiquark-quark-quark structure very analogous to the heavy flavoured (Q'qq) baryons. (orig.)