WorldWideScience

Sample records for integrating rewrite rules

  1. An Efficient Compiler for Weighted Rewrite Rules

    OpenAIRE

    Mohri, Mehryar; Sproat, Richard

    1996-01-01

    Context-dependent rewrite rules are used in many areas of natural language and speech processing. Work in computational phonology has demonstrated that, given certain conditions, such rewrite rules can be represented as finite-state transducers (FSTs). We describe a new algorithm for compiling rewrite rules into FSTs. We show the algorithm to be simpler and more efficient than existing algorithms. Further, many of our applications demand the ability to compile weighted rules into weighted FST...

  2. Obtaining a minimal set of rewrite rules

    CSIR Research Space (South Africa)

    Davel, M

    2005-11-01

    Full Text Available In this paper the authors describe a new approach to rewrite rule extraction and analysis, using Minimal Representation Graphs. This approach provides a mechanism for obtaining the smallest possible rule set – within a context-dependent rewrite rule...

  3. Parallel Execution of Multi Set Constraint Rewrite Rules

    DEFF Research Database (Denmark)

    Sulzmann, Martin; Lam, Edmund Soon Lee

    2008-01-01

    that the underlying constraint rewrite implementation executes rewrite steps in parallel on increasingly popular becoming multi-core architectures. We design and implement efficient algorithms which allow for the parallel execution of multi-set constraint rewrite rules. Our experiments show that we obtain some......Multi-set constraint rewriting allows for a highly parallel computational model and has been used in a multitude of application domains such as constraint solving, agent specification etc. Rewriting steps can be applied simultaneously as long as they do not interfere with each other.We wish...

  4. Pattern graph rewrite systems

    Directory of Open Access Journals (Sweden)

    Aleks Kissinger

    2014-03-01

    Full Text Available String diagrams are a powerful tool for reasoning about physical processes, logic circuits, tensor networks, and many other compositional structures. Dixon, Duncan and Kissinger introduced string graphs, which are a combinatoric representations of string diagrams, amenable to automated reasoning about diagrammatic theories via graph rewrite systems. In this extended abstract, we show how the power of such rewrite systems can be greatly extended by introducing pattern graphs, which provide a means of expressing infinite families of rewrite rules where certain marked subgraphs, called !-boxes ("bang boxes", on both sides of a rule can be copied any number of times or removed. After reviewing the string graph formalism, we show how string graphs can be extended to pattern graphs and how pattern graphs and pattern rewrite rules can be instantiated to concrete string graphs and rewrite rules. We then provide examples demonstrating the expressive power of pattern graphs and how they can be applied to study interacting algebraic structures that are central to categorical quantum mechanics.

  5. Let the Rewriter Beware.

    Science.gov (United States)

    Charrow, Veda R.

    Translating legal and bureaucratic language into plain, comprehensible English is not amenable to simple rules and procedures. Rewriting comprehensibly requires specialized knowledge about language and an awareness of a number of misconceptions and pitfalls. This paper discusses what not to do in rewriting, based upon rewritten documents presently…

  6. Nominal completion for rewrite systems with binders

    OpenAIRE

    Fernández, Maribel; Rubio Gimeno, Alberto

    2012-01-01

    We design a completion procedure for nominal rewriting systems, based on a generalisation of the recursive path ordering to take into account alpha equivalence. Nominal rewriting generalises first-order rewriting by providing support for the specification of binding operators. Completion of rewriting systems with binders is a notably difficult problem; the completion procedure presented in this paper is the first to deal with binders in rewrite rules. Peer Reviewed

  7. Complexity Analysis of Precedence Terminating Infinite Graph Rewrite Systems

    Directory of Open Access Journals (Sweden)

    Naohi Eguchi

    2015-05-01

    Full Text Available The general form of safe recursion (or ramified recurrence can be expressed by an infinite graph rewrite system including unfolding graph rewrite rules introduced by Dal Lago, Martini and Zorzi, in which the size of every normal form by innermost rewriting is polynomially bounded. Every unfolding graph rewrite rule is precedence terminating in the sense of Middeldorp, Ohsaki and Zantema. Although precedence terminating infinite rewrite systems cover all the primitive recursive functions, in this paper we consider graph rewrite systems precedence terminating with argument separation, which form a subclass of precedence terminating graph rewrite systems. We show that for any precedence terminating infinite graph rewrite system G with a specific argument separation, both the runtime complexity of G and the size of every normal form in G can be polynomially bounded. As a corollary, we obtain an alternative proof of the original result by Dal Lago et al.

  8. Rewriting and suppressing UMLS terms for improved biomedical term identification

    Directory of Open Access Journals (Sweden)

    Hettne Kristina M

    2010-03-01

    Full Text Available Abstract Background Identification of terms is essential for biomedical text mining.. We concentrate here on the use of vocabularies for term identification, specifically the Unified Medical Language System (UMLS. To make the UMLS more suitable for biomedical text mining we implemented and evaluated nine term rewrite and eight term suppression rules. The rules rely on UMLS properties that have been identified in previous work by others, together with an additional set of new properties discovered by our group during our work with the UMLS. Our work complements the earlier work in that we measure the impact on the number of terms identified by the different rules on a MEDLINE corpus. The number of uniquely identified terms and their frequency in MEDLINE were computed before and after applying the rules. The 50 most frequently found terms together with a sample of 100 randomly selected terms were evaluated for every rule. Results Five of the nine rewrite rules were found to generate additional synonyms and spelling variants that correctly corresponded to the meaning of the original terms and seven out of the eight suppression rules were found to suppress only undesired terms. Using the five rewrite rules that passed our evaluation, we were able to identify 1,117,772 new occurrences of 14,784 rewritten terms in MEDLINE. Without the rewriting, we recognized 651,268 terms belonging to 397,414 concepts; with rewriting, we recognized 666,053 terms belonging to 410,823 concepts, which is an increase of 2.8% in the number of terms and an increase of 3.4% in the number of concepts recognized. Using the seven suppression rules, a total of 257,118 undesired terms were suppressed in the UMLS, notably decreasing its size. 7,397 terms were suppressed in the corpus. Conclusions We recommend applying the five rewrite rules and seven suppression rules that passed our evaluation when the UMLS is to be used for biomedical term identification in MEDLINE. A software

  9. Strategic Port Graph Rewriting: An Interactive Modelling and Analysis Framework

    Directory of Open Access Journals (Sweden)

    Maribel Fernández

    2014-07-01

    Full Text Available We present strategic portgraph rewriting as a basis for the implementation of visual modelling and analysis tools. The goal is to facilitate the specification, analysis and simulation of complex systems, using port graphs. A system is represented by an initial graph and a collection of graph rewriting rules, together with a user-defined strategy to control the application of rules. The strategy language includes constructs to deal with graph traversal and management of rewriting positions in the graph. We give a small-step operational semantics for the language, and describe its implementation in the graph transformation and visualisation tool PORGY.

  10. Undecidability Results for Bisimilarity on Prefix Rewrite Systems

    DEFF Research Database (Denmark)

    Jancar, Petr; Srba, Jiri

    2006-01-01

    We answer an open question related to bisimilarity checking on labelled transition systems generated by prefix rewrite rules on words. Stirling (1996, 1998) proved the decidability of bisimilarity for normed pushdown processes. This result was substantially extended by Senizergues (1998, 2005) who...... language) was left open; this was repeatedly indicated by both Stirling and Senizergues. Here we answer the question negatively, i.e., we show undecidability of bisimilarity on Type -1 systems, even in the normed case. We complete the picture by considering classes of systems that use rewrite rules...

  11. Synthesis for Structure Rewriting Systems

    Science.gov (United States)

    Kaiser, Łukasz

    The description of a single state of a modelled system is often complex in practice, but few procedures for synthesis address this problem in depth. We study systems in which a state is described by an arbitrary finite structure, and changes of the state are represented by structure rewriting rules, a generalisation of term and graph rewriting. Both the environment and the controller are allowed to change the structure in this way, and the question we ask is how a strategy for the controller that ensures a given property can be synthesised.

  12. SPARQL Query Re-writing Using Partonomy Based Transformation Rules

    Science.gov (United States)

    Jain, Prateek; Yeh, Peter Z.; Verma, Kunal; Henson, Cory A.; Sheth, Amit P.

    Often the information present in a spatial knowledge base is represented at a different level of granularity and abstraction than the query constraints. For querying ontology's containing spatial information, the precise relationships between spatial entities has to be specified in the basic graph pattern of SPARQL query which can result in long and complex queries. We present a novel approach to help users intuitively write SPARQL queries to query spatial data, rather than relying on knowledge of the ontology structure. Our framework re-writes queries, using transformation rules to exploit part-whole relations between geographical entities to address the mismatches between query constraints and knowledge base. Our experiments were performed on completely third party datasets and queries. Evaluations were performed on Geonames dataset using questions from National Geographic Bee serialized into SPARQL and British Administrative Geography Ontology using questions from a popular trivia website. These experiments demonstrate high precision in retrieval of results and ease in writing queries.

  13. Symbol manipulation and rule learning in spiking neuronal networks.

    Science.gov (United States)

    Fernando, Chrisantha

    2011-04-21

    It has been claimed that the productivity, systematicity and compositionality of human language and thought necessitate the existence of a physical symbol system (PSS) in the brain. Recent discoveries about temporal coding suggest a novel type of neuronal implementation of a physical symbol system. Furthermore, learning classifier systems provide a plausible algorithmic basis by which symbol re-write rules could be trained to undertake behaviors exhibiting systematicity and compositionality, using a kind of natural selection of re-write rules in the brain, We show how the core operation of a learning classifier system, namely, the replication with variation of symbol re-write rules, can be implemented using spike-time dependent plasticity based supervised learning. As a whole, the aim of this paper is to integrate an algorithmic and an implementation level description of a neuronal symbol system capable of sustaining systematic and compositional behaviors. Previously proposed neuronal implementations of symbolic representations are compared with this new proposal. Copyright © 2011 Elsevier Ltd. All rights reserved.

  14. Rewriting Logic Semantics of a Plan Execution Language

    Science.gov (United States)

    Dowek, Gilles; Munoz, Cesar A.; Rocha, Camilo

    2009-01-01

    The Plan Execution Interchange Language (PLEXIL) is a synchronous language developed by NASA to support autonomous spacecraft operations. In this paper, we propose a rewriting logic semantics of PLEXIL in Maude, a high-performance logical engine. The rewriting logic semantics is by itself a formal interpreter of the language and can be used as a semantic benchmark for the implementation of PLEXIL executives. The implementation in Maude has the additional benefit of making available to PLEXIL designers and developers all the formal analysis and verification tools provided by Maude. The formalization of the PLEXIL semantics in rewriting logic poses an interesting challenge due to the synchronous nature of the language and the prioritized rules defining its semantics. To overcome this difficulty, we propose a general procedure for simulating synchronous set relations in rewriting logic that is sound and, for deterministic relations, complete. We also report on the finding of two issues at the design level of the original PLEXIL semantics that were identified with the help of the executable specification in Maude.

  15. Specification and Verification of Web Applications in Rewriting Logic

    Science.gov (United States)

    Alpuente, María; Ballis, Demis; Romero, Daniel

    This paper presents a Rewriting Logic framework that formalizes the interactions between Web servers and Web browsers through a communicating protocol abstracting HTTP. The proposed framework includes a scripting language that is powerful enough to model the dynamics of complex Web applications by encompassing the main features of the most popular Web scripting languages (e.g. PHP, ASP, Java Servlets). We also provide a detailed characterization of browser actions (e.g. forward/backward navigation, page refresh, and new window/tab openings) via rewrite rules, and show how our models can be naturally model-checked by using the Linear Temporal Logic of Rewriting (LTLR), which is a Linear Temporal Logic specifically designed for model-checking rewrite theories. Our formalization is particularly suitable for verification purposes, since it allows one to perform in-depth analyses of many subtle aspects related to Web interaction. Finally, the framework has been completely implemented in Maude, and we report on some successful experiments that we conducted by using the Maude LTLR model-checker.

  16. Termination of cycle rewriting

    NARCIS (Netherlands)

    Zantema, H.; König, B.; Bruggink, H.J.S.; Dowek, G.

    2014-01-01

    String rewriting can not only be applied on strings, but also on cycles and even on general graphs. In this paper we investigate termination of string rewriting applied on cycles, shortly denoted as cycle rewriting, which is a strictly stronger requirement than termination on strings. Most

  17. Termination of canonical context-sensitive rewriting and productivity of rewrite systems

    Directory of Open Access Journals (Sweden)

    Salvador Lucas

    2015-12-01

    Full Text Available Termination of programs, i.e., the absence of infinite computations, ensures the existence of normal forms for all initial expressions, thus providing an essential ingredient for the definition of a normalization semantics for functional programs. In lazy functional languages, though, infinite data structures are often delivered as the outcome of computations. For instance, the list of all prime numbers can be returned as a neverending stream of numerical expressions or data structures. If such streams are allowed, requiring termination is hopeless. In this setting, the notion of productivity can be used to provide an account of computations with infinite data structures, as it "captures the idea of computability, of progress of infinite-list programs" (B.A. Sijtsma, On the Productivity of Recursive List Definitions, ACM Transactions on Programming Languages and Systems 11(4:633-649, 1989. However, in the realm of Term Rewriting Systems, which can be seen as (first-order, untyped, unconditional functional programs, termination of Context-Sensitive Rewriting (CSR has been showed equivalent to productivity of rewrite systems through appropriate transformations. In this way, tools for proving termination of CSR can be used to prove productivity. In term rewriting, CSR is the restriction of rewriting that arises when reductions are allowed on selected arguments of function symbols only. In this paper we show that well-known results about the computational power of CSR are useful to better understand the existing connections between productivity of rewrite systems and termination of CSR, and also to obtain more powerful techniques to prove productivity of rewrite systems.

  18. Weak convergence and uniform normalization in infinitary rewriting

    DEFF Research Database (Denmark)

    Simonsen, Jakob Grue

    2010-01-01

    the starkly surprising result that for any orthogonal system with finitely many rules, the system is weakly normalizing under weak convergence if{f} it is strongly normalizing under weak convergence if{f} it is weakly normalizing under strong convergence if{f} it is strongly normalizing under strong...... convergence. As further corollaries, we derive a number of new results for weakly convergent rewriting: Systems with finitely many rules enjoy unique normal forms, and acyclic orthogonal systems are confluent. Our results suggest that it may be possible to recover some of the positive results for strongly...

  19. A Modal Logic for Termgraph Rewriting

    OpenAIRE

    Balbiani, Ph.; Echahed, R.; Herzig, A.

    2010-01-01

    We propose a modal logic tailored to describe graph transformations and discuss some of its properties. We focus on a particular class of graphs called termgraphs. They are first-order terms augmented with sharing and cycles. Termgraphs allow one to describe classical data-structures (possibly with pointers) such as doubly-linked lists, circular lists etc. We show how the proposed logic can faithfully describe (i) termgraphs as well as (ii) the application of a termgraph rewrite rule (i.e. ma...

  20. Constructs for Programming with Graph Rewrites

    OpenAIRE

    Rodgers, Peter

    2000-01-01

    Graph rewriting is becoming increasingly popular as a method for programming with graph based data structures. We present several modifications to a basic serial graph rewriting paradigm and discuss how they improve coding programs in the Grrr graph rewriting programming language. The constructs we present are once only nodes, attractor nodes and single match rewrites. We illustrate the operation of the constructs by example. The advantages of adding these new rewrite modifiers is to reduce t...

  1. Pragmatic Graph Rewriting Modifications

    OpenAIRE

    Rodgers, Peter; Vidal, Natalia

    1999-01-01

    We present new pragmatic constructs for easing programming in visual graph rewriting programming languages. The first is a modification to the rewriting process for nodes the host graph, where nodes specified as 'Once Only' in the LHS of a rewrite match at most once with a corresponding node in the host graph. This reduces the previously common use of tags to indicate the progress of matching in the graph. The second modification controls the application of LHS graphs, where those specified a...

  2. Rewriting Modulo SMT and Open System Analysis

    Science.gov (United States)

    Rocha, Camilo; Meseguer, Jose; Munoz, Cesar

    2014-01-01

    This paper proposes rewriting modulo SMT, a new technique that combines the power of SMT solving, rewriting modulo theories, and model checking. Rewriting modulo SMT is ideally suited to model and analyze infinite-state open systems, i.e., systems that interact with a non-deterministic environment. Such systems exhibit both internal non-determinism, which is proper to the system, and external non-determinism, which is due to the environment. In a reflective formalism, such as rewriting logic, rewriting modulo SMT can be reduced to standard rewriting. Hence, rewriting modulo SMT naturally extends rewriting-based reachability analysis techniques, which are available for closed systems, to open systems. The proposed technique is illustrated with the formal analysis of: (i) a real-time system that is beyond the scope of timed-automata methods and (ii) automatic detection of reachability violations in a synchronous language developed to support autonomous spacecraft operations.

  3. Meaningless terms in rewriting

    NARCIS (Netherlands)

    Kennaway, R.; Oostrom, V. van; Vries, F.-J. de

    We present an axiomatic approach to the concept of meaninglessness in finite and transfinite term rewriting and lambda calculus. We justify our axioms in several ways. They can be intuitively justified from the viewpoint of rewriting as computation. They are shown to imply important properties

  4. Binary decision diagrams by shared rewriting

    NARCIS (Netherlands)

    Pol, J. van de; Zantema, H.

    2000-01-01

    BDDs provide an established technique for propositional formula manipulation. In this paper we re-develope the basic BDD theory using standard rewriting techniques. Since a BDD is a DAG instead of a tree we need a notion of shared rewriting and develope appropriate theory. A rewriting system is

  5. The Pi-0-2-Completeness of most of the Properties of Rewriting You Care About (and Productivity)

    DEFF Research Database (Denmark)

    Simonsen, Jakob Grue

    2009-01-01

    Most of the standard pleasant properties of term rewriting systems are undecidable; to wit: local confluence, confluence, normalization, termination, and completeness. Mere undecidability is insufficient to rule out a number of possibly useful properties: For instance, if the set of normalizing...... term rewriting systems were recursively enumerable, there would be a program yielding “yes” in finite time if applied to any normalizing term rewriting system. The contribution of this paper is to show (the uniform version of) each member of the list of properties above (as well as the property...... of being a productive specification of a stream) complete for the class $\\Pi^0_2$. Thus, there is neither a program that can enumerate the set of rewriting systems enjoying any one of the properties, nor is there a program enumerating the set of systems that do not. For normalization and termination we...

  6. Increasing the rewriting speed of optical rewritable e-paper by selecting proper liquid crystals

    International Nuclear Information System (INIS)

    Geng Yu; Sun Jiatong; Kwok Hoi Sing; Murauski Anatoli; Chigrinov Vladimir

    2012-01-01

    The effect of interaction between liquid crystal (LC) and photoalignment material on the speed of optical rewriting process is investigated. The theoretical analysis shows that a smaller frank elastic constant K 22 of liquid crystal corresponds to a larger twist angle, which gives rise to a larger rewriting speed. Six different LC cells with the same boundary conditions (one substrate is covered with rubbed polyimide (PI) and the other with photo sensitive rewritable sulfuric dye 1(SD1)) are tested experimentally under the same illumination intensity (450 nm, 80 mW/cm 2 ). The results demonstrate that with a suitable liquid crystal, the LC optical rewriting speed for e-paper application can be obviously improved. For two well known LC materials E7 (K 22 is larger) and 5CB (K 22 is smaller), they require 11 s and 6 s corresponding to change alignment direction for generating image information. (general)

  7. Parallel object-oriented term rewriting : the booleans

    NARCIS (Netherlands)

    Rodenburg, P.H.; Vrancken, J.L.M.

    As a first case study in parallel object-oriented term rewriting, we give two implementations of term rewriting algorithms for boolean terms, using the parallel object-oriented features of the language Pool-T. The term rewriting systems are specified in the specification formalism

  8. Strategy-Driven Exploration for Rule-Based Models of Biochemical Systems with Porgy

    OpenAIRE

    Andrei , Oana; Fernández , Maribel; Kirchner , Hélène; Pinaud , Bruno

    2016-01-01

    This paper presents Porgy – an interactive visual environment for rule-based modelling of biochemical systems. We model molecules and molecule interactions as port graphs and port graph rewrite rules, respectively. We use rewriting strategies to control which rules to apply, and where and when to apply them. Our main contributions to rule-based modelling of biochemical systems lie in the strategy language and the associated visual and interactive features offered by Porgy. These features faci...

  9. Hydrochromic molecular switches for water-jet rewritable paper

    Science.gov (United States)

    Sheng, Lan; Li, Minjie; Zhu, Shaoyin; Li, Hao; Xi, Guan; Li, Yong-Gang; Wang, Yi; Li, Quanshun; Liang, Shaojun; Zhong, Ke; Zhang, Sean Xiao-An

    2014-01-01

    The days of rewritable paper are coming, printers of the future will use water-jet paper. Although several kinds of rewritable paper have been reported, practical usage of them is rare. Herein, a new rewritable paper for ink-free printing is proposed and demonstrated successfully by using water as the sole trigger to switch hydrochromic dyes on solid media. Water-jet prints with various colours are achieved with a commercial desktop printer based on these hydrochromic rewritable papers. The prints can be erased and rewritten dozens of times with no significant loss in colour quality. This rewritable paper is promising in that it can serve an eco-friendly information display to meet the increasing global needs for environmental protection.

  10. Infinitary Rewriting - Theory and Applications

    DEFF Research Database (Denmark)

    Bahr, Patrick

    2009-01-01

    Infinitary rewriting generalises usual finitary rewriting by providing infinite reduction sequences with a notion of convergence. The idea of -- at least conceptually -- assigning a meaning to infinite derivations is well-known, for example, from lazy functional programming or from process calculi...... that are used to formalise infinite reduction sequences: The well-established metric approach as well as an alternative approach using partial orders. Both methods together with the consequent infinitary versions of confluence and termination properties are analysed on an abstract level. Based on this, we argue...

  11. Values Education through Aggadic Stories: The Didactic Rewriter as Interpreter

    Science.gov (United States)

    Weinstein, Sara

    2016-01-01

    Didactic rewrites of aggadic stories are an important resource in values education. This study, geared primarily toward teachers involved in choosing curricular materials, investigates how the didactic rewriter actually becomes an interpreter, rather than a mere transmitter, of the original text. The personal values of the rewriters can influence…

  12. Simulation and Verification of Synchronous Set Relations in Rewriting Logic

    Science.gov (United States)

    Rocha, Camilo; Munoz, Cesar A.

    2011-01-01

    This paper presents a mathematical foundation and a rewriting logic infrastructure for the execution and property veri cation of synchronous set relations. The mathematical foundation is given in the language of abstract set relations. The infrastructure consists of an ordersorted rewrite theory in Maude, a rewriting logic system, that enables the synchronous execution of a set relation provided by the user. By using the infrastructure, existing algorithm veri cation techniques already available in Maude for traditional asynchronous rewriting, such as reachability analysis and model checking, are automatically available to synchronous set rewriting. The use of the infrastructure is illustrated with an executable operational semantics of a simple synchronous language and the veri cation of temporal properties of a synchronous system.

  13. Rule-based Information Integration

    NARCIS (Netherlands)

    de Keijzer, Ander; van Keulen, Maurice

    2005-01-01

    In this report, we show the process of information integration. We specifically discuss the language used for integration. We show that integration consists of two phases, the schema mapping phase and the data integration phase. We formally define transformation rules, conversion, evolution and

  14. A Rewriting Logic Approach to Type Inference

    Science.gov (United States)

    Ellison, Chucky; Şerbănuţă, Traian Florin; Roşu, Grigore

    Meseguer and Roşu proposed rewriting logic semantics (RLS) as a programing language definitional framework that unifies operational and algebraic denotational semantics. RLS has already been used to define a series of didactic and real languages, but its benefits in connection with defining and reasoning about type systems have not been fully investigated. This paper shows how the same RLS style employed for giving formal definitions of languages can be used to define type systems. The same term-rewriting mechanism used to execute RLS language definitions can now be used to execute type systems, giving type checkers or type inferencers. The proposed approach is exemplified by defining the Hindley-Milner polymorphic type inferencer mathcal{W} as a rewrite logic theory and using this definition to obtain a type inferencer by executing it in a rewriting logic engine. The inferencer obtained this way compares favorably with other definitions or implementations of mathcal{W}. The performance of the executable definition is within an order of magnitude of that of highly optimized implementations of type inferencers, such as that of OCaml.

  15. Triangulation in rewriting

    NARCIS (Netherlands)

    Oostrom, V. van; Zantema, Hans

    2012-01-01

    We introduce a process, dubbed triangulation, turning any rewrite relation into a confluent one. It is more direct than usual completion, in the sense that objects connected by a peak are directly oriented rather than their normal forms. We investigate conditions under which this process preserves

  16. A Demonstration of the Grrr Graph Rewriting Programming Language

    OpenAIRE

    Rodgers, Peter; Vidal, Natalia

    2000-01-01

    This paper overviews the graph rewriting programming language, Grrr. The serial graph rewriting strategy is detailed, and key elements of the user interface are described. The system is illustrated by a simple example.

  17. Nested (inverse) binomial sums and new iterated integrals for massive Feynman diagrams

    International Nuclear Information System (INIS)

    Ablinger, Jakob; Schneider, Carsten; Bluemlein, Johannes; Raab, Clemens G.

    2014-07-01

    Nested sums containing binomial coefficients occur in the computation of massive operatormatrix elements. Their associated iterated integrals lead to alphabets including radicals, for which we determined a suitable basis. We discuss algorithms for converting between sum and integral representations, mainly relying on the Mellin transform. To aid the conversion we worked out dedicated rewrite rules, based on which also some general patterns emerging in the process can be obtained.

  18. Nested (inverse) binomial sums and new iterated integrals for massive Feynman diagrams

    Energy Technology Data Exchange (ETDEWEB)

    Ablinger, Jakob; Schneider, Carsten [Johannes Kepler Univ., Linz (Austria). Research Inst. for Symbolic Computation (RISC); Bluemlein, Johannes; Raab, Clemens G. [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany)

    2014-07-15

    Nested sums containing binomial coefficients occur in the computation of massive operatormatrix elements. Their associated iterated integrals lead to alphabets including radicals, for which we determined a suitable basis. We discuss algorithms for converting between sum and integral representations, mainly relying on the Mellin transform. To aid the conversion we worked out dedicated rewrite rules, based on which also some general patterns emerging in the process can be obtained.

  19. Challenges for Rule Systems on the Web

    Science.gov (United States)

    Hu, Yuh-Jong; Yeh, Ching-Long; Laun, Wolfgang

    The RuleML Challenge started in 2007 with the objective of inspiring the issues of implementation for management, integration, interoperation and interchange of rules in an open distributed environment, such as the Web. Rules are usually classified as three types: deductive rules, normative rules, and reactive rules. The reactive rules are further classified as ECA rules and production rules. The study of combination rule and ontology is traced back to an earlier active rule system for relational and object-oriented (OO) databases. Recently, this issue has become one of the most important research problems in the Semantic Web. Once we consider a computer executable policy as a declarative set of rules and ontologies that guides the behavior of entities within a system, we have a flexible way to implement real world policies without rewriting the computer code, as we did before. Fortunately, we have de facto rule markup languages, such as RuleML or RIF to achieve the portability and interchange of rules for different rule systems. Otherwise, executing real-life rule-based applications on the Web is almost impossible. Several commercial or open source rule engines are available for the rule-based applications. However, we still need a standard rule language and benchmark for not only to compare the rule systems but also to measure the progress in the field. Finally, a number of real-life rule-based use cases will be investigated to demonstrate the applicability of current rule systems on the Web.

  20. Integration rules for scattering equations

    International Nuclear Information System (INIS)

    Baadsgaard, Christian; Bjerrum-Bohr, N.E.J.; Bourjaily, Jacob L.; Damgaard, Poul H.

    2015-01-01

    As described by Cachazo, He and Yuan, scattering amplitudes in many quantum field theories can be represented as integrals that are fully localized on solutions to the so-called scattering equations. Because the number of solutions to the scattering equations grows quite rapidly, the contour of integration involves contributions from many isolated components. In this paper, we provide a simple, combinatorial rule that immediately provides the result of integration against the scattering equation constraints for any Möbius-invariant integrand involving only simple poles. These rules have a simple diagrammatic interpretation that makes the evaluation of any such integrand immediate. Finally, we explain how these rules are related to the computation of amplitudes in the field theory limit of string theory.

  1. On Graph Rewriting, Reduction and Evaluation

    DEFF Research Database (Denmark)

    Zerny, Ian

    2010-01-01

    We inter-derive two prototypical styles of graph reduction: reduction machines à la Turner and graph rewriting systems à la Barendregt et al. To this end, we adapt Danvy et al.'s mechanical program derivations from the world of terms to the world of graphs. We also outline how to inter-derive a t......We inter-derive two prototypical styles of graph reduction: reduction machines à la Turner and graph rewriting systems à la Barendregt et al. To this end, we adapt Danvy et al.'s mechanical program derivations from the world of terms to the world of graphs. We also outline how to inter...

  2. Derivative-Based Trapezoid Rule for the Riemann-Stieltjes Integral

    Directory of Open Access Journals (Sweden)

    Weijing Zhao

    2014-01-01

    Full Text Available The derivative-based trapezoid rule for the Riemann-Stieltjes integral is presented which uses 2 derivative values at the endpoints. This kind of quadrature rule obtains an increase of two orders of precision over the trapezoid rule for the Riemann-Stieltjes integral and the error term is investigated. At last, the rationality of the generalization of derivative-based trapezoid rule for Riemann-Stieltjes integral is demonstrated.

  3. Rewrite systems for integer arithmetic

    NARCIS (Netherlands)

    H.R. Walters (Pum); H. Zantema (Hans)

    1995-01-01

    textabstractWe present three term rewrite systems for integer arithmetic with addition, multiplication, and, in two cases, subtraction. All systems are ground confluent and terminating; termination is proved by semantic labelling and recursive path order. The first system represents numbers by

  4. Rewrite systems for integer arithmetic

    NARCIS (Netherlands)

    Walters, H.R.; Zantema, H.

    1994-01-01

    We present three term rewrite systems for integer arithmetic with addition, multiplication, and, in two cases, subtraction. All systems are ground con uent and terminating; termination is proved by semantic labelling and recursive path order. The first system represents numbers by successor and

  5. Concept of rewritable organic ferroelectric random access memory in two lateral transistors-in-one cell architecture

    International Nuclear Information System (INIS)

    Kim, Min-Hoi; Lee, Gyu Jeong; Keum, Chang-Min; Lee, Sin-Doo

    2014-01-01

    We propose a concept of rewritable ferroelectric random access memory (RAM) with two lateral organic transistors-in-one cell architecture. Lateral integration of a paraelectric organic field-effect transistor (OFET), being a selection transistor, and a ferroelectric OFET as a memory transistor is realized using a paraelectric depolarizing layer (PDL) which is patterned on a ferroelectric insulator by transfer-printing. For the selection transistor, the key roles of the PDL are to reduce the dipolar strength and the surface roughness of the gate insulator, leading to the low memory on–off ratio and the high switching on–off current ratio. A new driving scheme preventing the crosstalk between adjacent memory cells is also demonstrated for the rewritable operation of the ferroelectric RAM. (paper)

  6. Higher-order rewriting and partial evaluation

    DEFF Research Database (Denmark)

    Danvy, Olivier; Rose, Kristoffer H.

    1998-01-01

    We demonstrate the usefulness of higher-order rewriting techniques for specializing programs, i.e., for partial evaluation. More precisely, we demonstrate how casting program specializers as combinatory reduction systems (CRSs) makes it possible to formalize the corresponding program...

  7. Lifting Term Rewriting Derivations in Constructor Systems by Using Generators

    Directory of Open Access Journals (Sweden)

    Adrián Riesco

    2015-01-01

    Full Text Available Narrowing is a procedure that was first studied in the context of equational E-unification and that has been used in a wide range of applications. The classic completeness result due to Hullot states that any term rewriting derivation starting from an instance of an expression can be "lifted" to a narrowing derivation, whenever the substitution employed is normalized. In this paper we adapt the generator- based extra-variables-elimination transformation used in functional-logic programming to overcome that limitation, so we are able to lift term rewriting derivations starting from arbitrary instances of expressions. The proposed technique is limited to left-linear constructor systems and to derivations reaching a ground expression. We also present a Maude-based implementation of the technique, using natural rewriting for the on-demand evaluation strategy.

  8. Monotonic Set-Extended Prefix Rewriting and Verification of Recursive Ping-Pong Protocols

    DEFF Research Database (Denmark)

    Delzanno, Giorgio; Esparza, Javier; Srba, Jiri

    2006-01-01

    of messages) some verification problems become decidable. In particular we give an algorithm to decide control state reachability, a problem related to security properties like secrecy and authenticity. The proof is via a reduction to a new prefix rewriting model called Monotonic Set-extended Prefix rewriting...

  9. Modular Implementation of Programming Languages and a Partial-Order Approach to Infinitary Rewriting

    DEFF Research Database (Denmark)

    Bahr, Patrick

    2012-01-01

    In this dissertation we investigate two independent areas of research. In the first part, we develop techniques for implementing programming languages in a modular fashion. Within this problem domain, we focus on operations on typed abstract syntax trees with the goal of developing a framework...... that facilitates the definition, manipulation and composition of such operations. The result of our work is a comprehensive combinator library that provides these facilities. What sets our approach apart is the use of recursion schemes derived from tree automata in order to implement operations on abstract syntax...... trees. The second part is concerned with infinitary rewriting, a field that studies transfinite rewrite sequences. We extend the established theory of infinitary rewriting in two ways: (1) a novel approach to convergence in infinitary rewriting that replaces convergence in a metric space with the limit...

  10. Transforming process models : executable rewrite rules versus a formalized Java program

    NARCIS (Netherlands)

    Van Gorp, P.M.E.; Eshuis, H.; Petriu, D.C.; Rouquette, N.

    2010-01-01

    In the business process management community, transformations for process models are usually programmed using imperative languages (such as Java). The underlying mapping rules tend to be documented using informal visual rules whereas they tend to be formalized using mathematical set constructs. In

  11. Transforming process models : executable rewrite rules versus a formalized Java program

    NARCIS (Netherlands)

    Van Gorp, P.M.E.; Eshuis, H.

    2010-01-01

    In the business process management community, transformations for process models are usually programmed using imperative languages. The underlying mapping rules tend to be documented using informal visual rules whereas they tend to be formalized using mathematical set constructs. In the Graph and

  12. Integrated Case Based and Rule Based Reasoning for Decision Support

    OpenAIRE

    Eshete, Azeb Bekele

    2009-01-01

    This project is a continuation of my specialization project which was focused on studying theoretical concepts related to case based reasoning method, rule based reasoning method and integration of them. The integration of rule-based and case-based reasoning methods has shown a substantial improvement with regards to performance over the individual methods. Verdande Technology As wants to try integrating the rule based reasoning method with an existing case based system. This project focu...

  13. Journalism's Rewriting of History in Reporting the Arab Spring

    DEFF Research Database (Denmark)

    Jørndrup, Hanne

    2012-01-01

    Investigation of journalism’s role as writer and rewriter of the record of political episodes of world importance is central to this article, which takes an empirical approach in choosing the Danish press coverage of The Arab Spring as its starting point. The article analyses how a number...... and circumstances that put Tunisia and Egypt on the Danish media’s agenda in the year before the Arab revolutions as a starting point. The central point of this comparison is to convey how journalism, while describing contemporary events of The Arab Spring, at the same time rewrites its own prior commentary...

  14. A rewriting view of simple typing

    NARCIS (Netherlands)

    Stump, A.; Zantema, H.; Kimmell, G.; El Haj Omar, R.

    2012-01-01

    This paper shows how a recently developed view of typing as small-step abstract reduction, due to Kuan, MacQueen, and Findler, can be used to recast the development of simple type theory from a rewriting perspective. We show how standard meta-theoretic results can be proved in a completely new way,

  15. A rewriting view of simple typing

    NARCIS (Netherlands)

    Stump, A.; Zantema, H.; Kimmell, G.; El Haj Omar, R.

    2013-01-01

    This paper shows how a recently developed view of typing as small-step abstract reduction, due to Kuan, MacQueen, and Findler, can be used to recast the development of simple type theory from a rewriting perspective. We show how standard meta-theoretic results can be proved in a completely new way,

  16. A flexible optically re-writable color liquid crystal display

    Science.gov (United States)

    Zhang, Yihong; Sun, Jiatong; Liu, Yang; Shang, Jianhua; Liu, Hao; Liu, Huashan; Gong, Xiaohui; Chigrinov, Vladimir; Kowk, Hoi Sing

    2018-03-01

    It is very difficult to make a liquid crystal display (LCD) that is flexible. However, for an optically re-writable LCD (ORWLCD), only the spacers and the substrates need to be flexible because the driving unit and the display unit are separate and there are no electronics in the display part of ORWLCD. In this paper, three flexible-spacer methods are proposed to achieve this goal. A cholesteric liquid crystal colored mirror with a polarizer behind it is used as the colored reflective backboard of an ORWLCD. Polyethersulfone substrates and flexible spacers are used to make the optically re-writable cell insensitive to mechanical force.

  17. Modeling Software Evolution using Algebraic Graph Rewriting

    NARCIS (Netherlands)

    Ciraci, Selim; van den Broek, Pim

    We show how evolution requests can be formalized using algebraic graph rewriting. In particular, we present a way to convert the UML class diagrams to colored graphs. Since changes in software may effect the relation between the methods of classes, our colored graph representation also employs the

  18. Confluence via strong normalisation in an algebraic λ-calculus with rewriting

    Directory of Open Access Journals (Sweden)

    Pablo Buiras

    2012-03-01

    Full Text Available The linear-algebraic lambda-calculus and the algebraic lambda-calculus are untyped lambda-calculi extended with arbitrary linear combinations of terms. The former presents the axioms of linear algebra in the form of a rewrite system, while the latter uses equalities. When given by rewrites, algebraic lambda-calculi are not confluent unless further restrictions are added. We provide a type system for the linear-algebraic lambda-calculus enforcing strong normalisation, which gives back confluence. The type system allows an abstract interpretation in System F.

  19. A Rewritable, Random-Access DNA-Based Storage System.

    Science.gov (United States)

    Yazdi, S M Hossein Tabatabaei; Yuan, Yongbo; Ma, Jian; Zhao, Huimin; Milenkovic, Olgica

    2015-09-18

    We describe the first DNA-based storage architecture that enables random access to data blocks and rewriting of information stored at arbitrary locations within the blocks. The newly developed architecture overcomes drawbacks of existing read-only methods that require decoding the whole file in order to read one data fragment. Our system is based on new constrained coding techniques and accompanying DNA editing methods that ensure data reliability, specificity and sensitivity of access, and at the same time provide exceptionally high data storage capacity. As a proof of concept, we encoded parts of the Wikipedia pages of six universities in the USA, and selected and edited parts of the text written in DNA corresponding to three of these schools. The results suggest that DNA is a versatile media suitable for both ultrahigh density archival and rewritable storage applications.

  20. Phase structure rewrite systems in information retrieval

    Science.gov (United States)

    Klingbiel, P. H.

    1985-01-01

    Operational level automatic indexing requires an efficient means of normalizing natural language phrases. Subject switching requires an efficient means of translating one set of authorized terms to another. A phrase structure rewrite system called a Lexical Dictionary is explained that performs these functions. Background, operational use, other applications and ongoing research are explained.

  1. Partial order infinitary term rewriting

    DEFF Research Database (Denmark)

    Bahr, Patrick

    2014-01-01

    We study an alternative model of infinitary term rewriting. Instead of a metric on terms, a partial order on partial terms is employed to formalise convergence of reductions. We consider both a weak and a strong notion of convergence and show that the metric model of convergence coincides with th...... to the metric setting -- orthogonal systems are both infinitarily confluent and infinitarily normalising in the partial order setting. The unique infinitary normal forms that the partial order model admits are Böhm trees....

  2. A rewritable, reprogrammable, dual light-responsive polymer actuator

    NARCIS (Netherlands)

    Gelebart, A.H.; Mulder, D.J.; Vantomme, G.; Schenning, A.P.H.J.; Broer, D.J.

    2017-01-01

    We report on the fabrication of a rewritable and reprogrammable dual-photoresponsive liquid crystalline-based actuator containing an azomerocyanine dye that can be locally converted into the hydroxyazopyridinium form by acid treatment. Each dye absorbs at a different wavelength giving access to

  3. Moving picture recording and observation of femtosecond light pulse propagation using a rewritable holographic material

    Energy Technology Data Exchange (ETDEWEB)

    Yamamoto, Seiji; Takimoto, Tetsuya; Tosa, Kazuya; Kakue, Takashi [Graduate School of Science and Technology, Kyoto Institute of Technology, Matsugasaki, Sakyo, Kyoto 606-8585 (Japan); Awatsuji, Yasuhiro, E-mail: awatsuji@kit.ac.jp [Graduate School of Science and Technology, Kyoto Institute of Technology, Matsugasaki, Sakyo, Kyoto 606-8585 (Japan); Nishio, Kenzo [Advanced Technology Center, Kyoto Institute of Technology, Matsugasaki, Sakyo, Kyoto 606-8585 (Japan); Ura, Shogo [Graduate School of Science and Technology, Kyoto Institute of Technology, Matsugasaki, Sakyo, Kyoto 606-8585 (Japan); Kubota, Toshihiro [Kubota Holography Laboratory, Corporation, Nishihata 34-1-609, Ogura, Uji 611-0042 (Japan)

    2011-08-01

    We succeeded in recording and observing femtosecond light pulse propagation as a form of moving picture by means of light-in-flight recording by holography using a rewritable holographic material, for the first time. We used a femtosecond pulsed laser whose center wavelength and duration were 800 nm and {approx}120 fs, respectively. A photo-conductor plastic hologram was used as a rewritable holographic material. The femtosecond light pulse was collimated and obliquely incident to the diffuser plate. The behavior of the cross-section between the collimated femtosecond light pulse and the diffuser plate was recorded on the photo-conductor plastic hologram. We experimentally obtained a spatially and temporally continuous moving picture of the femtosecond light pulse propagation for 58.3 ps. Meanwhile, we also investigated the rewritable performance of the photo-conductor plastic hologram. As a result, we confirmed that ten-time rewriting was possible for a photo-conductor plastic hologram.

  4. A RuleML Study on Integrating Geographical and Health Information

    DEFF Research Database (Denmark)

    Gao, Sheng; Mioc, Darka; Boley, Harold

    2008-01-01

    To facilitate health surveillance, flexible ways to represent, integrate, and deduce health information become increasingly important. In this paper, an ontology is used to support the semantic definition of spatial, temporal and thematic factors of health information. The ontology is realized...... as an interchangeable RuleML knowledge base, consisting of facts and rules. Rules are also used for integrating geographical and health information. The implemented eHealthGeo system uses the OO jDREW reasoning engine to deduce implicit information such as spatial relationships. The system combines this with spatial...

  5. Böhm Reduction in Infinitary Term Graph Rewriting Systems

    DEFF Research Database (Denmark)

    Bahr, Patrick

    2017-01-01

    a corresponding theory of Böhm reduction for term graphs. Our main result is that partial order convergence in a term graph rewriting system can be truthfully and faithfully simulated by metric convergence in the Böhm extension of the system. To prove this result we generalise the notion of residuals...... that `meaningless terms' can be contracted to a fresh constant ⊥. In previous work, we have established that Böhm reduction can be instead characterised by a different mode of convergences of transfinite reductions that is based on a partial order structure instead of a metric space. In this paper, we develop...... and projections to the setting of infinitary term graph rewriting. As ancillary results we prove the infinitary strip lemma and the compression property, both for partial order and metric convergence....

  6. Domain XML semantic integration based on extraction rules and ontology mapping

    Directory of Open Access Journals (Sweden)

    Huayu LI

    2016-08-01

    Full Text Available A plenty of XML documents exist in petroleum engineering field, but traditional XML integration solution can’t provide semantic query, which leads to low data use efficiency. In light of WeXML(oil&gas well XML data semantic integration and query requirement, this paper proposes a semantic integration method based on extraction rules and ontology mapping. The method firstly defines a series of extraction rules with which elements and properties of WeXML Schema are mapped to classes and properties in WeOWL ontology, respectively; secondly, an algorithm is used to transform WeXML documents into WeOWL instances. Because WeOWL provides limited semantics, ontology mappings between two ontologies are then built to explain class and property of global ontology with terms of WeOWL, and semantic query based on global domain concepts model is provided. By constructing a WeXML data semantic integration prototype system, the proposed transformational rule, the transfer algorithm and the mapping rule are tested.

  7. Printable and Rewritable Full Block Copolymer Structural Color.

    Science.gov (United States)

    Kang, Han Sol; Lee, Jinseong; Cho, Suk Man; Park, Tae Hyun; Kim, Min Ju; Park, Chanho; Lee, Seung Won; Kim, Kang Lib; Ryu, Du Yeol; Huh, June; Thomas, Edwin L; Park, Cheolmin

    2017-08-01

    Structural colors (SCs) of photonic crystals (PCs) arise from selective constructive interference of incident light. Here, an ink-jet printable and rewritable block copolymer (BCP) SC display is demonstrated, which can be quickly written and erased over 50 times with resolution nearly equivalent to that obtained with a commercial office ink-jet printer. Moreover, the writing process employs an easily modified printer for position- and concentration-controlled deposition of a single, colorless, water-based ink containing a reversible crosslinking agent, ammonium persulfate. Deposition of the ink onto a self-assembled BCP PC film comprising a 1D stack of alternating layers enables differential swelling of the written BCP film and produces a full-colored SC display of characters and images. Furthermore, the information can be readily erased and the system can be reset by application of hydrogen bromide. Subsequently, new information can be rewritten, resulting in a chemically rewritable BCP SC display. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  8. Rewriting the language of creativity

    DEFF Research Database (Denmark)

    Glaveanu, Vlad Petre

    2013-01-01

    For the past 5 decades the psychology of creativity has been influenced by what is known as the 4 P's of creative expression: person, process, product, and press. This conceptual schema, initially proposed by Rhodes (1961), helped researchers structure their thinking about the phenomenon. However......, it also supported an individualistic, static, and oftentimes disjointed vision of creativity. The present article aims to rewrite this fundamental language of the discipline by using terms that explicitly endorse a systemic, contextual, and dynamic approach. The 5 A's framework—actor, action, artifact...

  9. Automated termination proofs for logic programs by term rewriting

    NARCIS (Netherlands)

    Schneider-Kamp, P.; Giesl, J.; Serebrenik, A.; Thiemann, R.

    2009-01-01

    There are two kinds of approaches for termination analysis of logic programs: "transformational" and "direct" ones. Direct approaches prove termination directly on the basis of the logic program. Transformational approaches transform a logic program into a Term Rewrite System (TRS) and then analyze

  10. Rules for integrals over products of distributions from coordinate independence of path integrals

    International Nuclear Information System (INIS)

    Kleinert, H.; Chervyakov, A.

    2001-01-01

    In perturbative calculations of quantum-mechanical path integrals in curvilinear coordinates, one encounters Feynman diagrams involving multiple temporal integrals over products of distributions which are mathematically undefined. In addition, there are terms proportional to powers of Dirac δ-functions at the origin coming from the measure of path integration. We derive simple rules for dealing with such singular terms from the natural requirement of coordinate independence of the path integrals. (orig.)

  11. Some empirical rules concerning the vapor pressure curve revisited

    International Nuclear Information System (INIS)

    Velasco, S.; White, J.A.

    2014-01-01

    Highlights: • A Claussius–Claperyron equation is obtained in the Pitzer corresponding states scheme. • Some well-known empirical rules for the vapor pressure are rewritten in terms of the Pitzer acentric factor. • The Guggenheim point follows the corresponding state scheme better than the normal boiling point. • The Ambrose–Walton vapor pressure equation yields excellent agreement with NIST data in all considered cases. -- Abstract: A form for the Clausius–Clapeyron vapor-pressure equation is obtained in the Pitzer corresponding states scheme. This equation allows one to rewrite the well-known Trouton, Guldberg, van Laar and Guggenheim rules in terms of the acentric factor ω. The original forms of these empirical rules are recovered for some particular values of ω. The proposed rules are checked by analyzing National Institute of Standards and Technology (NIST) data on the liquid-vapor coexistence curve for 105 fluids. These rules have been also analyzed by using the well-known Ambrose–Walton (AW) vapor pressure equation

  12. Product integration rules at Clenshaw-Curtis and related points: A robust implementation

    International Nuclear Information System (INIS)

    Adam, G.; Nobile, A.

    1989-12-01

    Product integration rules generalizing the Fejer, Clenshaw-Curtis and Filippi quadrature rules respectively are derived for integrals with trigonometric and hyperbolic weight factors. The study puts in evidence the existence of well-conditioned fully analytic solutions, in terms of hypergeometric functions 0 F 1 . An a priori error estimator is discussed which is shown both to avoid wasteful invocation of the integration rule and to increase significantly the robustness of the automatic quadrature procedure. Then, specializing to extended Clenshaw-Curtis (ECC) rules, three types of a posteriori error estimates are considered and the existence of a great risk of their failure is put into evidence by large scale validation tests. An empirical error estimator, superseding them at slowly varying integrands, is found to result in a spectacular increase in the output reliability. Finally, enhancements in the control of the interval subdivision strategy aiming at increasing code robustness is discussed. Comparison with the code DQAWO of QUADPACK, extending over a statistics of about hundred thousand solved integrals, is illustrative for the increased robustness and error estimate reliability of our computer code implementation of the ECC rules. (author). 19 refs, 8 tabs

  13. On-Chip Fluorescence Switching System for Constructing a Rewritable Random Access Data Storage Device.

    Science.gov (United States)

    Nguyen, Hoang Hiep; Park, Jeho; Hwang, Seungwoo; Kwon, Oh Seok; Lee, Chang-Soo; Shin, Yong-Beom; Ha, Tai Hwan; Kim, Moonil

    2018-01-10

    We report the development of on-chip fluorescence switching system based on DNA strand displacement and DNA hybridization for the construction of a rewritable and randomly accessible data storage device. In this study, the feasibility and potential effectiveness of our proposed system was evaluated with a series of wet experiments involving 40 bits (5 bytes) of data encoding a 5-charactered text (KRIBB). Also, a flexible data rewriting function was achieved by converting fluorescence signals between "ON" and "OFF" through DNA strand displacement and hybridization events. In addition, the proposed system was successfully validated on a microfluidic chip which could further facilitate the encoding and decoding process of data. To the best of our knowledge, this is the first report on the use of DNA hybridization and DNA strand displacement in the field of data storage devices. Taken together, our results demonstrated that DNA-based fluorescence switching could be applicable to construct a rewritable and randomly accessible data storage device through controllable DNA manipulations.

  14. Mapping Modular SOS to Rewriting Logic

    DEFF Research Database (Denmark)

    Braga, Christiano de Oliveira; Haeusler, Edward Hermann; Meseguer, José

    2003-01-01

    and verification of MSOS specifications, we have defined a mapping, named , from MSOS to rewriting logic (RWL), a logic which has been proposed as a logical and semantic framework. We have proven the correctness of and implemented it as a prototype, the MSOS-SL Interpreter, in the Maude system, a high......Modular SOS (MSOS) is a framework created to improve the modularity of structural operational semantics specifications, a formalism frequently used in the fields of programming languages semantics and process algebras. With the objective of defining formal tools to support the execution...

  15. Business Rules Definition for Decision Support System Using Matrix Grammar

    Directory of Open Access Journals (Sweden)

    Eva Zámečníková

    2016-06-01

    Full Text Available This paper deals with formalization of business rules by formal grammars. In our work we focus on methods for high frequency data processing. We process data by using complex event platforms (CEP which allow to process high volume of data in nearly real time. Decision making process is contained by one level of processing of CEP. Business rules are used for decision making process description. For the business rules formalization we chose matrix grammar. The use of formal grammars is quite natural as the structure of rules and its rewriting is very similar both for the business rules and for formal grammar. In addition the matrix grammar allows to simulate dependencies and correlations between the rules. The result of this work is a model for data processing of knowledge-based decision support system described by the rules of formal grammar. This system will support the decision making in CEP. This solution may contribute to the speedup of decision making process in complex event processing and also to the formal verification of these systems.

  16. Proposal of New Rewritable Printing Media Using Electrophoresis and Confirmation of Its Mechanism

    Science.gov (United States)

    Hoshino, Yasushi; Ogura, Masahiro; Sano, Takayuki

    2004-10-01

    A new rewritable printing media using electrophoresis and selective heating is proposed to contribute to the reduction in paper consumption by printers. The mechanism is that when a heated part of the rewritable media is melted, white particles in that part of the media are able to move by electrophoresis. The media is initialized by heating its entire surface under the condition of voltage application and imaging is carried out by selective heating under the condition of an applied reversed-polarity voltage. Using a mixture system of carnauba wax and particles coated with titanium oxide (TiO2), the feasibility of the mechanism is confirmed.

  17. A graph rewriting programming language for graph drawing

    OpenAIRE

    Rodgers, Peter

    1998-01-01

    This paper describes Grrr, a prototype visual graph drawing tool. Previously there were no visual languages for programming graph drawing algorithms despite the inherently visual nature of the process. The languages which gave a diagrammatic view of graphs were not computationally complete and so could not be used to implement complex graph drawing algorithms. Hence current graph drawing tools are all text based. Recent developments in graph rewriting systems have produced computationally com...

  18. Ricercar

    DEFF Research Database (Denmark)

    Thomsen, Michael Kirkedal; Kaarsgaard, Robin; Soeken, Mathias

    2015-01-01

    Previously, Soeken and Thomsen presented six basic semantics-preserving rules for rewriting reversible logic circuits, defined using the well-known diagrammatic notation of Feynman. While this notation is both useful and intuitive for describing reversible circuits, its shortcomings in generality...... complicates the specification of more sophisticated and abstract rewriting rules. In this paper, we introduce Ricercar, a general textual description language for reversible logic circuits designed explicitly to support rewriting. Taking the not gate and the identity gate as primitives, this language allows...... circuits to be constructed using control gates, sequential composition, and ancillae, through a notion of ancilla scope. We show how the above-mentioned rewriting rules are defined in this language, and extend the rewriting system with five additional rules to introduce and modify ancilla scope...

  19. Politics of rewriting: what did Achebe really do? | Molande | Journal ...

    African Journals Online (AJOL)

    Politics of rewriting: what did Achebe really do? Bright Molande. Abstract. No Abstract. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about ...

  20. Mirroring the Object of the Lesson: The Creative Process of Scriptural Rewriting as an Effective Practice for Teaching Sacred Texts

    Science.gov (United States)

    Palmer, Carmen

    2018-01-01

    This paper introduces Rewritten Scripture and scriptural rewriting as a creative process that, when mirrored in a teaching exercise, may serve as an effective practice in teaching sacred texts. Observing changes made between scripture and its rewriting may allow readers to identify different contexts among these texts. Furthermore, the act of…

  1. Rule-based programming and strategies for automated generation of detailed kinetic models for gas phase combustion of polycyclic hydrocarbon molecules; Programmation par regles et strategies pour la generation automatique de mecanismes de combustion d'hydrocarbures polycycliques

    Energy Technology Data Exchange (ETDEWEB)

    Ibanescu, L

    2004-06-15

    The primary objective of this thesis is to explore the approach of using rule-based systems and strategies, for a complex problem of chemical kinetic: the automated generation of reaction mechanisms. The chemical reactions are naturally expressed as conditional rewriting rules. The control of the chemical reactions chaining is easy to describe using a strategies language, such as the one of the ELAN system, developed in the Protheo team. The thesis presents the basic concepts of the chemical kinetics, the chemical and computational problems related to the conception and validation of a reaction mechanism, and gives a general structure for the generator of reaction mechanisms called GasEI. Our research focuses on the primary mechanism generator. We give solutions for encoding the chemical species, the reactions and their chaining, and we present the prototype developed in ELAN. The representation of the chemical species uses the notion of molecular graphs, encoded by a term structure called GasEI terms. The chemical reactions are expressed by rewriting rules on molecular graphs, encoded by a set of conditional rewriting rules on GasEI terms. The strategies language of the ELAN system is used to express the reactions chaining in the primary mechanism generator. This approach is illustrated by coding ten generic reactions of the oxidizing pyrolysis. Qualitative chemical validations of the prototype show that our approach gives, for acyclic molecules, the same results as the existing mechanism generators, and for polycyclic molecules produces original results.

  2. Rule-based programming and strategies for automated generation of detailed kinetic models for gas phase combustion of polycyclic hydrocarbon molecules; Programmation par regles et strategies pour la generation automatique de mecanismes de combustion d'hydrocarbures polycycliques

    Energy Technology Data Exchange (ETDEWEB)

    Ibanescu, L.

    2004-06-15

    The primary objective of this thesis is to explore the approach of using rule-based systems and strategies, for a complex problem of chemical kinetic: the automated generation of reaction mechanisms. The chemical reactions are naturally expressed as conditional rewriting rules. The control of the chemical reactions chaining is easy to describe using a strategies language, such as the one of the ELAN system, developed in the Protheo team. The thesis presents the basic concepts of the chemical kinetics, the chemical and computational problems related to the conception and validation of a reaction mechanism, and gives a general structure for the generator of reaction mechanisms called GasEI. Our research focuses on the primary mechanism generator. We give solutions for encoding the chemical species, the reactions and their chaining, and we present the prototype developed in ELAN. The representation of the chemical species uses the notion of molecular graphs, encoded by a term structure called GasEI terms. The chemical reactions are expressed by rewriting rules on molecular graphs, encoded by a set of conditional rewriting rules on GasEI terms. The strategies language of the ELAN system is used to express the reactions chaining in the primary mechanism generator. This approach is illustrated by coding ten generic reactions of the oxidizing pyrolysis. Qualitative chemical validations of the prototype show that our approach gives, for acyclic molecules, the same results as the existing mechanism generators, and for polycyclic molecules produces original results.

  3. Foxing the Child: The Cultural Transmission of Pedagogical Norms and Values in Dutch Rewritings of Literary Classics for Children 1850-1950

    Science.gov (United States)

    Parlevliet, Sanne

    2012-01-01

    This article examines the reciprocity between children's literature and educational ideals in Dutch rewritings of international literary classics published for children between 1850 and 1950. It analyses the assumed pedagogical power of rewritings of international literary classics for children from the perspective of three theoretical concepts:…

  4. Definition of path integrals and rules for non-linear transformations

    International Nuclear Information System (INIS)

    Kerler, W.

    1978-01-01

    Functional integrals are defined as the limit of multidimensional integrals based on fundamental generating distributions. The 'lattice choice' is put into a suitable functional form. The independence of the particular choice and the necessity of this fact are shown. Various forms of the path integrals are derived and discussed. The relation to the traditional ordering problem is pointed out. The mechanism of non-linear transformations of variables is investigated and rules are given. In the case of fields it turns out that the path integrals can also be considered for space translations. (Auth.)

  5. Structure of liquid Te-based alloys used in rewritable DVDs

    Energy Technology Data Exchange (ETDEWEB)

    Delheusy, M.; Raty, J.Y.; Detemple, R.; Welnic, W.; Wuttig, M.; Gaspard, J.-P

    2004-07-15

    We analyze the structure of Te-based chalcogenide compounds that are used as materials for rewritable DVDs by using a combination of neutron diffraction and ab initio computer simulation. We show that in the liquid, the atoms have a low average coordination number, as the result of a Peierls distortion. The partial pair correlation functions are obtained from the computer simulation data.

  6. Rewritable azobenzene polyester for polarization holographic data storage

    DEFF Research Database (Denmark)

    Kerekes, A; Sajti, Sz.; Loerincz, Emoeke

    2000-01-01

    Optical storage properties of thin azobenzene side-chain polyester films were examined by polarization holographic measurements. The new amorphous polyester film is the candidate material for the purpose of rewritable holographic memory system. Temporal formation of anisotropic and topographic...... gratings was studied in case of films with and without a hard protective layer. We showed that the dominant contribution to the diffraction efficiency comes from the anisotropy in case of expositions below 1 sec even for high incident intensity. The usage of the same wavelength for writing, reading...

  7. White dots do matter

    DEFF Research Database (Denmark)

    Soeken, Mathias; Thomsen, Michael Kirkedal

    2013-01-01

    The increased effort in recent years towards methods for computer aided design of reversible logic circuits has also lead to research in algorithms for optimising the resulting circuits; both with higher-level data structures and directly on the reversible circuits. To obtain structural patterns...... that can be replaced by a cheaper realisation, many direct algorithms apply so-called moving rules; a simple form of rewrite rules that can only swap gate order. In this paper we first describe the few basic rules that are needed to perform rewriting directly on reversible logic circuits made from general...... as problems based on our rewrite rules. Finally, we outline a path to generalising the rewrite rules by showing their forms for reversible control-gates. This can be used to expand our method to other gates such as the controlled-swap gate or quantum gates....

  8. Four Complete Datatype Defining Rewrite Systems for an Abstract Datatype of Natural Numbers

    NARCIS (Netherlands)

    Bergstra, J.A.

    2014-01-01

    Natural numbers with zero, one, successor, addition and multiplication, constitute a classic example of an abstract datatype amenable for equational initial algebra specification. Datatype defining rewrite systems provide a specification which at the same time is a complete, that is confluent and

  9. A Female Interrogative Reader: The Adolescent Jane Austen Reads and Rewrites (His)tory.

    Science.gov (United States)

    Reid-Walsh, Jacqueline

    1992-01-01

    Argues that Jane Austen's unpublished juvenile work "The History of England" has considerable relevance to twentieth-century high-school English classrooms. Notes that the work humorously shows the gender bias of traditional history texts because it is a "woman-centered" rewriting. (RS)

  10. Kellogg Foundation Initiative: Rewriting the Way Foundations Do Business in Indian Country.

    Science.gov (United States)

    Boyer, Paul

    2000-01-01

    Describes the multi-million dollar initiative announced by W. K. Kellogg Foundation in 1995 to support the Native American Higher Education Initiative, and how the Kellogg initiative deserves attention from the nation as a whole because it is attempting to fundamentally rewrite the way foundations do business with Indian communities. (VWC)

  11. Elementary Particle Spectroscopy in Regular Solid Rewrite

    International Nuclear Information System (INIS)

    Trell, Erik

    2008-01-01

    The Nilpotent Universal Computer Rewrite System (NUCRS) has operationalized the radical ontological dilemma of Nothing at All versus Anything at All down to the ground recursive syntax and principal mathematical realisation of this categorical dichotomy as such and so governing all its sui generis modalities, leading to fulfilment of their individual terms and compass when the respective choice sequence operations are brought to closure. Focussing on the general grammar, NUCRS by pure logic and its algebraic notations hence bootstraps Quantum Mechanics, aware that it ''is the likely keystone of a fundamental computational foundation'' also for e.g. physics, molecular biology and neuroscience. The present work deals with classical geometry where morphology is the modality, and ventures that the ancient regular solids are its specific rewrite system, in effect extensively anticipating the detailed elementary particle spectroscopy, and further on to essential structures at large both over the inorganic and organic realms. The geodetic antipode to Nothing is extension, with natural eigenvector the endless straight line which when deployed according to the NUCRS as well as Plotelemeian topographic prescriptions forms a real three-dimensional eigenspace with cubical eigenelements where observed quark-skewed quantum-chromodynamical particle events self-generate as an Aristotelean phase transition between the straight and round extremes of absolute endlessness under the symmetry- and gauge-preserving, canonical coset decomposition SO(3)xO(5) of Lie algebra SU(3). The cubical eigen-space and eigen-elements are the parental state and frame, and the other solids are a range of transition matrix elements and portions adapting to the spherical root vector symmetries and so reproducibly reproducing the elementary particle spectroscopy, including a modular, truncated octahedron nano-composition of the Electron which piecemeal enter into molecular structures or compressed to each

  12. Incremental Query Rewriting with Resolution

    Science.gov (United States)

    Riazanov, Alexandre; Aragão, Marcelo A. T.

    We address the problem of semantic querying of relational databases (RDB) modulo knowledge bases using very expressive knowledge representation formalisms, such as full first-order logic or its various fragments. We propose to use a resolution-based first-order logic (FOL) reasoner for computing schematic answers to deductive queries, with the subsequent translation of these schematic answers to SQL queries which are evaluated using a conventional relational DBMS. We call our method incremental query rewriting, because an original semantic query is rewritten into a (potentially infinite) series of SQL queries. In this chapter, we outline the main idea of our technique - using abstractions of databases and constrained clauses for deriving schematic answers, and provide completeness and soundness proofs to justify the applicability of this technique to the case of resolution for FOL without equality. The proposed method can be directly used with regular RDBs, including legacy databases. Moreover, we propose it as a potential basis for an efficient Web-scale semantic search technology.

  13. A kilobyte rewritable atomic memory

    Science.gov (United States)

    Kalff, Floris; Rebergen, Marnix; Fahrenfort, Nora; Girovsky, Jan; Toskovic, Ranko; Lado, Jose; FernáNdez-Rossier, JoaquíN.; Otte, Sander

    The ability to manipulate individual atoms by means of scanning tunneling microscopy (STM) opens op opportunities for storage of digital data on the atomic scale. Recent achievements in this direction include data storage based on bits encoded in the charge state, the magnetic state, or the local presence of single atoms or atomic assemblies. However, a key challenge at this stage is the extension of such technologies into large-scale rewritable bit arrays. We demonstrate a digital atomic-scale memory of up to 1 kilobyte (8000 bits) using an array of individual surface vacancies in a chlorine terminated Cu(100) surface. The chlorine vacancies are found to be stable at temperatures up to 77 K. The memory, crafted using scanning tunneling microscopy at low temperature, can be read and re-written automatically by means of atomic-scale markers, and offers an areal density of 502 Terabits per square inch, outperforming state-of-the-art hard disk drives by three orders of magnitude.

  14. A study of diverse clinical decision support rule authoring environments and requirements for integration

    Directory of Open Access Journals (Sweden)

    Zhou Li

    2012-11-01

    Full Text Available Abstract Background Efficient rule authoring tools are critical to allow clinical Knowledge Engineers (KEs, Software Engineers (SEs, and Subject Matter Experts (SMEs to convert medical knowledge into machine executable clinical decision support rules. The goal of this analysis was to identify the critical success factors and challenges of a fully functioning Rule Authoring Environment (RAE in order to define requirements for a scalable, comprehensive tool to manage enterprise level rules. Methods The authors evaluated RAEs in active use across Partners Healthcare, including enterprise wide, ambulatory only, and system specific tools, with a focus on rule editors for reminder and medication rules. We conducted meetings with users of these RAEs to discuss their general experience and perceived advantages and limitations of these tools. Results While the overall rule authoring process is similar across the 10 separate RAEs, the system capabilities and architecture vary widely. Most current RAEs limit the ability of the clinical decision support (CDS interventions to be standardized, sharable, interoperable, and extensible. No existing system meets all requirements defined by knowledge management users. Conclusions A successful, scalable, integrated rule authoring environment will need to support a number of key requirements and functions in the areas of knowledge representation, metadata, terminology, authoring collaboration, user interface, integration with electronic health record (EHR systems, testing, and reporting.

  15. Rewritable 3D bit optical data storage in a PMMA-based photorefractive polymer

    Energy Technology Data Exchange (ETDEWEB)

    Day, D.; Gu, M. [Swinburne Univ. of Tech., Hawthorn, Vic. (Australia). Centre for Micro-Photonics; Smallridge, A. [Victoria Univ., Melbourne (Australia). School of Life Sciences and Technology

    2001-07-04

    A cheap, compact, and rewritable high-density optical data storage system for CD and DVD applications is presented by the authors. Continuous-wave illumination under two-photon excitation in a new poly(methylmethacrylate) (PMMA) based photorefractive polymer allows 3D bit storage of sub-Tbyte data. (orig.)

  16. New application of functional integrals to classical mechanics

    International Nuclear Information System (INIS)

    Zherebtsov, Anton; Ilinski, Kirill

    2005-01-01

    In this Letter a new functional integral representation for classical dynamics is introduced. It is achieved by rewriting the Liouville picture in terms of bosonic creation-annihilation operators and utilizing the standard derivation of functional integrals for dynamical quantities in the coherent states representation. This results in a new class of functional integrals which are exactly solvable and can be found explicitly when the underlying classical systems are integrable

  17. Integrity Checking and Maintenance with Active Rules in XML Databases

    DEFF Research Database (Denmark)

    Christiansen, Henning; Rekouts, Maria

    2007-01-01

    While specification languages for integrity constraints for XML data have been considered in the literature, actual technologies and methodologies for checking and maintaining integrity are still in their infancy. Triggers, or active rules, which are widely used in previous technologies for the p...... updates, the method indicates trigger conditions and correctness criteria to be met by the trigger code supplied by a developer or possibly automatic methods. We show examples developed in the Sedna XML database system which provides a running implementation of XML triggers....

  18. Explicit Time Integrators for Nonlinear Dynamics Derived from the Midpoint Rule

    Directory of Open Access Journals (Sweden)

    P. Krysl

    2004-01-01

    Full Text Available We address the design of time integrators for mechanical systems that are explicit in the forcing evaluations. Our starting point is the midpoint rule, either in the classical form for the vector space setting, or in the Lie form for the rotation group. By introducing discrete, concentrated impulses we can approximate the forcing impressed upon the system over the time step, and thus arrive at first-order integrators. These can then be composed to yield a second order integrator with very desirable properties: symplecticity and momentum conservation. 

  19. Sub-Circuit Selection and Replacement Algorithms Modeled as Term Rewriting Systems

    Science.gov (United States)

    2008-12-16

    of Defense, or the United States Government . AFIT/GCO/ENG/09-02 Sub-circuit Selection and Replacement Algorithms Modeled as Term Rewriting Systems... unicorns and random programs”. Communications and Computer Networks, 24–30. 2005. 87 Vita Eric D. Simonaire graduated from Granite Baptist Church School in...Service to attend the Air Force Institute of Technol- ogy in 2007. Upon graduation, he will serve the federal government in an Information Assurance

  20. URANOS: User-Guided Rewriting for Plugin-Enabled ANdroid ApplicatiOn Security

    OpenAIRE

    Schreckling , Daniel; Huber , Stephan; Höhne , Focke; Posegga , Joachim

    2013-01-01

    Part 2: Mobile Security; International audience; URANOS is an Android application which uses syntactical static analysis to determine in which component of an Android application a permission is required. This work describes how the detection and analysis of widely distributed and security critical ad-ware plugins is achieved. We show, how users can trigger bytecode rewriting to (de)activate selected or redundant permissions in Android applications without sacrificing functionality. The paper...

  1. Integration of object-oriented knowledge representation with the CLIPS rule based system

    Science.gov (United States)

    Logie, David S.; Kamil, Hasan

    1990-01-01

    The paper describes a portion of the work aimed at developing an integrated, knowledge based environment for the development of engineering-oriented applications. An Object Representation Language (ORL) was implemented in C++ which is used to build and modify an object-oriented knowledge base. The ORL was designed in such a way so as to be easily integrated with other representation schemes that could effectively reason with the object base. Specifically, the integration of the ORL with the rule based system C Language Production Systems (CLIPS), developed at the NASA Johnson Space Center, will be discussed. The object-oriented knowledge representation provides a natural means of representing problem data as a collection of related objects. Objects are comprised of descriptive properties and interrelationships. The object-oriented model promotes efficient handling of the problem data by allowing knowledge to be encapsulated in objects. Data is inherited through an object network via the relationship links. Together, the two schemes complement each other in that the object-oriented approach efficiently handles problem data while the rule based knowledge is used to simulate the reasoning process. Alone, the object based knowledge is little more than an object-oriented data storage scheme; however, the CLIPS inference engine adds the mechanism to directly and automatically reason with that knowledge. In this hybrid scheme, the expert system dynamically queries for data and can modify the object base with complete access to all the functionality of the ORL from rules.

  2. "If you thought this story sour, sweeten it with your own telling" - a feminist poetics of rewriting in Susan Price's Ghost dance

    Directory of Open Access Journals (Sweden)

    Sanna Lehtonen

    2010-01-01

    Full Text Available The attempts to challenge conventional gendered discourses in children's fantasy have often resulted in feminist rewritings of earlier stories. Ghost dance (1994 by the English author Susan Price is a novel that reflects a specific feminist poetics of rewriting: metafictional passages highlight the constructedness of the narrative and at the end readers are invited to tell their own versions of the story. Moreover, the rewriting freely combines and recontextualises elements from different source texts and reformulates them to create a narrative that challenges conventional discourses of gender. While this poetics has an appeal from a feminist perspective, the play with cross-cultural intertexts and gender becomes more complex when the novel is examined in a postcolonialist framework in relation to ethnicity and the issue of cultural appropriation. Ghost dance is situated in a setting that has a real-world equivalent (Russia, involves characters that are identified with names of real-world ethnic groups (Lapps (Sámi, Russian, and mixes elements from Russian wonder tales, Nordic mythology and an Ojibwe legend. The novel does not aim at historical accuracy in its representations nor is it a direct retelling of any of the pre-texts but combines motifs, themes, names, characters and settings freely from each source. In this textual melting pot, the protagonist Shingebiss is, on one level, a revision of the witch Baba Yaga, but also described as a Lappish shaman with an Ojibwe name. To rewrite gendered discourses, certain elements from the pretexts are chosen and others left out – the question is, then, what effects does this recontextualisation have on the representation of ethnicity? Or, are the feminist rewriting strategies actually a form of cultural appropriation?

  3. Simulation of operating rules and discretional decisions using a fuzzy rule-based system integrated into a water resources management model

    Science.gov (United States)

    Macian-Sorribes, Hector; Pulido-Velazquez, Manuel

    2013-04-01

    Water resources systems are operated, mostly, using a set of pre-defined rules not regarding, usually, to an optimal allocation in terms of water use or economic benefits, but to historical and institutional reasons. These operating policies are reproduced, commonly, as hedging rules, pack rules or zone-based operations, and simulation models can be used to test their performance under a wide range of hydrological and/or socio-economic hypothesis. Despite the high degree of acceptation and testing that these models have achieved, the actual operation of water resources systems hardly follows all the time the pre-defined rules with the consequent uncertainty on the system performance. Real-world reservoir operation is very complex, affected by input uncertainty (imprecision in forecast inflow, seepage and evaporation losses, etc.), filtered by the reservoir operator's experience and natural risk-aversion, while considering the different physical and legal/institutional constraints in order to meet the different demands and system requirements. The aim of this work is to expose a fuzzy logic approach to derive and assess the historical operation of a system. This framework uses a fuzzy rule-based system to reproduce pre-defined rules and also to match as close as possible the actual decisions made by managers. After built up, the fuzzy rule-based system can be integrated in a water resources management model, making possible to assess the system performance at the basin scale. The case study of the Mijares basin (eastern Spain) is used to illustrate the method. A reservoir operating curve regulates the two main reservoir releases (operated in a conjunctive way) with the purpose of guaranteeing a high realiability of supply to the traditional irrigation districts with higher priority (more senior demands that funded the reservoir construction). A fuzzy rule-based system has been created to reproduce the operating curve's performance, defining the system state (total

  4. Path-integral quantization of solitons using the zero-mode Feynman rule

    International Nuclear Information System (INIS)

    Sung Sheng Chang

    1978-01-01

    We propose a direct expansion treatment to quantize solitons without collective coordinates. Feynman's path integral for a free particle subject to an external force is directly used as the generating functional for the zero-frequency mode. The generating functional has no infrared singularity and defines a zero-mode Feynman rule which also gives a correct perturbative expansion for the harmonic-oscillator Green's function by treating the quadratic potential as a perturbation. We use the zero-mode Feynman rule to calculate the energy shift due to the second-order quantum corrections for solitons. Our result agrees with previous predictions using the collective-coordinate method or the method of Goldstone and Jackiw

  5. Automatic micropropagation of plants--the vision-system: graph rewriting as pattern recognition

    Science.gov (United States)

    Schwanke, Joerg; Megnet, Roland; Jensch, Peter F.

    1993-03-01

    The automation of plant-micropropagation is necessary to produce high amounts of biomass. Plants have to be dissected on particular cutting-points. A vision-system is needed for the recognition of the cutting-points on the plants. With this background, this contribution is directed to the underlying formalism to determine cutting-points on abstract-plant models. We show the usefulness of pattern recognition by graph-rewriting along with some examples in this context.

  6. Numerical Solution of Nonlinear Volterra Integral Equations System Using Simpson’s 3/8 Rule

    Directory of Open Access Journals (Sweden)

    Adem Kılıçman

    2012-01-01

    Full Text Available The Simpson’s 3/8 rule is used to solve the nonlinear Volterra integral equations system. Using this rule the system is converted to a nonlinear block system and then by solving this nonlinear system we find approximate solution of nonlinear Volterra integral equations system. One of the advantages of the proposed method is its simplicity in application. Further, we investigate the convergence of the proposed method and it is shown that its convergence is of order O(h4. Numerical examples are given to show abilities of the proposed method for solving linear as well as nonlinear systems. Our results show that the proposed method is simple and effective.

  7. A Methodology for Multiple Rule System Integration and Resolution Within a Singular Knowledge Base

    Science.gov (United States)

    Kautzmann, Frank N., III

    1988-01-01

    Expert Systems which support knowledge representation by qualitative modeling techniques experience problems, when called upon to support integrated views embodying description and explanation, especially when other factors such as multiple causality, competing rule model resolution, and multiple uses of knowledge representation are included. A series of prototypes are being developed to demonstrate the feasibility of automating the process of systems engineering, design and configuration, and diagnosis and fault management. A study involves not only a generic knowledge representation; it must also support multiple views at varying levels of description and interaction between physical elements, systems, and subsystems. Moreover, it will involve models of description and explanation for each level. This multiple model feature requires the development of control methods between rule systems and heuristics on a meta-level for each expert system involved in an integrated and larger class of expert system. The broadest possible category of interacting expert systems is described along with a general methodology for the knowledge representation and control of mutually exclusive rule systems.

  8. Good grief: Lord of the Flies as a post-war rewriting of salvation history

    Directory of Open Access Journals (Sweden)

    M. van Vuuren

    2004-07-01

    Full Text Available Golding’s Lord of the Flies, first published in 1954, reflects a bleak sense of post-war pessimism. But with undue attention focused on its portrayal of original sin and the problem of evil, readings have often remained reductive. In this article it is argued that the novel’s symbolic narrative is polysemic and, when it is read as anagogic myth, may be seen to span Judaeo-Christian Heilsgeschichte or salvation history, rewriting its chapters of creation, Fall, the problem of evil, the failure of law, the hope of salvation, the mission of a messianic figure, and – in the clearest departure from the Biblical narrative – an ambiguous representation of his return. This study examines the novel’s often paradoxical symbolism using Frye’s phases of anagogic myth, with its poles of apocalyptic and demonic imagery. It traces the relation of symbols to their counterparts in Biblical narratives, drawn in particular from the symbolic writings of the origin and end of humanity, to elucidate Golding’s bleak but certainly not hopeless rewriting of the salvation story for a post-faith readership.

  9. Feynman rules and generalized ward identities in phase space functional integral

    International Nuclear Information System (INIS)

    Li Ziping

    1996-01-01

    Based on the phase-space generating functional of Green function, the generalized canonical Ward identities are derived. It is point out that one can deduce Feynman rules in tree approximation without carrying out explicit integration over canonical momenta in phase-space generating functional. If one adds a four-dimensional divergence term to a Lagrangian of the field, then, the propagator of the field can be changed

  10. Parameterized Verification of Graph Transformation Systems with Whole Neighbourhood Operations

    OpenAIRE

    Delzanno, Giorgio; Stückrath, Jan

    2014-01-01

    We introduce a new class of graph transformation systems in which rewrite rules can be guarded by universally quantified conditions on the neighbourhood of nodes. These conditions are defined via special graph patterns which may be transformed by the rule as well. For the new class for graph rewrite rules, we provide a symbolic procedure working on minimal representations of upward closed sets of configurations. We prove correctness and effectiveness of the procedure by a categorical presenta...

  11. Integrating reasoning and clinical archetypes using OWL ontologies and SWRL rules.

    Science.gov (United States)

    Lezcano, Leonardo; Sicilia, Miguel-Angel; Rodríguez-Solano, Carlos

    2011-04-01

    Semantic interoperability is essential to facilitate the computerized support for alerts, workflow management and evidence-based healthcare across heterogeneous electronic health record (EHR) systems. Clinical archetypes, which are formal definitions of specific clinical concepts defined as specializations of a generic reference (information) model, provide a mechanism to express data structures in a shared and interoperable way. However, currently available archetype languages do not provide direct support for mapping to formal ontologies and then exploiting reasoning on clinical knowledge, which are key ingredients of full semantic interoperability, as stated in the SemanticHEALTH report [1]. This paper reports on an approach to translate definitions expressed in the openEHR Archetype Definition Language (ADL) to a formal representation expressed using the Ontology Web Language (OWL). The formal representations are then integrated with rules expressed with Semantic Web Rule Language (SWRL) expressions, providing an approach to apply the SWRL rules to concrete instances of clinical data. Sharing the knowledge expressed in the form of rules is consistent with the philosophy of open sharing, encouraged by archetypes. Our approach also allows the reuse of formal knowledge, expressed through ontologies, and extends reuse to propositions of declarative knowledge, such as those encoded in clinical guidelines. This paper describes the ADL-to-OWL translation approach, describes the techniques to map archetypes to formal ontologies, and demonstrates how rules can be applied to the resulting representation. We provide examples taken from a patient safety alerting system to illustrate our approach. Copyright © 2010 Elsevier Inc. All rights reserved.

  12. Topic categorisation of statements in suicide notes with integrated rules and machine learning.

    Science.gov (United States)

    Kovačević, Aleksandar; Dehghan, Azad; Keane, John A; Nenadic, Goran

    2012-01-01

    We describe and evaluate an automated approach used as part of the i2b2 2011 challenge to identify and categorise statements in suicide notes into one of 15 topics, including Love, Guilt, Thankfulness, Hopelessness and Instructions. The approach combines a set of lexico-syntactic rules with a set of models derived by machine learning from a training dataset. The machine learning models rely on named entities, lexical, lexico-semantic and presentation features, as well as the rules that are applicable to a given statement. On a testing set of 300 suicide notes, the approach showed the overall best micro F-measure of up to 53.36%. The best precision achieved was 67.17% when only rules are used, whereas best recall of 50.57% was with integrated rules and machine learning. While some topics (eg, Sorrow, Anger, Blame) prove challenging, the performance for relatively frequent (eg, Love) and well-scoped categories (eg, Thankfulness) was comparatively higher (precision between 68% and 79%), suggesting that automated text mining approaches can be effective in topic categorisation of suicide notes.

  13. Dist-Orc: A Rewriting-based Distributed Implementation of Orc with Formal Analysis

    Directory of Open Access Journals (Sweden)

    José Meseguer

    2010-09-01

    Full Text Available Orc is a theory of orchestration of services that allows structured programming of distributed and timed computations. Several formal semantics have been proposed for Orc, including a rewriting logic semantics developed by the authors. Orc also has a fully fledged implementation in Java with functional programming features. However, as with descriptions of most distributed languages, there exists a fairly substantial gap between Orc's formal semantics and its implementation, in that: (i programs in Orc are not easily deployable in a distributed implementation just by using Orc's formal semantics, and (ii they are not readily formally analyzable at the level of a distributed Orc implementation. In this work, we overcome problems (i and (ii for Orc. Specifically, we describe an implementation technique based on rewriting logic and Maude that narrows this gap considerably. The enabling feature of this technique is Maude's support for external objects through TCP sockets. We describe how sockets are used to implement Orc site calls and returns, and to provide real-time timing information to Orc expressions and sites. We then show how Orc programs in the resulting distributed implementation can be formally analyzed at a reasonable level of abstraction by defining an abstract model of time and the socket communication infrastructure, and discuss the assumptions under which the analysis can be deemed correct. Finally, the distributed implementation and the formal analysis methodology are illustrated with a case study.

  14. Nonvolatile rewritable memory device based on solution-processable graphene/poly(3-hexylthiophene) nanocomposite

    Energy Technology Data Exchange (ETDEWEB)

    Zhang, Li, E-mail: lizhang9@zzu.edu.cn [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450052 (China); Li, Ye; Shi, Jun [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450052 (China); Shi, Gaoquan [Department of Chemistry, Tsinghua University, Beijing 100084 (China); Cao, Shaokui, E-mail: Caoshaokui@zzu.edu.cn [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450052 (China)

    2013-11-01

    An electrically bistable device utilizing a nanocomposite of hexadecylamine-functionalized graphene oxide (HDAGO) with poly(3-hexylthiophene) (P3HT) is demonstrated. The device has an ITO/P3HT-HDAGO/Al sandwich structure, in which the composite film of P3HT-HDAGO was prepared by simple solution phase mixing of the exfoliated HDAGO monolayers with P3HT matrix and a spin-coating method. The memory device exhibits typical bistable electrical switching behavior and a nonvolatile rewritable memory effect, with a turn-on voltage of about 1.5 V and an ON/OFF-state current ratio of 10{sup 5}. Under ambient conditions, both the ON and OFF states are stable under a constant voltage stress or a continuous pulse voltage stress at a read voltage of 1 V. The conduction mechanism is deduced from the modeling of the nature of currents in both states, and the electrical switching behavior can be attributed to the electric-field-induced charge transfer between P3HT and HDAGO nanosheets. - Highlights: • Nonvolatile rewritable memory effect in P3HT–graphene composite is demonstrated. • The memory device was fabricated through a simple solution processing technique. • The device shows a remarkable electrical bistable behavior and excellent stability. • Memory mechanism is deduced from the modeling of the currents in both states.

  15. Nonvolatile rewritable memory device based on solution-processable graphene/poly(3-hexylthiophene) nanocomposite

    International Nuclear Information System (INIS)

    Zhang, Li; Li, Ye; Shi, Jun; Shi, Gaoquan; Cao, Shaokui

    2013-01-01

    An electrically bistable device utilizing a nanocomposite of hexadecylamine-functionalized graphene oxide (HDAGO) with poly(3-hexylthiophene) (P3HT) is demonstrated. The device has an ITO/P3HT-HDAGO/Al sandwich structure, in which the composite film of P3HT-HDAGO was prepared by simple solution phase mixing of the exfoliated HDAGO monolayers with P3HT matrix and a spin-coating method. The memory device exhibits typical bistable electrical switching behavior and a nonvolatile rewritable memory effect, with a turn-on voltage of about 1.5 V and an ON/OFF-state current ratio of 10 5 . Under ambient conditions, both the ON and OFF states are stable under a constant voltage stress or a continuous pulse voltage stress at a read voltage of 1 V. The conduction mechanism is deduced from the modeling of the nature of currents in both states, and the electrical switching behavior can be attributed to the electric-field-induced charge transfer between P3HT and HDAGO nanosheets. - Highlights: • Nonvolatile rewritable memory effect in P3HT–graphene composite is demonstrated. • The memory device was fabricated through a simple solution processing technique. • The device shows a remarkable electrical bistable behavior and excellent stability. • Memory mechanism is deduced from the modeling of the currents in both states

  16. The RNA world, automatic sequences and oncogenetics

    Energy Technology Data Exchange (ETDEWEB)

    Tahir Shah, K

    1993-04-01

    We construct a model of the RNA world in terms of naturally evolving nucleotide sequences assuming only Crick-Watson base pairing and self-cleaving/splicing capability. These sequences have the following properties. (1) They are recognizable by an automation (or automata). That is, to each k-sequence, there exist a k-automation which accepts, recognizes or generates the k-sequence. These are known as automatic sequences. Fibonacci and Morse-Thue sequences are the most natural outcome of pre-biotic chemical conditions. (2) Infinite (resp. large) sequences are self-similar (resp. nearly self-similar) under certain rewrite rules and consequently give rise to fractal (resp.fractal-like) structures. Computationally, such sequences can also be generated by their corresponding deterministic parallel re-write system, known as a DOL system. The self-similar sequences are fixed points of their respective rewrite rules. Some of these automatic sequences have the capability that they can read or ``accept`` other sequences while others can detect errors and trigger error-correcting mechanisms. They can be enlarged and have block and/or palindrome structure. Linear recurring sequences such as Fibonacci sequence are simply Feed-back Shift Registers, a well know model of information processing machines. We show that a mutation of any rewrite rule can cause a combinatorial explosion of error and relates this to oncogenetical behavior. On the other hand, a mutation of sequences that are not rewrite rules, leads to normal evolutionary change. Known experimental results support our hypothesis. (author). Refs.

  17. The RNA world, automatic sequences and oncogenetics

    International Nuclear Information System (INIS)

    Tahir Shah, K.

    1993-04-01

    We construct a model of the RNA world in terms of naturally evolving nucleotide sequences assuming only Crick-Watson base pairing and self-cleaving/splicing capability. These sequences have the following properties. 1) They are recognizable by an automation (or automata). That is, to each k-sequence, there exist a k-automation which accepts, recognizes or generates the k-sequence. These are known as automatic sequences. Fibonacci and Morse-Thue sequences are the most natural outcome of pre-biotic chemical conditions. 2) Infinite (resp. large) sequences are self-similar (resp. nearly self-similar) under certain rewrite rules and consequently give rise to fractal (resp.fractal-like) structures. Computationally, such sequences can also be generated by their corresponding deterministic parallel re-write system, known as a DOL system. The self-similar sequences are fixed points of their respective rewrite rules. Some of these automatic sequences have the capability that they can read or 'accept' other sequences while others can detect errors and trigger error-correcting mechanisms. They can be enlarged and have block and/or palindrome structure. Linear recurring sequences such as Fibonacci sequence are simply Feed-back Shift Registers, a well know model of information processing machines. We show that a mutation of any rewrite rule can cause a combinatorial explosion of error and relates this to oncogenetical behavior. On the other hand, a mutation of sequences that are not rewrite rules, leads to normal evolutionary change. Known experimental results support our hypothesis. (author). Refs

  18. The Balance-Scale Task Revisited: A Comparison of Statistical Models for Rule-Based and Information-Integration Theories of Proportional Reasoning.

    Directory of Open Access Journals (Sweden)

    Abe D Hofman

    Full Text Available We propose and test three statistical models for the analysis of children's responses to the balance scale task, a seminal task to study proportional reasoning. We use a latent class modelling approach to formulate a rule-based latent class model (RB LCM following from a rule-based perspective on proportional reasoning and a new statistical model, the Weighted Sum Model, following from an information-integration approach. Moreover, a hybrid LCM using item covariates is proposed, combining aspects of both a rule-based and information-integration perspective. These models are applied to two different datasets, a standard paper-and-pencil test dataset (N = 779, and a dataset collected within an online learning environment that included direct feedback, time-pressure, and a reward system (N = 808. For the paper-and-pencil dataset the RB LCM resulted in the best fit, whereas for the online dataset the hybrid LCM provided the best fit. The standard paper-and-pencil dataset yielded more evidence for distinct solution rules than the online data set in which quantitative item characteristics are more prominent in determining responses. These results shed new light on the discussion on sequential rule-based and information-integration perspectives of cognitive development.

  19. Hierarchical graphs for rule-based modeling of biochemical systems

    Directory of Open Access Journals (Sweden)

    Hu Bin

    2011-02-01

    Full Text Available Abstract Background In rule-based modeling, graphs are used to represent molecules: a colored vertex represents a component of a molecule, a vertex attribute represents the internal state of a component, and an edge represents a bond between components. Components of a molecule share the same color. Furthermore, graph-rewriting rules are used to represent molecular interactions. A rule that specifies addition (removal of an edge represents a class of association (dissociation reactions, and a rule that specifies a change of a vertex attribute represents a class of reactions that affect the internal state of a molecular component. A set of rules comprises an executable model that can be used to determine, through various means, the system-level dynamics of molecular interactions in a biochemical system. Results For purposes of model annotation, we propose the use of hierarchical graphs to represent structural relationships among components and subcomponents of molecules. We illustrate how hierarchical graphs can be used to naturally document the structural organization of the functional components and subcomponents of two proteins: the protein tyrosine kinase Lck and the T cell receptor (TCR complex. We also show that computational methods developed for regular graphs can be applied to hierarchical graphs. In particular, we describe a generalization of Nauty, a graph isomorphism and canonical labeling algorithm. The generalized version of the Nauty procedure, which we call HNauty, can be used to assign canonical labels to hierarchical graphs or more generally to graphs with multiple edge types. The difference between the Nauty and HNauty procedures is minor, but for completeness, we provide an explanation of the entire HNauty algorithm. Conclusions Hierarchical graphs provide more intuitive formal representations of proteins and other structured molecules with multiple functional components than do the regular graphs of current languages for

  20. DTFP-Growth: Dynamic Threshold-Based FP-Growth Rule Mining Algorithm Through Integrating Gene Expression, Methylation, and Protein-Protein Interaction Profiles.

    Science.gov (United States)

    Mallik, Saurav; Bhadra, Tapas; Mukherji, Ayan; Mallik, Saurav; Bhadra, Tapas; Mukherji, Ayan; Mallik, Saurav; Bhadra, Tapas; Mukherji, Ayan

    2018-04-01

    Association rule mining is an important technique for identifying interesting relationships between gene pairs in a biological data set. Earlier methods basically work for a single biological data set, and, in maximum cases, a single minimum support cutoff can be applied globally, i.e., across all genesets/itemsets. To overcome this limitation, in this paper, we propose dynamic threshold-based FP-growth rule mining algorithm that integrates gene expression, methylation and protein-protein interaction profiles based on weighted shortest distance to find the novel associations among different pairs of genes in multi-view data sets. For this purpose, we introduce three new thresholds, namely, Distance-based Variable/Dynamic Supports (DVS), Distance-based Variable Confidences (DVC), and Distance-based Variable Lifts (DVL) for each rule by integrating co-expression, co-methylation, and protein-protein interactions existed in the multi-omics data set. We develop the proposed algorithm utilizing these three novel multiple threshold measures. In the proposed algorithm, the values of , , and are computed for each rule separately, and subsequently it is verified whether the support, confidence, and lift of each evolved rule are greater than or equal to the corresponding individual , , and values, respectively, or not. If all these three conditions for a rule are found to be true, the rule is treated as a resultant rule. One of the major advantages of the proposed method compared with other related state-of-the-art methods is that it considers both the quantitative and interactive significance among all pairwise genes belonging to each rule. Moreover, the proposed method generates fewer rules, takes less running time, and provides greater biological significance for the resultant top-ranking rules compared to previous methods.

  1. Graph Creation, Visualisation and Transformation

    Directory of Open Access Journals (Sweden)

    Maribel Fernández

    2010-03-01

    Full Text Available We describe a tool to create, edit, visualise and compute with interaction nets - a form of graph rewriting systems. The editor, called GraphPaper, allows users to create and edit graphs and their transformation rules using an intuitive user interface. The editor uses the functionalities of the TULIP system, which gives us access to a wealth of visualisation algorithms. Interaction nets are not only a formalism for the specification of graphs, but also a rewrite-based computation model. We discuss graph rewriting strategies and a language to express them in order to perform strategic interaction net rewriting.

  2. Rapidly Responsive and Flexible Chiral Nematic Cellulose Nanocrystal Composites as Multifunctional Rewritable Photonic Papers with Eco-Friendly Inks.

    Science.gov (United States)

    Wan, Hao; Li, Xiaofeng; Zhang, Liang; Li, Xiaopeng; Liu, Pengfei; Jiang, Zhiguo; Yu, Zhong-Zhen

    2018-02-14

    Rapidly responsive and flexible photonic papers are manufactured by coassembly of cellulose nanocrystals (CNCs) and waterborne polyurethane (WPU) latex for fully taking advantage of the chiral nematic structure of CNCs and the flexibility of WPU elastomer. The resulting CNC/WPU composite papers exhibit not only tunable iridescent colors by adjusting the helical pitch size, but also instant optical responses to water and wet gas, ascribed to the easy chain movement of the elastomeric WPU that does not restrict the fast water absorption-induced swelling of CNCs. By choosing water or NaCl aqueous solutions as inks, the colorful patterns on the CNC/WPU photonic paper can be made temporary, durable, or even disguisable. In addition, the photonic paper is simultaneously rewritable for all these three types of patterns, and the disguisable patterns, which are invisible at normal times and show up under stimuli, exhibit a quick reveal conversion just by exhaling on the paper. The rewritability, rapid responsibility, easy fabrication, and the eco-friendly nature of the inks make the flexible photonic paper/ink combination highly promising in sensors, displays, and photonic circuits.

  3. Automatic Phonetic Transcription for Danish Speech Recognition

    DEFF Research Database (Denmark)

    Kirkedal, Andreas Søeborg

    , like Danish, the graphemic and phonetic representations are very dissimilar and more complex rewriting rules must be applied to create the correct phonetic representation. Automatic phonetic transcribers use different strategies, from deep analysis to shallow rewriting rules, to produce phonetic......, syllabication, stød and several other suprasegmental features (Kirkedal, 2013). Simplifying the transcriptions by filtering out the symbols for suprasegmental features in a post-processing step produces a format that is suitable for ASR purposes. eSpeak is an open source speech synthesizer originally created...... for particular words and word classes in addition. In comparison, English has 5,852 spelling-tophoneme rules and 4,133 additional rules and 8,278 rules and 3,829 additional rules. Phonix applies deep morphological analysis as a preprocessing step. Should the analysis fail, several fallback strategies...

  4. The Politics of Rewriting History: New History Textbooks and Curriculum Materials in Russia

    Science.gov (United States)

    Zajda, Joseph; Zajda, Rea

    2003-07-01

    The collapse of communism in Russia in 1991 necessitated, among other things, the rewriting of school history textbooks, which had been dominated by Marxist-Leninist interpretations of historical events. The aim of this article is to evaluate the new postcommunist history taught in upper secondary schools, giving particular attention to how the models for Russian identity presented in the new textbooks redefine legitimate culture for students. Attention will also be given to the multiple perspectives on history that textbooks and other curriculum materials emphasize; these new methods contrast with the grand narrative that dominated the study of history before 1991.

  5. Rewritable three-dimensional holographic data storage via optical forces

    Energy Technology Data Exchange (ETDEWEB)

    Yetisen, Ali K., E-mail: ayetisen@mgh.harvard.edu [Harvard Medical School and Wellman Center for Photomedicine, Massachusetts General Hospital, 65 Landsdowne Street, Cambridge, Massachusetts 02139 (United States); Harvard-MIT Division of Health Sciences and Technology, Massachusetts Institute of Technology, Cambridge, Massachusetts 02139 (United States); Montelongo, Yunuen [Department of Chemistry, Imperial College London, South Kensington Campus, London SW7 2AZ (United Kingdom); Butt, Haider [Nanotechnology Laboratory, School of Engineering Sciences, University of Birmingham, Birmingham B15 2TT (United Kingdom)

    2016-08-08

    The development of nanostructures that can be reversibly arranged and assembled into 3D patterns may enable optical tunability. However, current dynamic recording materials such as photorefractive polymers cannot be used to store information permanently while also retaining configurability. Here, we describe the synthesis and optimization of a silver nanoparticle doped poly(2-hydroxyethyl methacrylate-co-methacrylic acid) recording medium for reversibly recording 3D holograms. We theoretically and experimentally demonstrate organizing nanoparticles into 3D assemblies in the recording medium using optical forces produced by the gradients of standing waves. The nanoparticles in the recording medium are organized by multiple nanosecond laser pulses to produce reconfigurable slanted multilayer structures. We demonstrate the capability of producing rewritable optical elements such as multilayer Bragg diffraction gratings, 1D photonic crystals, and 3D multiplexed optical gratings. We also show that 3D virtual holograms can be reversibly recorded. This recording strategy may have applications in reconfigurable optical elements, data storage devices, and dynamic holographic displays.

  6. Like Water for Chocolate: The Rewriting of the Female Experience and Its Parallels in Philippine History

    Directory of Open Access Journals (Sweden)

    Marikit Tara Alto Uychoco

    2012-06-01

    Full Text Available This article focuses on Laura Esquivel’s Like Water for Chocolate and reads the novel using the literary theories of the “new mestiza,” postcolonial theories, feminist theories, and historiographic metafiction. It seeks to find out how this novel rewrites the female experience of the Mexican Revolution, and the various techniques used in the rewriting of history. It reads the novel from a “new mestiza” feminist perspective, which enables the Filipina reader to find commonalities in the Mexican woman’s struggle in Mexican history and society, and finds ways to help her appreciate the Filipina’s struggle in Philippine history and society. The theories of historiographic metafiction are grounded in Linda Hutcheon’s theories about historiography, or the writing of history, and metafiction, or fiction that makes us aware of the craft of fiction. The theories regarding the “new mestiza” consciousness are from Gloria Anzaldua. This is a feminist theory that is contextualized on the historic oppression of women during Spanish colonization and its resulting patriarchal structures in society, and how women can seek to free themselves from such residual structures. Finally, the article touches upon a Filipina feminist perspective on the novel and what it signifies for the Philippine female experience.

  7. Differential impact of relevant and irrelevant dimension primes on rule-based and information-integration category learning.

    Science.gov (United States)

    Grimm, Lisa R; Maddox, W Todd

    2013-11-01

    Research has identified multiple category-learning systems with each being "tuned" for learning categories with different task demands and each governed by different neurobiological systems. Rule-based (RB) classification involves testing verbalizable rules for category membership while information-integration (II) classification requires the implicit learning of stimulus-response mappings. In the first study to directly test rule priming with RB and II category learning, we investigated the influence of the availability of information presented at the beginning of the task. Participants viewed lines that varied in length, orientation, and position on the screen, and were primed to focus on stimulus dimensions that were relevant or irrelevant to the correct classification rule. In Experiment 1, we used an RB category structure, and in Experiment 2, we used an II category structure. Accuracy and model-based analyses suggested that a focus on relevant dimensions improves RB task performance later in learning while a focus on an irrelevant dimension improves II task performance early in learning. © 2013.

  8. Bern-Kosower rule for scalar QED

    International Nuclear Information System (INIS)

    Daikouji, K.; Shino, M.; Sumino, Y.

    1996-01-01

    We derive a full Bern-Kosower-type rule for scalar QED starting from quantum field theory: we derive a set of rules for calculating S-matrix elements for any processes at any order of the coupling constant. A gauge-invariant set of diagrams in general is first written in the world line path-integral expression. Then we integrate over x(τ), and the resulting expression is given in terms of a correlation function on the world line left-angle x(τ)x(τ ' )right-angle. Simple rules to decompose the correlation function into basic elements are obtained. A gauge transformation known as the integration by parts technique can be used to reduce the number of independent terms before integration over proper-time variables. The surface terms can be omitted provided the external scalars are on shell. Also, we clarify correspondence to the conventional Feynman rule, which enabled us to avoid any ambiguity coming from the infinite dimensionality of the path-integral approach. copyright 1996 The American Physical Society

  9. Mechanisms of rule acquisition and rule following in inductive reasoning.

    Science.gov (United States)

    Crescentini, Cristiano; Seyed-Allaei, Shima; De Pisapia, Nicola; Jovicich, Jorge; Amati, Daniele; Shallice, Tim

    2011-05-25

    Despite the recent interest in the neuroanatomy of inductive reasoning processes, the regional specificity within prefrontal cortex (PFC) for the different mechanisms involved in induction tasks remains to be determined. In this study, we used fMRI to investigate the contribution of PFC regions to rule acquisition (rule search and rule discovery) and rule following. Twenty-six healthy young adult participants were presented with a series of images of cards, each consisting of a set of circles numbered in sequence with one colored blue. Participants had to predict the position of the blue circle on the next card. The rules that had to be acquired pertained to the relationship among succeeding stimuli. Responses given by subjects were categorized in a series of phases either tapping rule acquisition (responses given up to and including rule discovery) or rule following (correct responses after rule acquisition). Mid-dorsolateral PFC (mid-DLPFC) was active during rule search and remained active until successful rule acquisition. By contrast, rule following was associated with activation in temporal, motor, and medial/anterior prefrontal cortex. Moreover, frontopolar cortex (FPC) was active throughout the rule acquisition and rule following phases before a rule became familiar. We attributed activation in mid-DLPFC to hypothesis generation and in FPC to integration of multiple separate inferences. The present study provides evidence that brain activation during inductive reasoning involves a complex network of frontal processes and that different subregions respond during rule acquisition and rule following phases.

  10. A (re escrita de textos em livros didáticos de língua portuguesa = The rewriting of texts portuguese didactic books

    Directory of Open Access Journals (Sweden)

    Adair Vieira Gonçalves

    2013-02-01

    Full Text Available A partir do quadro epistemológico do interacionismo sociodiscursivo (ISD de Bronckart (2003, dos aportes teórico-metodológicos para o ensino de língua materna de Schneuwly e Dolz (2004 e em concepções de reescrita dialógica (GONÇALVES; BAZARIM, 2009, investigaremos como duas coleções de Livros Didáticos recomendadas pelo Ministério da Educação - MEC- abordam a reescrita de gêneros no Ensino Fundamental – ciclo II. Para sua efetivação, nos apoiaremos no folhado textual de Bronckart (2003, que contempla a infraestrutura textual, os componentes de ação, discursivos e linguístico-discursivos. A coleção Português – uma proposta de letramento – foca capacidades discursivas em detrimento de capacidades acionais e linguístico-discursivas, além de as propostas de escrita/reescrita não pertencerem ao mesmo gênero dentro de uma unidade temática. A coleção Linguagens no século XXI, ao contrário, focaliza as três capacidades de linguagem analisadas e, sobretudo, favorece a escrita/reescrita do mesmo gênero dentro da unidade do LD.Parting from the epistemological frame of Bronckart's (2003 sociodiscursive interactionism, on the theorethical-methodological supports for the teaching of mother tongue of Schneuwly and Dolz (2004 and the dialogical rewriting' conceptions (GONÇALVES; BAZARIM, 2009, we investigate how two collections of didactic books recommended by Ministry of Education and Culture-MEC- approach textual gender's rewriting in Primary Education cycle II. For its fulfillment, we will uphold on Bronckart's (2003 textual leafy, which contemplates textual infrastructure, discursive and linguistic-discursive components of action. The Português – uma proposta para o letramento collection - focus discursive capacities in detriment of actions and linguistic-discursive capabilities, besides the writing/rewriting's proposals don't belong to the same textual genre inside a thematic unity. The Linguagens no S

  11. Rewrite history, make history. Woman as subject in Christine de Pizan and Margaret Cavendish

    Directory of Open Access Journals (Sweden)

    Paola Rudan

    2016-07-01

    Full Text Available In The City of Ladies and Bell in Campo, Christine de Pizan and Margaret Cavendish imagine women’s participation to war as a metaphor of the sexual conflict that they must fight in order to conquer their visibility in history. While Pizan rewrites history from women’s stand point and acknowledges the universal value of sexual difference for the plan of salvation, Cavendish moves within a modern frame and thinks history as the result of human action. In both cases, the tale of women’s participation to war allows criticizing the moral and normative implications of «nature».

  12. Integrals of Lagrange functions and sum rules

    Energy Technology Data Exchange (ETDEWEB)

    Baye, Daniel, E-mail: dbaye@ulb.ac.be [Physique Quantique, CP 165/82, Universite Libre de Bruxelles, B 1050 Bruxelles (Belgium); Physique Nucleaire Theorique et Physique Mathematique, CP 229, Universite Libre de Bruxelles, B 1050 Bruxelles (Belgium)

    2011-09-30

    Exact values are derived for some matrix elements of Lagrange functions, i.e. orthonormal cardinal functions, constructed from orthogonal polynomials. They are obtained with exact Gauss quadratures supplemented by corrections. In the particular case of Lagrange-Laguerre and shifted Lagrange-Jacobi functions, sum rules provide exact values for matrix elements of 1/x and 1/x{sup 2} as well as for the kinetic energy. From these expressions, new sum rules involving Laguerre and shifted Jacobi zeros and weights are derived. (paper)

  13. Electronuclear sum rules

    International Nuclear Information System (INIS)

    Arenhoevel, H.; Drechsel, D.; Weber, H.J.

    1978-01-01

    Generalized sum rules are derived by integrating the electromagnetic structure functions along lines of constant ratio of momentum and energy transfer. For non-relativistic systems these sum rules are related to the conventional photonuclear sum rules by a scaling transformation. The generalized sum rules are connected with the absorptive part of the forward scattering amplitude of virtual photons. The analytic structure of the scattering amplitudes and the possible existence of dispersion relations have been investigated in schematic relativistic and non-relativistic models. While for the non-relativistic case analyticity does not hold, the relativistic scattering amplitude is analytical for time-like (but not for space-like) photons and relations similar to the Gell-Mann-Goldberger-Thirring sum rule exist. (Auth.)

  14. Safe specification of operator precedence rules

    NARCIS (Netherlands)

    Afroozeh, A.; Brand, van den M.G.J.; Johnstone, A.; Scott, E.; Vinju, J.J.; Erwig, M.; Paige, R.F.; Van Wyk, E.

    2013-01-01

    In this paper we present an approach to specifying operator precedence based on declarative disambiguation constructs and an implementation mechanism based on grammar rewriting. We identify a problem with existing generalized context-free parsing and disambiguation technology: generating a correct

  15. Safe Specification of Operator Precedence Rules

    NARCIS (Netherlands)

    A. Afroozeh (Ali); M.G.J. van den Brand (Mark); A. Johnstone; E. Scott; J.J. Vinju (Jurgen); K. Czarnecki; G. Hedin

    2013-01-01

    htmlabstractIn this paper we present an approach to specifying opera- tor precedence based on declarative disambiguation constructs and an implementation mechanism based on grammar rewriting. We identify a problem with existing generalized context-free parsing and disambigua- tion technology:

  16. Laser writing and rewriting on YBa2Cu3O7 films

    International Nuclear Information System (INIS)

    Shen, Y.Q.; Freltoft, T.; Vase, P.

    1991-01-01

    High-resolution patterning (4 μm) has been achieved on epitaxial thin films of the high-temperature superconductor YBa 2 Cu 3 O 7-δ using laser writing. A focused laser beam is applied to write semiconducting patterns on superconducting films in a vacuum or in a nitrogen atmosphere. The semiconducting patterns are shown to be formed by a reduction of the oxygen content due to local heating caused by the laser beam. The process does not cause any structural damage and does not change the surface morphology. When reapplying the same laser beam and rewriting the film in an oxygen atmosphere, it is possible to restore the superconductive properties. The application of this method for production of superconducting microelectronic circuits is discussed

  17. Integrating semantic web and software agents : Exchanging RIF and BDI rules

    NARCIS (Netherlands)

    Gong, Y.; Overbeek, S.J.

    2011-01-01

    Software agents and rules are both used for creating flexibility. Exchanging rules between Semantic Web and agents can ensure consistency in rules and support easy updating and changing of rules. The Rule Interchange Format (RIF) is a new W3C recommendation Semantic Web standard for exchanging rules

  18. Design rules for phase-change materials in data storage applications

    Energy Technology Data Exchange (ETDEWEB)

    Lencer, Dominic; Salinga, Martin [I. Physikalisches Institut IA, RWTH Aachen University, 52056 Aachen (Germany); Wuttig, Matthias [I. Physikalisches Institut IA, RWTH Aachen University, 52056 Aachen (Germany); Juelich-Aachen Research Alliance, Section Fundamentals of Future Information Technology (JARA-FIT), 52056 Aachen (Germany)

    2011-05-10

    Phase-change materials can rapidly and reversibly be switched between an amorphous and a crystalline phase. Since both phases are characterized by very different optical and electrical properties, these materials can be employed for rewritable optical and electrical data storage. Hence, there are considerable efforts to identify suitable materials, and to optimize them with respect to specific applications. Design rules that can explain why the materials identified so far enable phase-change based devices would hence be very beneficial. This article describes materials that have been successfully employed and discusses common features regarding both typical structures and bonding mechanisms. It is shown that typical structural motifs and electronic properties can be found in the crystalline state that are indicative for resonant bonding, from which the employed contrast originates. The occurence of resonance is linked to the composition, thus providing a design rule for phase-change materials. This understanding helps to unravel characteristic properties such as electrical and thermal conductivity which are discussed in the subsequent section. Then, turning to the transition kinetics between the phases, the current understanding and modeling of the processes of amorphization and crystallization are discussed. Finally, present approaches for improved high-capacity optical discs and fast non-volatile electrical memories, that hold the potential to succeed present-day's Flash memory, are presented. (Copyright copyright 2011 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  19. Design rules for phase-change materials in data storage applications.

    Science.gov (United States)

    Lencer, Dominic; Salinga, Martin; Wuttig, Matthias

    2011-05-10

    Phase-change materials can rapidly and reversibly be switched between an amorphous and a crystalline phase. Since both phases are characterized by very different optical and electrical properties, these materials can be employed for rewritable optical and electrical data storage. Hence, there are considerable efforts to identify suitable materials, and to optimize them with respect to specific applications. Design rules that can explain why the materials identified so far enable phase-change based devices would hence be very beneficial. This article describes materials that have been successfully employed and dicusses common features regarding both typical structures and bonding mechanisms. It is shown that typical structural motifs and electronic properties can be found in the crystalline state that are indicative for resonant bonding, from which the employed contrast originates. The occurence of resonance is linked to the composition, thus providing a design rule for phase-change materials. This understanding helps to unravel characteristic properties such as electrical and thermal conductivity which are discussed in the subsequent section. Then, turning to the transition kinetics between the phases, the current understanding and modeling of the processes of amorphization and crystallization are discussed. Finally, present approaches for improved high-capacity optical discs and fast non-volatile electrical memories, that hold the potential to succeed present-day's Flash memory, are presented. Copyright © 2011 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  20. Dramatic Rewritings of the Spanish Golden Age Theater of Cervantes´s La fuerza de la sangre

    Directory of Open Access Journals (Sweden)

    Juan Manuel Escudero Baztán

    2013-12-01

    Full Text Available This paper analyzes the Golden age spanish theater recreations of Cervantes’s exemplary novel La fuerza de la sangre. Specifically, the paper reviews three important stages in these recreations: La fuerza de la sangre of Guillen de Castro, El agravio satisfecho de Castillo Solórzano, and No hay cosa como callar de Calderon de la Barca. Different rewrites indicate a close relationship between the three dramatic texts through intertextuality and other influences.

  1. Local structure of liquid Ge{sub 1}Sb{sub 2}Te{sub 4} for rewritable data storage use

    Energy Technology Data Exchange (ETDEWEB)

    Sun Zhimei; Zhou Jian [Department of Materials Science and Engineering, College of Materials, Xiamen University, 361005 (China); Blomqvist, Andreas; Ahuja, Rajeev [Division for Materials Theory, Department of Physics and Materials Science, Uppsala University, Box 530, SE-751 21, Uppsala (Sweden); Xu Lihua [Department of Inorganic Non-metallic Materials Science, School of Materials and Engineering, University of Science and Technology Beijing, 100083 (China)], E-mail: zhmsun2@yahoo.com, E-mail: zmsun@xmu.edu.cn

    2008-05-21

    Phase-change materials based on chalcogenide alloys have been widely used for optical data storage and are promising materials for nonvolatile electrical memory use. However, the mechanism behind the utilization is unclear as yet. Since the rewritable data storage involved an extremely fast laser melt-quenched process for chalcogenide alloys, the liquid structure of which is one key to investigating the mechanism of the fast reversible phase transition and hence rewritable data storage, here by means of ab initio molecular dynamics we have studied the local structure of liquid Ge{sub 1}Sb{sub 2}Te{sub 4}. The results show that the liquid structure gives a picture of most Sb atoms being octahedrally coordinated, and the coexistence of tetrahedral and fivefold coordination at octahedral sites for Ge atoms, while Te atoms are essentially fourfold and threefold coordinated at octahedral sites, as characterized by partial pair correlation functions and bond angle distributions. The local structure of liquid Ge{sub 1}Sb{sub 2}Te{sub 4} generally resembles that of the crystalline form, except for the much lower coordination number. It may be this unique liquid structure that results in the fast and reversible phase transition between crystalline and amorphous states.

  2. Rewriting traditional tales as multilingual narratives at elementary school: Problems and progress

    Directory of Open Access Journals (Sweden)

    Heather Lotherington

    2007-08-01

    Full Text Available Abstract For several years children at Joyce Public School have been rewriting traditional stories from localized cultural and linguistic perspectives, creating innovative, individualized narrative forms with digital technology. Our experimental multiliteracies research project is a collaboration of school and university teachers and researchers following a guided action research paradigm. The study has as one of its stated objectives the development of multilingual story retelling as a means of inexpensively supporting home language maintenance, fostering language awareness and aiding English as a second language learning in a community of high linguistic diversity. This paper tells our story thus far, focusing on how we have approached the creation of multilingual stories in heterogeneous, urban language classes, discussing stumbling blocks that have forced creative problem-solving and showcasing successes.

  3. Transcranial infrared laser stimulation improves rule-based, but not information-integration, category learning in humans.

    Science.gov (United States)

    Blanco, Nathaniel J; Saucedo, Celeste L; Gonzalez-Lima, F

    2017-03-01

    This is the first randomized, controlled study comparing the cognitive effects of transcranial laser stimulation on category learning tasks. Transcranial infrared laser stimulation is a new non-invasive form of brain stimulation that shows promise for wide-ranging experimental and neuropsychological applications. It involves using infrared laser to enhance cerebral oxygenation and energy metabolism through upregulation of the respiratory enzyme cytochrome oxidase, the primary infrared photon acceptor in cells. Previous research found that transcranial infrared laser stimulation aimed at the prefrontal cortex can improve sustained attention, short-term memory, and executive function. In this study, we directly investigated the influence of transcranial infrared laser stimulation on two neurobiologically dissociable systems of category learning: a prefrontal cortex mediated reflective system that learns categories using explicit rules, and a striatally mediated reflexive learning system that forms gradual stimulus-response associations. Participants (n=118) received either active infrared laser to the lateral prefrontal cortex or sham (placebo) stimulation, and then learned one of two category structures-a rule-based structure optimally learned by the reflective system, or an information-integration structure optimally learned by the reflexive system. We found that prefrontal rule-based learning was substantially improved following transcranial infrared laser stimulation as compared to placebo (treatment X block interaction: F(1, 298)=5.117, p=0.024), while information-integration learning did not show significant group differences (treatment X block interaction: F(1, 288)=1.633, p=0.202). These results highlight the exciting potential of transcranial infrared laser stimulation for cognitive enhancement and provide insight into the neurobiological underpinnings of category learning. Copyright © 2017 Elsevier Inc. All rights reserved.

  4. Rule-Governed Behavior: Teaching a Preliminary Repertoire of Rule-Following to Children With Autism

    OpenAIRE

    Tarbox, Jonathan; Zuckerman, Carrie K; Bishop, Michele R; Olive, Melissa L; O'Hora, Denis P

    2011-01-01

    Rule-governed behavior is generally considered an integral component of complex verbal repertoires but has rarely been the subject of empirical research. In particular, little or no previous research has attempted to establish rule-governed behavior in individuals who do not already display the repertoire. This study consists of two experiments that evaluated multiple exemplar training procedures for teaching a simple component skill, which may be necessary for developing a repertoire of rule...

  5. Rule-Governed Behavior: Teaching a Preliminary Repertoire of Rule-Following to Children with Autism

    Science.gov (United States)

    Tarbox, Jonathan; Zuckerman, Carrie K.; Bishop, Michele R.; Olive, Melissa L.; O'Hora, Denis P.

    2011-01-01

    Rule-governed behavior is generally considered an integral component of complex verbal repertoires but has rarely been the subject of empirical research. In particular, little or no previous research has attempted to establish rule-governed behavior in individuals who do not already display the repertoire. This study consists of two experiments…

  6. Symbolic Evaluation Graphs and Term Rewriting — A General Methodology for Analyzing Logic Programs

    DEFF Research Database (Denmark)

    Giesl, J.; Ströder, T.; Schneider-Kamp, P.

    2013-01-01

    There exist many powerful techniques to analyze termination and complexity of term rewrite systems (TRSs). Our goal is to use these techniques for the analysis of other programming languages as well. For instance, approaches to prove termination of definite logic programs by a transformation...... to TRSs have been studied for decades. However, a challenge is to handle languages with more complex evaluation strategies (such as Prolog, where predicates like the cut influence the control flow). We present a general methodology for the analysis of such programs. Here, the logic program is first...... information on the termination or complexity of the original logic program. More information can be found in the full paper [1]. © 2013 Springer-Verlag....

  7. ReWritable Data Storage on DVD by Using Phase Change Technology

    Science.gov (United States)

    Kleine, H.; Martin, F.; Kapeller, M.; Cord, B.; Ebinger, H.

    It is expected that the next few years the VHS casette will be replaced by rewritable Digital Versatile Discs (DVD) for home video recording. At this moment three different standards DVD+RW, DVD-RW and DVD-RAM exist, out of which the DVD+RW is expected to dominate the market in Europe and the United States. The disc holds 4.7 GB of computer data, which is equivalent to several hours of high quality video content. At the heart of the disc is a thin film layer stack with a special phase change recording layer. By proper laser irradiation the disc can be overwritten up to 1000 times without noticeable quality loss. A shelf lifetime of 20-50 years is anticipated. With these characteristics the disc is well suited for consumer applications. The present article illuminates how a process engineer can control the disc recording sensitivity, the recording speed and the number of overwriting cycles by the design of the thin film layer stack.

  8. Sum rules in classical scattering

    International Nuclear Information System (INIS)

    Bolle, D.; Osborn, T.A.

    1981-01-01

    This paper derives sum rules associated with the classical scattering of two particles. These sum rules are the analogs of Levinson's theorem in quantum mechanics which provides a relationship between the number of bound-state wavefunctions and the energy integral of the time delay of the scattering process. The associated classical relation is an identity involving classical time delay and an integral over the classical bound-state density. We show that equalities between the Nth-order energy moment of the classical time delay and the Nth-order energy moment of the classical bound-state density hold in both a local and a global form. Local sum rules involve the time delay defined on a finite but otherwise arbitrary coordinate space volume S and the bound-state density associated with this same region. Global sum rules are those that obtain when S is the whole coordinate space. Both the local and global sum rules are derived for potentials of arbitrary shape and for scattering in any space dimension. Finally the set of classical sum rules, together with the known quantum mechanical analogs, are shown to provide a unified method of obtaining the high-temperature expansion of the classical, respectively the quantum-mechanical, virial coefficients

  9. « Et ils ne vécurent pas heureux » : la fin de Jane Eyre réécrite dans Charlotte de D.M. Thomas “And they didn’t live happily ever after”: D.M. Thomas’s Rewriting of the Ending of Jane Eyre in Charlotte

    Directory of Open Access Journals (Sweden)

    Armelle Parey

    2009-10-01

    Full Text Available D.M. Thomas’s rewriting of Jane Eyre in Charlotte (2000 takes the shape of a transformation of the ending which enables the second Mrs Rochester’s story to be continued in the West Indies, thus also acknowledging Jean Rhys’s Wide Sargasso Sea as another intertext. In order to challenge the narrative and ideological hierarchy of the source text by rewriting its ending, the pastiche defamiliarises it while some chapters set in 1999 move the limits of rewriting and take the reader into a narrative spiral.

  10. A system for nonmonotonic rules on the web

    NARCIS (Netherlands)

    Antoniou, G.; Bikakis, A.; Wagner, G.R.

    2004-01-01

    Defeasible reasoning is a rule-based approach for efficient reasoning with incomplete and inconsistent information. Such reasoning is, among others, useful for ontology integration, where conflicting information arises naturally; and for the modeling of business rules and policies, where rules with

  11. Don Quijote goes to Hollywood: The rewrite of myth by Charles Chaplin

    Directory of Open Access Journals (Sweden)

    Esther Bautista Naranjo

    2015-12-01

    Full Text Available The character of Charlot, created by Charles Chaplin, rewrites the myth of don Quixote in silent movies. While sharing the roots of the picaresque tradition, they represent a harsh criticism of modernity in all its stages. A distinction has to be made between the plain vaudevillesque humor of Charlot in the brief comic strips from 1914 and its tragi-comical shaping in some short films from 1915 up to Modern Times (1936. Beyond their mere physical aspects and their hilarious exploits, an underlying tragic heroism and idealism lead them to uphold all good causes and to support the wronged ones while they also struggle for survival. Charlot combines the comic with the sublime and, as well as the ingenious hidalgo, his soul becomes gradually fuller, deeper and more human. For all these reasons, this character could be regarded as a “quixote” of the big screen.

  12. A Hybrid Approach for NER System for Scarce Resourced Language-URDU: Integrating n-gram with Rules and Gazetteers

    Directory of Open Access Journals (Sweden)

    Saeeda Naz

    2015-10-01

    Full Text Available We present a hybrid NER (Name Entity Recognition system for Urdu script by integration of n-gram model (unigram and bigram, rules and gazetteers. We used prefix and suffix characters for rule construction instead of first name and last name lists or potential terms on the output list that is produced by n-gram model. Evaluation of the system is performed on two corpora, the IJCNLP NE (Named Entity corpus and CRL NE corpus in Urdu text. The system achieved 92.65 and 87.6% using hybrid unigram and 92.47 and 86.83% using hybrid bigram on IJCNLP NE corpus and CRL NE corpus, respectively.

  13. On Generating Discrete Integrable Systems via Lie Algebras and Commutator Equations

    International Nuclear Information System (INIS)

    Zhang Yu-Feng; Tam, Honwah

    2016-01-01

    In the paper, we introduce the Lie algebras and the commutator equations to rewrite the Tu-d scheme for generating discrete integrable systems regularly. By the approach the various loop algebras of the Lie algebra A_1 are defined so that the well-known Toda hierarchy and a novel discrete integrable system are obtained, respectively. A reduction of the later hierarchy is just right the famous Ablowitz–Ladik hierarchy. Finally, via two different enlarging Lie algebras of the Lie algebra A_1, we derive two resulting differential-difference integrable couplings of the Toda hierarchy, of course, they are all various discrete expanding integrable models of the Toda hierarchy. When the introduced spectral matrices are higher degrees, the way presented in the paper is more convenient to generate discrete integrable equations than the Tu-d scheme by using the software Maple. (paper)

  14. Sum Rules, Classical and Quantum - A Pedagogical Approach

    Science.gov (United States)

    Karstens, William; Smith, David Y.

    2014-03-01

    Sum rules in the form of integrals over the response of a system to an external probe provide general analytical tools for both experiment and theory. For example, the celebrated f-sum rule gives a system's plasma frequency as an integral over the optical-dipole absorption spectrum regardless of the specific spectral distribution. Moreover, this rule underlies Smakula's equation for the number density of absorbers in a sample in terms of the area under their absorption bands. Commonly such rules are derived from quantum-mechanical commutation relations, but many are fundamentally classical (independent of ℏ) and so can be derived from more transparent mechanical models. We have exploited this to illustrate the fundamental role of inertia in the case of optical sum rules. Similar considerations apply to sum rules in many other branches of physics. Thus, the ``attenuation integral theorems'' of ac circuit theory reflect the ``inertial'' effect of Lenz's Law in inductors or the potential energy ``storage'' in capacitors. These considerations are closely related to the fact that the real and imaginary parts of a response function cannot be specified independently, a result that is encapsulated in the Kramers-Kronig relations. Supported in part by the US Department of Energy, Office of Nuclear Physics under contract DE-AC02-06CH11357.

  15. Naphthalene based AIE active stimuli-responsive material as rewritable media for temporary communication

    Science.gov (United States)

    Pannipara, Mehboobali; Al-Sehemi, Abdullah G.; Kalam, Abul; Asiri, Abdullah M.

    2017-10-01

    Organic molecules having extended π-conjugated moieties is useful for creating 'dynamic' functional materials by modulating the photophysical properties and molecular packing through non-covalent interactions. Herein, we report the photoluminescence properties of a luminogen, NBA, exhibiting aggregation-induced emission (AIE) characteristics, synthesized by Knoevenagel condensation reaction between 2-Hydroxy naphthaldehyde and malononitrile. NBA emits strongly upon aggregation and in solid state with large Stokes shift whereas it is non emissive in pure solvents. The aggregation induced emission behavior of the compound was carried out in DMSO (good solvent)-water mixture (poor solvent) with water fraction (fw) ranging from 0% to 98%. The AIE property of the luminogen were further exploited for fabricating rewritable fluorescent paper substrates that found applications in security printing and data storage where the written images or letters stored on the filter paper are invisible under normal light.

  16. Connection between Fourier coefficient and Discretized Cartesian path integration

    International Nuclear Information System (INIS)

    Coalson, R.D.

    1986-01-01

    The relationship between so-called Discretized and Fourier coefficient formulations of Cartesian path integration is examined. In particular, an intimate connection between the two is established by rewriting the Discretized formulation in a manifestly Fourier-like way. This leads to improved understanding of both the limit behavior and the convergence properties of computational prescriptions based on the two formalisms. The performance of various prescriptions is compared with regard to calculation of on-diagonal statistical density matrix elements for a number of prototypical 1-d potentials. A consistent convergence order among these prescriptions is established

  17. Rewriting the Metabolic Blueprint: Advances in Pathway Diversification in Microorganisms

    Directory of Open Access Journals (Sweden)

    Gazi Sakir Hossain

    2018-02-01

    Full Text Available Living organisms have evolved over millions of years to fine tune their metabolism to create efficient pathways for producing metabolites necessary for their survival. Advancement in the field of synthetic biology has enabled the exploitation of these metabolic pathways for the production of desired compounds by creating microbial cell factories through metabolic engineering, thus providing sustainable routes to obtain value-added chemicals. Following the past success in metabolic engineering, there is increasing interest in diversifying natural metabolic pathways to construct non-natural biosynthesis routes, thereby creating possibilities for producing novel valuable compounds that are non-natural or without elucidated biosynthesis pathways. Thus, the range of chemicals that can be produced by biological systems can be expanded to meet the demands of industries for compounds such as plastic precursors and new antibiotics, most of which can only be obtained through chemical synthesis currently. Herein, we review and discuss novel strategies that have been developed to rewrite natural metabolic blueprints in a bid to broaden the chemical repertoire achievable in microorganisms. This review aims to provide insights on recent approaches taken to open new avenues for achieving biochemical production that are beyond currently available inventions.

  18. Rewriting the Metabolic Blueprint: Advances in Pathway Diversification in Microorganisms.

    Science.gov (United States)

    Hossain, Gazi Sakir; Nadarajan, Saravanan Prabhu; Zhang, Lei; Ng, Tee-Kheang; Foo, Jee Loon; Ling, Hua; Choi, Won Jae; Chang, Matthew Wook

    2018-01-01

    Living organisms have evolved over millions of years to fine tune their metabolism to create efficient pathways for producing metabolites necessary for their survival. Advancement in the field of synthetic biology has enabled the exploitation of these metabolic pathways for the production of desired compounds by creating microbial cell factories through metabolic engineering, thus providing sustainable routes to obtain value-added chemicals. Following the past success in metabolic engineering, there is increasing interest in diversifying natural metabolic pathways to construct non-natural biosynthesis routes, thereby creating possibilities for producing novel valuable compounds that are non-natural or without elucidated biosynthesis pathways. Thus, the range of chemicals that can be produced by biological systems can be expanded to meet the demands of industries for compounds such as plastic precursors and new antibiotics, most of which can only be obtained through chemical synthesis currently. Herein, we review and discuss novel strategies that have been developed to rewrite natural metabolic blueprints in a bid to broaden the chemical repertoire achievable in microorganisms. This review aims to provide insights on recent approaches taken to open new avenues for achieving biochemical production that are beyond currently available inventions.

  19. Path integral formulation and Feynman rules for phylogenetic branching models

    Energy Technology Data Exchange (ETDEWEB)

    Jarvis, P D; Bashford, J D; Sumner, J G [School of Mathematics and Physics, University of Tasmania, GPO Box 252C, 7001 Hobart, TAS (Australia)

    2005-11-04

    A dynamical picture of phylogenetic evolution is given in terms of Markov models on a state space, comprising joint probability distributions for character types of taxonomic classes. Phylogenetic branching is a process which augments the number of taxa under consideration, and hence the rank of the underlying joint probability state tensor. We point out the combinatorial necessity for a second-quantized, or Fock space setting, incorporating discrete counting labels for taxa and character types, to allow for a description in the number basis. Rate operators describing both time evolution without branching, and also phylogenetic branching events, are identified. A detailed development of these ideas is given, using standard transcriptions from the microscopic formulation of non-equilibrium reaction-diffusion or birth-death processes. These give the relations between stochastic rate matrices, the matrix elements of the corresponding evolution operators representing them, and the integral kernels needed to implement these as path integrals. The 'free' theory (without branching) is solved, and the correct trilinear 'interaction' terms (representing branching events) are presented. The full model is developed in perturbation theory via the derivation of explicit Feynman rules which establish that the probabilities (pattern frequencies of leaf colourations) arising as matrix elements of the time evolution operator are identical with those computed via the standard analysis. Simple examples (phylogenetic trees with two or three leaves), are discussed in detail. Further implications for the work are briefly considered including the role of time reparametrization covariance.

  20. Path integral formulation and Feynman rules for phylogenetic branching models

    International Nuclear Information System (INIS)

    Jarvis, P D; Bashford, J D; Sumner, J G

    2005-01-01

    A dynamical picture of phylogenetic evolution is given in terms of Markov models on a state space, comprising joint probability distributions for character types of taxonomic classes. Phylogenetic branching is a process which augments the number of taxa under consideration, and hence the rank of the underlying joint probability state tensor. We point out the combinatorial necessity for a second-quantized, or Fock space setting, incorporating discrete counting labels for taxa and character types, to allow for a description in the number basis. Rate operators describing both time evolution without branching, and also phylogenetic branching events, are identified. A detailed development of these ideas is given, using standard transcriptions from the microscopic formulation of non-equilibrium reaction-diffusion or birth-death processes. These give the relations between stochastic rate matrices, the matrix elements of the corresponding evolution operators representing them, and the integral kernels needed to implement these as path integrals. The 'free' theory (without branching) is solved, and the correct trilinear 'interaction' terms (representing branching events) are presented. The full model is developed in perturbation theory via the derivation of explicit Feynman rules which establish that the probabilities (pattern frequencies of leaf colourations) arising as matrix elements of the time evolution operator are identical with those computed via the standard analysis. Simple examples (phylogenetic trees with two or three leaves), are discussed in detail. Further implications for the work are briefly considered including the role of time reparametrization covariance

  1. Novel scenarios of early animal evolution--is it time to rewrite textbooks?

    Science.gov (United States)

    Dohrmann, Martin; Wörheide, Gert

    2013-09-01

    Understanding how important phenotypic, developmental, and genomic features of animals originated and evolved is essential for many fields of biological research, but such understanding depends on robust hypotheses about the phylogenetic interrelationships of the higher taxa to which the studied species belong. Molecular approaches to phylogenetics have proven able to revolutionize our knowledge of organismal evolution. However, with respect to the deepest splits in the metazoan Tree of Life-the relationships between Bilateria and the four non-bilaterian phyla (Porifera, Placozoa, Ctenophora, and Cnidaria)-no consensus has been reached yet, since a number of different, often contradictory, hypotheses with sometimes spectacular implications have been proposed in recent years. Here, we review the recent literature on the topic and contrast it with more classical perceptions based on analyses of morphological characters. We conclude that the time is not yet ripe to rewrite zoological textbooks and advocate a conservative approach when it comes to developing scenarios of the early evolution of animals.

  2. The diamond rule for multi-loop Feynman diagrams

    International Nuclear Information System (INIS)

    Ruijl, B.; Ueda, T.; Vermaseren, J.A.M.

    2015-01-01

    An important aspect of improving perturbative predictions in high energy physics is efficiently reducing dimensionally regularised Feynman integrals through integration by parts (IBP) relations. The well-known triangle rule has been used to achieve simple reduction schemes. In this work we introduce an extensible, multi-loop version of the triangle rule, which we refer to as the diamond rule. Such a structure appears frequently in higher-loop calculations. We derive an explicit solution for the recursion, which prevents spurious poles in intermediate steps of the computations. Applications for massless propagator type diagrams at three, four, and five loops are discussed

  3. Rule representation using linked data technologies

    NARCIS (Netherlands)

    Zhang, C.; Beetz, J.

    2016-01-01

    In this paper, we report a prototype rule checking system based on Semantic Web and Linked Data technologies. This research aims to find a method to represent rules outside of specific systems, and can be used to integrate and share them among different organizations. In this system we propose to

  4. Health care fraud and abuse data collection program: technical revisions to Healthcare Integrity and Protection Data Bank data collection activities. Final rule.

    Science.gov (United States)

    2004-09-21

    The rule finalizes technical changes to the Healthcare Integrity and Protection Data Bank (HIPDB) data collection reporting requirements by clarifying the types of personal numeric identifiers that may be reported to the data bank in connection with adverse actions. The rule clarifies that in lieu of a Social Security Number (SSN), an individual taxpayer identification number (ITIN) may be reported to the data bank when, in those limited situations, an individual does not have an SSN.

  5. Open Graphs and Computational Reasoning

    Directory of Open Access Journals (Sweden)

    Lucas Dixon

    2010-06-01

    Full Text Available We present a form of algebraic reasoning for computational objects which are expressed as graphs. Edges describe the flow of data between primitive operations which are represented by vertices. These graphs have an interface made of half-edges (edges which are drawn with an unconnected end and enjoy rich compositional principles by connecting graphs along these half-edges. In particular, this allows equations and rewrite rules to be specified between graphs. Particular computational models can then be encoded as an axiomatic set of such rules. Further rules can be derived graphically and rewriting can be used to simulate the dynamics of a computational system, e.g. evaluating a program on an input. Examples of models which can be formalised in this way include traditional electronic circuits as well as recent categorical accounts of quantum information.

  6. Integrals over products of distributions and coordinate independence of zero-temperature path integrals

    International Nuclear Information System (INIS)

    Kleinert, H.; Chervyakov, A.

    2003-01-01

    In perturbative calculations of quantum-statistical zero-temperature path integrals in curvilinear coordinates one encounters Feynman diagrams involving multiple temporal integrals over products of distributions, which are mathematically undefined. In addition, there are terms proportional to powers of Dirac δ-functions at the origin coming from the measure of path integration. We give simple rules for integrating products of distributions in such a way that the results ensure coordinate independence of the path integrals. The rules are derived by using equations of motion and partial integration, while keeping track of certain minimal features originating in the unique definition of all singular integrals in 1-ε dimensions. Our rules yield the same results as the much more cumbersome calculations in 1-ε dimensions where the limit ε→0 is taken at the end. They also agree with the rules found in an independent treatment on a finite time interval

  7. Persistent Rule-Following in the Face of Reversed Reinforcement Contingencies: The Differential Impact of Direct Versus Derived Rules.

    Science.gov (United States)

    Harte, Colin; Barnes-Holmes, Yvonne; Barnes-Holmes, Dermot; McEnteggart, Ciara

    2017-11-01

    Rule-governed behavior and its role in generating insensitivity to direct contingencies of reinforcement have been implicated in human psychological suffering. In addition, the human capacity to engage in derived relational responding has also been used to explain specific human maladaptive behaviors, such as irrational fears. To date, however, very little research has attempted to integrate research on contingency insensitivity and derived relations. The current work sought to fill this gap. Across two experiments, participants received either a direct rule (Direct Rule Condition) or a rule that involved a novel derived relational response (Derived Rule Condition). Provision of a direct rule resulted in more persistent rule-following in the face of competing contingencies, but only when the opportunity to follow the reinforced rule beforehand was relatively protracted. Furthermore, only in the Direct Rule Condition were there significant correlations between rule-compliance and stress. A post hoc interpretation of the findings is provided.

  8. Logical-rules and the classification of integral dimensions: Individual differences in the processing of arbitrary dimensions

    Directory of Open Access Journals (Sweden)

    Anthea G. Blunden

    2015-01-01

    Full Text Available A variety of converging operations demonstrate key differences between separable dimensions, which can be analyzed independently, and integral dimensions, which are processed in a non-analytic fashion. A recent investigation of response time distributions, applying a set of logical rule-based models, demonstrated that integral dimensions are pooled into a single coactive processing channel, in contrast to separable dimensions, which are processed in multiple, independent processing channels. This paper examines the claim that arbitrary dimensions created by factorially morphing four faces are processed in an integral manner (i.e., coactively. In two experiments, sixteen participants completed a categorization task in which either upright or inverted morph stimuli were classified in a speeded fashion. Analyses focused on contrasting different assumptions about the psychological representation of the stimuli, perceptual and decisional separability, and the processing architecture. We report consistent individual differences which demonstrate a mixture of some observers who demonstrate coactive processing with other observers who process the dimensions in a parallel self-terminating manner.

  9. Rewriting Revolutionary Myths: Photography in Castro’s Cuba and Tania Bruguera’s Tatlin’s Whisper#6

    Directory of Open Access Journals (Sweden)

    Louisa Söllner

    2014-11-01

    Full Text Available Photography was a key medium for creating, spreading, and cementing myths about the Cuban Revolution and its leaders. In the first part of this essay, I’ll explore several iconic images as well as responses to these pictures, all parts of a Cuban “cross-national memory discourse” (cf. Quiroga, 2005. Walter Benjamin’s media philosophy can help in developing insights about the functioning of these photographs. In the second part of the paper, I turn to Tania Bruguera’s piece Tatlin’s Whisper#6 (staged at the 10th Havana Biennial in 2009, which radically rewrites the poetics of the images and aspires to create a sense of participation and direct involvement.

  10. Rewriting the Matrix of Life. Biomedia Between Ecological Crisis and Playful Actions

    Directory of Open Access Journals (Sweden)

    Christoph Neubert, Serjoscha Wiemer

    2014-09-01

    Full Text Available The paper discusses concepts of ‘nature’ and ‘life’ as subjected to historical changes. The 21st century seems to be obsessed with ‘life’ and ‘nature’, which are reconfigured as objects of simulation practices and of a multitude of technoscientific enterprises as well as of political struggle. The historical influences and epistemological shifts of systems thinking are significant within two distinctive and interwoven fields: On the one hand the discourse of environmentalism with the paradigm of ecological crises, centered around ideas of resource management, sustainability, the general idea of an ‘endangered nature’ and the interconnectedness of global politics and individual actions. On the other hand the optimistic promises of artificial life, with synthetic biology and digital cyborg technologies as its avantgarde, which are very much driven by the idea of technoscientific mastery to surpass natures ‘weakness’ and by desires to improve ‘life’ and to even refashion ‘life itself’. On the field of historical ecology, concepts of systems thinking are traced back to the middle of the 19th century, where ecological thought emerged at the intersections of biology and geography. Meandering between vitalistic, holistic, and mechanistic concepts, between living and non-living elements, systems ecology finally substitutes ‘nature’, which in turn is re-established in its new ‘gestalt’ as computer simulated world model since the early 1970s. Resurrected as an interrelation of system variables at the level of global simulations ‘nature’ strikes as a zombie. As a second turning point of the rewriting of the matrix, of life we will discuss the advance of ‘games’ since the early 1970ies, with the example of ‘Game of life’ (‘Life’ as a significant landmark. When ‘life’ becomes ‘Life’, it is by computerized modeling in terms of dynamic processes. Computer games can be thought of as instances of

  11. Electromagnetic compatibility design and cabling system rules

    International Nuclear Information System (INIS)

    Raimbourg, J.

    2009-01-01

    This report is devoted to establish EMC (Electromagnetic Compatibility) design and cabling system rules. It is intended for hardware designers in charge of designing electronic maps or integrating existing materials into a comprehensive system. It is a practical guide. The rules described in this document do not require enhanced knowledge of advanced mathematical or physical concepts. The key point is to understand phenomena with a pragmatic approach to highlight the design and protection rules. (author)

  12. Ruling in or ruling out thyroid malignancy by molecular diagnostics of thyroid nodules

    DEFF Research Database (Denmark)

    Eszlinger, Markus; Hegedüs, László; Paschke, Ralf

    2014-01-01

    Routine morphologic cytology is the basis for any kind of (integrated) molecular FNA diagnostics. The rule out (gene expression classifier) approach requires confirmation by independent studies, whereas the rule in approach (detection of BRAF, NRAS, HRAS, and KRAS and PAX8/PPARG- and RET....../PTC rearrangements) has been investigated by several groups with overall reproducible results. Moreover, molecular screening for point mutations and rearrangements is feasible in routine air-dried FNA smears, offering several advantages over obtaining additional fresh FNA material. The current panel of somatic...

  13. Typed Multiset Rewriting Specifications of Security Protocols

    Science.gov (United States)

    2011-10-01

    how to determine a specific set pAq of Dolev-Yao intruder roles from any given derivation A of Σ R. It does so by mapping each rule instance...occurring in A to zero or more intruder roles from Section 8.1. We then define pRq as pAq . This definition entails that the encoding of any active role...privK k,Σ3); ∆ a A k (∆, k′) with ∆′ = (∆, k′). Recall that pAq = (IPV,DUP). E0 :: · . [p∆q] IPV,DUP Σ⊕ΣDY −→ [p∆q] (·→I(k′))I,DUP Σ⊕ΣDY by rule

  14. Rules, culture, and fitness.

    Science.gov (United States)

    Baum, W M

    1995-01-01

    Behavior analysis risks intellectual isolation unless it integrates its explanations with evolutionary theory. Rule-governed behavior is an example of a topic that requires an evolutionary perspective for a full understanding. A rule may be defined as a verbal discriminative stimulus produced by the behavior of a speaker under the stimulus control of a long-term contingency between the behavior and fitness. As a discriminative stimulus, the rule strengthens listener behavior that is reinforced in the short run by socially mediated contingencies, but which also enters into the long-term contingency that enhances the listener's fitness. The long-term contingency constitutes the global context for the speaker's giving the rule. When a rule is said to be "internalized," the listener's behavior has switched from short- to long-term control. The fitness-enhancing consequences of long-term contingencies are health, resources, relationships, or reproduction. This view ties rules both to evolutionary theory and to culture. Stating a rule is a cultural practice. The practice strengthens, with short-term reinforcement, behavior that usually enhances fitness in the long run. The practice evolves because of its effect on fitness. The standard definition of a rule as a verbal statement that points to a contingency fails to distinguish between a rule and a bargain ("If you'll do X, then I'll do Y"), which signifies only a single short-term contingency that provides mutual reinforcement for speaker and listener. In contrast, the giving and following of a rule ("Dress warmly; it's cold outside") can be understood only by reference also to a contingency providing long-term enhancement of the listener's fitness or the fitness of the listener's genes. Such a perspective may change the way both behavior analysts and evolutionary biologists think about rule-governed behavior.

  15. 75 FR 19827 - Acquisition Regulation Rewrite

    Science.gov (United States)

    2010-04-15

    ... receive. We have found good cause to publish this rule without prior proposal. We have determined that it...) of the same clause: ``Downloadable hotline posters as well as instructions for obtaining a hard copy poster are available at http://www.doioig.gov/hotline .'' PART 1404--ADMINISTRATIVE MATTERS Subpart 1404...

  16. GraDit: graph-based data repair algorithm for multiple data edits rule violations

    Science.gov (United States)

    Ode Zuhayeni Madjida, Wa; Gusti Bagus Baskara Nugraha, I.

    2018-03-01

    Constraint-based data cleaning captures data violation to a set of rule called data quality rules. The rules consist of integrity constraint and data edits. Structurally, they are similar, where the rule contain left hand side and right hand side. Previous research proposed a data repair algorithm for integrity constraint violation. The algorithm uses undirected hypergraph as rule violation representation. Nevertheless, this algorithm can not be applied for data edits because of different rule characteristics. This study proposed GraDit, a repair algorithm for data edits rule. First, we use bipartite-directed hypergraph as model representation of overall defined rules. These representation is used for getting interaction between violation rules and clean rules. On the other hand, we proposed undirected graph as violation representation. Our experimental study showed that algorithm with undirected graph as violation representation model gave better data quality than algorithm with undirected hypergraph as representation model.

  17. Integrated Association Rules Complete Hiding Algorithms

    Directory of Open Access Journals (Sweden)

    Mohamed Refaat Abdellah

    2017-01-01

    Full Text Available This paper presents database security approach for complete hiding of sensitive association rules by using six novel algorithms. These algorithms utilize three new weights to reduce the needed database modifications and support complete hiding, as well as they reduce the knowledge distortion and the data distortions. Complete weighted hiding algorithms enhance the hiding failure by 100%; these algorithms have the advantage of performing only a single scan for the database to gather the required information to form the hiding process. These proposed algorithms are built within the database structure which enables the sanitized database to be generated on run time as needed.

  18. Bringing Agility to Business Process Management: Rules Deployment in an SOA

    Science.gov (United States)

    El Kharbili, Marwane; Keil, Tobias

    Business process management (BPM) has emerged as paradigm for integrating business strategies and enterprise architecture (EA). In this context, BPM implementation on top of web-service-based service oriented architectures is an accepted approach as shown by great amount of literature. One concern in this regard is how-to make BPs reactive to change. Our approach to the problem is the integration of business rule management (BRM) and BPM by allowing modeling of decisions hard-coded in BPs as separate business rules (BRs). These BRs become EA assets and need to be exploited when executing BPs. We motivate why BPM needs agility and discuss what requirements on BPM this poses. This paper presents prototyping work conducted at a BP modeling and analysis vendor which weeks to showcase how using business rule management (BRM) as a mean for modeling decisions can help achieve a much sought-after agility to BPM. This prototype relies on the integrated modeling of business rules (BRs) and BPs, and rule deployment as web services part of an SOA.

  19. Sum rules in the response function method

    International Nuclear Information System (INIS)

    Takayanagi, Kazuo

    1990-01-01

    Sum rules in the response function method are studied in detail. A sum rule can be obtained theoretically by integrating the imaginary part of the response function over the excitation energy with a corresponding energy weight. Generally, the response function is calculated perturbatively in terms of the residual interaction, and the expansion can be described by diagrammatic methods. In this paper, we present a classification of the diagrams so as to clarify which diagram has what contribution to which sum rule. This will allow us to get insight into the contributions to the sum rules of all the processes expressed by Goldstone diagrams. (orig.)

  20. Static and Dynamic Membrane Structures

    Directory of Open Access Journals (Sweden)

    Sergiu Ivanov

    2012-10-01

    Full Text Available While originally P systems were defined to contain multiset rewriting rules, it turned out that considering different types of rules may produce important results, such as increasing the computational power of the rules. This paper focuses on factoring out the concept of a membrane structure out of various P system models with the goal of providing useful formalisations. Both static and dynamic membrane structures are considered.

  1. The fairy tale: recent interpretations, female characters and contemporary rewriting. Considerations about an “irresistible” genre

    Directory of Open Access Journals (Sweden)

    Susanna Barsotti

    2015-07-01

    Full Text Available Since the ancient times, the fairy tale manages to catch the imagination of human beings everywhere in the world. Its appeal comes to us even thanks to reinterpretations, constant contaminations from different media, from the oral writing, from cinema to theatre, from advertising to animation. This article will highlight the key features of a very much analysed genre, after the most recent studies and will follow it also by referring to the new routes that it has embarked on in our time. Special attention is then paid on the woman presence and on her origin and evolution that she, in her most varied personifications – innocent girl persecuted by the fairy and by the witch – has suffered up to the latest rewriting of the fairy tales.

  2. 3He electron scattering sum rules

    International Nuclear Information System (INIS)

    Kim, Y.E.; Tornow, V.

    1982-01-01

    Electron scattering sum rules for 3 He are derived with a realistic ground-state wave function. The theoretical results are compared with the experimentally measured integrated cross sections. (author)

  3. A Multi-Addressable Dyad with Switchable CMY Colors for Full-Color Rewritable Papers.

    Science.gov (United States)

    Qin, Tianyou; Han, Jiaqi; Geng, Yue; Ju, Le; Sheng, Lan; Zhang, Sean Xiao-An

    2018-06-23

    Reversible multicolor displays on solid media using single molecule pigments have been a long-awaited goal. Herein, a new and simple molecular dyad, which can undergo switchable CMY color changes both in solution and solid substrate upon exposure to light, water/acid, and nucleophiles, is designed and synthesized. The stimuli used in this work can be applied independent of each other, which is beneficial for color changes without mutual interference. As a comparison, the mixtures of the two molecular switching motifs forming the basis of the dyad were also studied. The dyad greatly outperforms the corresponding mixed system with respect to reversible color-switching on the paper substrate. Its potential for full-color rewritable paper with excellent reversibility has been demonstrated. Legible multicolor prints, that is, high color contrast and resolution, good dispersion, excellent reversibility, were achieved using common water-jet and light-based printers. This work provides a very promising approach for further development of full-color switchable molecules, materials and displays. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  4. Rules-based analysis with JBoss Drools: adding intelligence to automation

    International Nuclear Information System (INIS)

    Ley, E. de; Jacobs, D.

    2012-01-01

    Rule engines are specialized software systems for applying conditional actions (if/then rules) on data. They are also known as 'production rule systems'. Rules engines are less-known as software technology than the traditional procedural, object-oriented, scripting or dynamic development languages. This is a pity, as their usage may offer an important enrichment to a development toolbox. JBoss Drools is an open-source rules engine that can easily be embedded in any Java application. Through an integration in our Passerelle process automation suite, we have been able to provide advanced solutions for intelligent process automation, complex event processing, system monitoring and alarming, automated repair etc. This platform has been proven for many years as an automated diagnosis and repair engine for Belgium's largest telecom provider, and it is being piloted at Synchrotron Soleil for device monitoring and alarming. After an introduction to rules engines in general and JBoss Drools in particular, we will present its integration in a solution platform, some important principles and a practical use case. (authors)

  5. 'instantaneous velocimetry' using an interferometer

    Indian Academy of Sciences (India)

    2017-02-08

    Feb 8, 2017 ... Abstract. A conceptually new approach is proposed to estimate the thermal diffusivity of optically transparent ... the proposed approaches closely match with the literature value. ... Using the chain rule we can rewrite eq.

  6. Type Families with Class, Type Classes with Family

    DEFF Research Database (Denmark)

    Serrano, Alejandro; Hage, Jurriaan; Bahr, Patrick

    2015-01-01

    Type classes and type families are key ingredients in Haskell programming. Type classes were introduced to deal with ad-hoc polymorphism, although with the introduction of functional dependencies, their use expanded to type-level programming. Type families also allow encoding type-level functions......, now as rewrite rules. This paper looks at the interplay of type classes and type families, and how to deal with shortcomings in both of them. Furthermore, we show how to use families to simulate classes at the type level. However, type families alone are not enough for simulating a central feature...... of type classes: elaboration, that is, generating code from the derivation of a rewriting. We look at ways to solve this problem in current Haskell, and propose an extension to allow elaboration during the rewriting phase....

  7. Pochhammer symbol with negative indices. A new rule for the method of brackets

    Directory of Open Access Journals (Sweden)

    Gonzalez Ivan

    2016-01-01

    Full Text Available The method of brackets is a method of integration based upon a small number of heuristic rules. Some of these have been made rigorous. An example of an integral involving the Bessel function is used to motivate a new evaluation rule.

  8. Book Review | Robertson | African Review of Economics and Finance

    African Journals Online (AJOL)

    Abstract. China's Superbank: Debt, Oil and Influence - How China Development Bank is Rewriting the Rules of Finance Henry Sanderson and Michael Forsythe. John Wiley & Sons, Singapore, 2013, 181 pp. ISBN: 978-1-118-17636-8 ...

  9. Hamiltonian path integrals

    International Nuclear Information System (INIS)

    Prokhorov, L.V.

    1982-01-01

    The properties of path integrals associated with the allowance for nonstandard terms reflecting the operator nature of the canonical variables are considered. Rules for treating such terms (''equivalence rules'') are formulated. Problems with a boundary, the behavior of path integrals under canonical transformations, and the problem of quantization of dynamical systems with constraints are considered in the framework of the method

  10. The mapping approach in the path integral formalism applied to curve-crossing systems

    International Nuclear Information System (INIS)

    Novikov, Alexey; Kleinekathoefer, Ulrich; Schreiber, Michael

    2004-01-01

    The path integral formalism in a combined phase-space and coherent-state representation is applied to the problem of curve-crossing dynamics. The system of interest is described by two coupled one-dimensional harmonic potential energy surfaces interacting with a heat bath consisting of harmonic oscillators. The mapping approach is used to rewrite the Lagrangian function of the electronic part of the system. Using the Feynman-Vernon influence-functional method the bath is eliminated whereas the non-Gaussian part of the path integral is treated using the generating functional for the electronic trajectories. The dynamics of a Gaussian wave packet is analyzed along a one-dimensional reaction coordinate within a perturbative treatment for a small coordinate shift between the potential energy surfaces

  11. Anachronism and the rewriting of history: the South Africa case

    Directory of Open Access Journals (Sweden)

    Georgi Verbeeck

    2006-04-01

    Full Text Available The use and abuse of anachronism is often seen as the quintessence of the writing of history. Historians tend to conceive it as the hardcore of their métier to avoid anachronism. It designates a confusion in order of time, especially the mistake of placing an event, attitude, or circumstance too early. The awareness of historical anachronism is omnipresent in times of a radical rewriting of history, in particular as a result of political transformation. History reflects the needs and ambitions of a political context, and the sense of what is deemed historically significant does not remain unattached hereby. Chronology and anachronism are essential to particular conceptions of history, and if history is in a process of being rewritten, they are the first items to be addressed by the defenders of the old system and the advocates of a new discourse. In political debates on the use or abuse of history anachronism is often seen as ultimate proof of the (un-reliability of new insights and conceptions. As anachronism is defined as a way of transferring contemporary sets of values, assumptions and interpretative categories, every political reorientation inevitably provokes a discussion on that level. If a ‘new nation’ is in search of a ‘new past’, a new reflection on the basic categories of historical thinking becomes necessary. The changing discourses in South African historiography since the end of Apartheid serve here as an illuminative example.

  12. Sum rules for nuclear collective excitations

    International Nuclear Information System (INIS)

    Bohigas, O.

    1978-07-01

    Characterizations of the response function and of integral properties of the strength function via a moment expansion are discussed. Sum rule expressions for the moments in the RPA are derived. The validity of these sum rules for both density independent and density dependent interactions is proved. For forces of the Skyrme type, analytic expressions for the plus one and plus three energy weighted sum rules are given for isoscalar monopole and quadrupole operators. From these, a close relationship between the monopole and quadrupole energies is shown and their dependence on incompressibility and effective mass is studied. The inverse energy weighted sum rule is computed numerically for the monopole operator, and an upper bound for the width of the monopole resonance is given. Finally the reliability of moments given by the RPA with effective interactions is discussed using simple soluble models for the hamiltonian, and also by comparison with experimental data

  13. Rationale, design, and implementation protocol of an electronic health record integrated clinical prediction rule (iCPR randomized trial in primary care

    Directory of Open Access Journals (Sweden)

    Wisnivesky Juan

    2011-09-01

    Full Text Available Abstract Background Clinical prediction rules (CPRs represent well-validated but underutilized evidence-based medicine tools at the point-of-care. To date, an inability to integrate these rules into an electronic health record (EHR has been a major limitation and we are not aware of a study demonstrating the use of CPR's in an ambulatory EHR setting. The integrated clinical prediction rule (iCPR trial integrates two CPR's in an EHR and assesses both the usability and the effect on evidence-based practice in the primary care setting. Methods A multi-disciplinary design team was assembled to develop a prototype iCPR for validated streptococcal pharyngitis and bacterial pneumonia CPRs. The iCPR tool was built as an active Clinical Decision Support (CDS tool that can be triggered by user action during typical workflow. Using the EHR CDS toolkit, the iCPR risk score calculator was linked to tailored ordered sets, documentation, and patient instructions. The team subsequently conducted two levels of 'real world' usability testing with eight providers per group. Usability data were used to refine and create a production tool. Participating primary care providers (n = 149 were randomized and intervention providers were trained in the use of the new iCPR tool. Rates of iCPR tool triggering in the intervention and control (simulated groups are monitored and subsequent use of the various components of the iCPR tool among intervention encounters is also tracked. The primary outcome is the difference in antibiotic prescribing rates (strep and pneumonia iCPR's encounters and chest x-rays (pneumonia iCPR only between intervention and control providers. Discussion Using iterative usability testing and development paired with provider training, the iCPR CDS tool leverages user-centered design principles to overcome pervasive underutilization of EBM and support evidence-based practice at the point-of-care. The ongoing trial will determine if this collaborative

  14. Integration by parts for the L^r Henstock-Kurzweil integral

    Directory of Open Access Journals (Sweden)

    Paul Musial

    2015-02-01

    Full Text Available Musial and Sagher [4] described a Henstock-Kurzweil type integral that integrates $L^r$-derivatives. In this article, we develop a product rule for the $L^r$-derivative and then an integration by parts formula.

  15. Selection rule for Dirac-like points in two-dimensional dielectric photonic crystals

    KAUST Repository

    Li, Yan

    2013-01-01

    We developed a selection rule for Dirac-like points in two-dimensional dielectric photonic crystals. The rule is derived from a perturbation theory and states that a non-zero, mode-coupling integral between the degenerate Bloch states guarantees a Dirac-like point, regardless of the type of the degeneracy. In fact, the selection rule can also be determined from the symmetry of the Bloch states even without computing the integral. Thus, the existence of Dirac-like points can be quickly and conclusively predicted for various photonic crystals independent of wave polarization, lattice structure, and composition. © 2013 Optical Society of America.

  16. Empowering African women and communities through agriculture ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2011-11-23

    Nov 23, 2011 ... Njuki is rewriting the rule book on how agricultural research is done throughout Africa, drawing on her work on the impacts of livestock and market interventions. With support from ... A new era for gender research. Jemimah ...

  17. Health care fraud and abuse data collection program: technical revisions to healthcare integrity and protection data bank data collection activities. Interim final rule with comment period.

    Science.gov (United States)

    2004-06-17

    The rule makes technical changes to the Healthcare Integrity and Protection Data Bank (HIPDB) data collection reporting requirements set forth in 45 CFR part 61 by clarifying the types of personal numeric identifiers that may be reported to the data bank in connection with adverse actions. Specifically, the rule clarifies that in lieu of a Social Security Number (SSN), an individual taxpayer identification number (ITIN) may be reported to the data bank when, in those limited situations, an individual does not have an SSN.

  18. Sum rules for collisional processes

    International Nuclear Information System (INIS)

    Oreg, J.; Goldstein, W.H.; Bar-Shalom, A.; Klapisch, M.

    1991-01-01

    We derive level-to-configuration sum rules for dielectronic capture and for collisional excitation and ionization. These sum rules give the total transition rate from a detailed atomic level to an atomic configuration. For each process, we show that it is possible to factor out the dependence on continuum-electron wave functions. The remaining explicit level dependence of each rate is then obtained from the matrix element of an effective operator acting on the bound orbitals only. In a large class of cases, the effective operator reduces to a one-electron monopole whose matrix element is proportional to the statistical weight of the level. We show that even in these cases, nonstatistical level dependence enters through the dependence of radial integrals on continuum orbitals. For each process, explicit analytic expressions for the level-to-configuration sum rules are given for all possible cases. Together with the well-known J-file sum rule for radiative rates [E. U. Condon and G. H. Shortley, The Theory of Atomic Spectra (University Press, Cambridge, 1935)], the sum rules offer a systematic and efficient procedure for collapsing high-multiplicity configurations into ''effective'' levels for the purpose of modeling the population kinetics of ionized heavy atoms in plasma

  19. New Brunswick electricity market rules : summary

    International Nuclear Information System (INIS)

    2004-02-01

    The electricity market rules for New Brunswick were reviewed with particular reference to two broad classifications. The first classification is based on the roles and responsibilities of the system operator (SO) in facilitating the Bilateral Contract market, as well as the role of market participants in participating in the Bilateral Contract market. The second classification is based on the roles and responsibilities of each of the SO, market participants and transmitters in maintaining the reliability of the integrated electricity system and ensuring a secure supply of electricity for consumers in New Brunswick. The market rules consist of 10 chapters entitled: (1) introduction to the market rules and administrative rules of general application, (2) market participation and the use of the SO-controlled grid, (3) market administration, (4) technical and connection requirements, testing and commissioning, (5) system reliability, (6) operational requirements, (7) settlement, (8) connection of new or modified facilities, (9) transmission system planning, investment and operation, and (10) definitions and interpretation

  20. Sum rules for four-spinon dynamic structure factor in XXX model

    International Nuclear Information System (INIS)

    Si Lakhal, B.; Abada, A.

    2005-01-01

    In the context of the antiferromagnetic spin 12 Heisenberg quantum spin chain (XXX model), we estimate the contribution of the exact four-spinon dynamic structure factor S 4 by calculating a number of sum rules the total dynamic structure factor S is known to satisfy exactly. These sum rules are: the static susceptibility, the integrated intensity, the total integrated intensity, the first frequency moment and the nearest-neighbor correlation function. We find that the contribution of S 4 is between 1% and 2.5%, depending on the sum rule, whereas the contribution of the exact two-spinon dynamic structure factor S 2 is between 70% and 75%. The calculations are numerical and Monte Carlo based. Good statistics are obtained

  1. The rewritable effects of bonded magnet for large starting torque and high efficiency in the small power single-phase written pole motor

    Science.gov (United States)

    Choi, Jae-Hak; Lee, Sung-Ho

    2009-04-01

    This paper presents a single-phase written pole motor using a bonded ring magnet for the small power home application. The motor has an exciter pole structure inside the stator and hybrid characteristics of an induction motor and permanent magnet motor. The design parameters and operating characteristics of the hybrid concept motor are investigated to increase starting torque and efficiency, which is most important for the small power home application. Larger starting torque and higher efficiency than those of the conventional induction motor could be obtained by using the rewritable characteristics of bonded magnet on the starting and running conditions.

  2. FCJ-180 Spotify has Added an Event to your Past: (Rewriting the Self through Facebook’s Autoposting Apps

    Directory of Open Access Journals (Sweden)

    Tanya Kant

    2015-08-01

    Full Text Available Drawing on in-depth interviews with sixteen Facebook users, this paper presents a series of vignettes that explore cross-platform Facebook apps as ‘tools’ for self-writing, self-expression and identity performance. The paper argues that the capacity of apps to write in the user’s stead – at times without the user’s knowledge or explicit consent – works to intervene in and on occasion disrupt users’ staged self-performances to their ‘invisible audience’ (Sauter, 2013 on Facebook. Furthermore, if such instances of automated self-writing are treated as performative, apps hold the constitutional capacity to actively rewrite, regulate and even constitute the self to suit the logic of the ‘like economy’ (Gelitz and Helmond, 2013, in ways that transcend the boundaries of Facebook.

  3. Rule base system in developing groundwater pollution expert system: predicting model

    International Nuclear Information System (INIS)

    Mongkon Ta-oun; Mohamed Daud; Mohd Zohadie Bardaie; Shamshuddin Jusop

    2000-01-01

    New techniques are now available for use in the protection of the environment. One of these techniques is the use of expert system for prediction groundwater pollution potential. Groundwater Pollution Expert system (GWPES) rules are a collection of principles and procedures used to know the comprehension of groundwater pollution prediction. The rules of groundwater pollution expert system in the form of questions, choice, radio-box, slide rule, button or frame are translated in to IF-THEN rule. The rules including of variables, types, domains and descriptions were used by the function of wxCLIPS (C Language Integrate Production System) expert system shell. (author)

  4. The α3S corrections to the Bjorken sum rule for polarized electro-production and to the Gross-Llewellyn Smith sum rule

    International Nuclear Information System (INIS)

    Larin, S.A.; Nationaal Inst. voor Kernfysica en Hoge-Energiefysica; Vermaseren, J.A.M.

    1990-01-01

    The next-next-to-leading order QCD corrections to the Gross-Llewellyn Smith sum rule for deep inelastic neutrino-nucleon scattering and to the Bjorken sum rule for polarized electron-nucleon scattering have been computed. This involved the proper treatment of γ 5 inside the loop integrals with dimensional regularization. It is found that the difference between the two sum rules are entirely due to a class of 6 three loop graphs and is of the order of 1% of the leading QCD term. Hence the Q 2 behavior of both sum rules should be the same if the physics is described adequately by the lower order terms of perturbative QCD. (author). 12 refs.; 2 figs.; 4 tabs

  5. Deriving Process Congruences from Reaction Rules

    DEFF Research Database (Denmark)

    Sobocinski, Pawel

    of adhesive categories, we shall present a con� struction of GRPOs in input�linear cospan bicategories. As an immediate application, we shall shed light on as well as extend the theory of rewriting via borrowed contexts, due to Ehrig and K ̈onig. Secondly, we shall examine the implications of the construction...... form a category which has certain colimits. We shall begin by extending Leifer and Milner’s theory of reactive sys� tems to a 2�categorical setting. This development is motivated by the com� mon situation in which the contexts of a reactive system contain non�trivial algebraic structure...

  6. Compton scattering from nuclei and photo-absorption sum rules

    International Nuclear Information System (INIS)

    Gorchtein, Mikhail; Hobbs, Timothy; Londergan, J. Timothy; Szczepaniak, Adam P.

    2011-01-01

    We revisit the photo-absorption sum rule for real Compton scattering from the proton and from nuclear targets. In analogy with the Thomas-Reiche-Kuhn sum rule appropriate at low energies, we propose a new 'constituent quark model' sum rule that relates the integrated strength of hadronic resonances to the scattering amplitude on constituent quarks. We study the constituent quark model sum rule for several nuclear targets. In addition, we extract the α=0 pole contribution for both proton and nuclei. Using the modern high-energy proton data, we find that the α=0 pole contribution differs significantly from the Thomson term, in contrast with the original findings by Damashek and Gilman.

  7. Two heads are better than one, but how much? Evidence that people's use of causal integration rules does not always conform to normative standards.

    Science.gov (United States)

    Vadillo, Miguel A; Ortega-Castro, Nerea; Barberia, Itxaso; Baker, A G

    2014-01-01

    Many theories of causal learning and causal induction differ in their assumptions about how people combine the causal impact of several causes presented in compound. Some theories propose that when several causes are present, their joint causal impact is equal to the linear sum of the individual impact of each cause. However, some recent theories propose that the causal impact of several causes needs to be combined by means of a noisy-OR integration rule. In other words, the probability of the effect given several causes would be equal to the sum of the probability of the effect given each cause in isolation minus the overlap between those probabilities. In the present series of experiments, participants were given information about the causal impact of several causes and then they were asked what compounds of those causes they would prefer to use if they wanted to produce the effect. The results of these experiments suggest that participants actually use a variety of strategies, including not only the linear and the noisy-OR integration rules, but also averaging the impact of several causes.

  8. On the incomparability of Gamma and Linda

    NARCIS (Netherlands)

    G. Zavattaro (Gianluigi)

    1998-01-01

    htmlabstractWe compare Gamma and Linda, two of the most prominent coordination languages based on generative communication via a shared data space. In Gamma computation is obtained by applying multiset rewriting rules, reminiscent of the way chemical reactions happen in a solution. On the other

  9. Prototyping SOS meta-theory in Maude

    NARCIS (Netherlands)

    Mousavi, M.R.; Reniers, M.A.; Mosses, P.D.; Ulidowski, I.

    2006-01-01

    We present a prototype implementation of SOS meta-theory in the Maude term rewriting language. The prototype defines the basic concepts of SOS meta-theory (e.g., transition formulae, deduction rules and transition system specifications) in Maude. Besides the basic definitions, we implement methods

  10. 77 FR 41481 - Integration of Variable Energy Resources

    Science.gov (United States)

    2012-07-13

    ... point to the importance of the Proposed Rule in removing market barriers to VER integration. NextEra... Commission's initiative to remove market and operational barriers to VERs integration and eliminate undue... Commission 18 CFR Part 35 Integration of Variable Energy Resources; Final Rule #0;#0;Federal Register / Vol...

  11. Re-thinking representations, re-writing nursing texts: possibilities through feminist and Foucauldian thought.

    Science.gov (United States)

    Huntington, A D; Gilmour, J A

    2001-09-01

    Critical approaches are increasingly being used to inform theory and research within the discipline of nursing. In this paper we discuss the work of feminist writers, particularly those located within the postmodern, and Michel Foucault. Their work, although having significant points of difference, can be viewed as complementary and our engagement with these ideas has led us to re-think nursing knowledge. Using ideas from Foucault and postmodern feminism foregrounds critical questions such as whose knowledge is visible in nursing literature, whose is suppressed, and the power relationships reflected in representations of knowledge. Our exploration of representations of knowledge has led us to review fundamental nursing texts that we consider to be important political and ideological artefacts in the enculturation of student nurses. The dominant position of medical knowledge in the texts reviewed continues to position this 'voice' as primary in nursing literature. Drawing on our current research on endometriosis to illustrate the potential inherent in rewriting such texts, we argue for a repositioning of knowledge related to the illness experience. Privileging the voices of people who are the focus of our clinical care reflects the reality of nurses' work; the embodied experience of the person is made visible rather than marginalized in the illness discourse.

  12. Cutkosky rules for superstring field theory

    International Nuclear Information System (INIS)

    Pius, Roji; Sen, Ashoke

    2016-01-01

    Superstring field theory expresses the perturbative S-matrix of superstring theory as a sum of Feynman diagrams each of which is manifestly free from ultraviolet divergences. The interaction vertices fall off exponentially for large space-like external momenta making the ultraviolet finiteness property manifest, but blow up exponentially for large time-like external momenta making it impossible to take the integration contours for loop energies to lie along the real axis. This forces us to carry out the integrals over the loop energies by choosing appropriate contours in the complex plane whose ends go to infinity along the imaginary axis but which take complicated form in the interior navigating around the various poles of the propagators. We consider the general class of quantum field theories with this property and prove Cutkosky rules for the amplitudes to all orders in perturbation theory. Besides having applications to string field theory, these results also give an alternative derivation of Cutkosky rules in ordinary quantum field theories.

  13. Spectral sum rule for time delay in R2

    International Nuclear Information System (INIS)

    Osborn, T.A.; Sinha, K.B.; Bolle, D.; Danneels, C.

    1985-01-01

    A local spectral sum rule for nonrelativistic scattering in two dimensions is derived for the potential class velement ofL 4 /sup // 3 (R 2 ). The sum rule relates the integral over all scattering energies of the trace of the time-delay operator for a finite region Σis contained inR 2 to the contributions in Σ of the pure point and singularly continuous spectra

  14. Application of a generalized Leibniz rule for calculating electromagnetic fields within continuous source regions

    International Nuclear Information System (INIS)

    Silberstein, M.

    1991-01-01

    In deriving the electric and magnetic fields in a continuous source region by differentiating the vector potential, Yaghjian (1985) explains that the central obstacle is the dependence of the integration limits on the differentiation variable. Since it is not mathematically rigorous to assume the curl and integral signs are interchangeable, he uses an integration variable substitution to circumvent this problematic dependence. Here, an alternative derivation is presented, which evaluates the curl of the vector potential volume integral directly, retaining the dependence of the limits of integration on the differentiation variable. It involves deriving a three-dimensional version of Leibniz' rule for differentiating an integral with variable limits of integration, and using the generalized rule to find the Maxwellian and cavity fields in the source region. 7 refs

  15. Designing driver assistance systems with crossmodal signals: multisensory integration rules for saccadic reaction times apply.

    Directory of Open Access Journals (Sweden)

    Rike Steenken

    Full Text Available Modern driver assistance systems make increasing use of auditory and tactile signals in order to reduce the driver's visual information load. This entails potential crossmodal interaction effects that need to be taken into account in designing an optimal system. Here we show that saccadic reaction times to visual targets (cockpit or outside mirror, presented in a driving simulator environment and accompanied by auditory or tactile accessories, follow some well-known spatiotemporal rules of multisensory integration, usually found under confined laboratory conditions. Auditory nontargets speed up reaction time by about 80 ms. The effect tends to be maximal when the nontarget is presented 50 ms before the target and when target and nontarget are spatially coincident. The effect of a tactile nontarget (vibrating steering wheel was less pronounced and not spatially specific. It is shown that the average reaction times are well-described by the stochastic "time window of integration" model for multisensory integration developed by the authors. This two-stage model postulates that crossmodal interaction occurs only if the peripheral processes from the different sensory modalities terminate within a fixed temporal interval, and that the amount of crossmodal interaction manifests itself in an increase or decrease of second stage processing time. A qualitative test is consistent with the model prediction that the probability of interaction, but not the amount of crossmodal interaction, depends on target-nontarget onset asynchrony. A quantitative model fit yields estimates of individual participants' parameters, including the size of the time window. Some consequences for the design of driver assistance systems are discussed.

  16. Sanitizing sensitive association rules using fuzzy correlation scheme

    International Nuclear Information System (INIS)

    Hameed, S.; Shahzad, F.; Asghar, S.

    2013-01-01

    Data mining is used to extract useful information hidden in the data. Sometimes this extraction of information leads to revealing sensitive information. Privacy preservation in Data Mining is a process of sanitizing sensitive information. This research focuses on sanitizing sensitive rules discovered in quantitative data. The proposed scheme, Privacy Preserving in Fuzzy Association Rules (PPFAR) is based on fuzzy correlation analysis. In this work, fuzzy set concept is integrated with fuzzy correlation analysis and Apriori algorithm to mark interesting fuzzy association rules. The identified rules are called sensitive. For sanitization, we use modification technique where we substitute maximum value of fuzzy items with zero, which occurs most frequently. Experiments demonstrate that PPFAR method hides sensitive rules with minimum modifications. The technique also maintains the modified data's quality. The PPFAR scheme has applications in various domains e.g. temperature control, medical analysis, travel time prediction, genetic behavior prediction etc. We have validated the results on medical dataset. (author)

  17. How Power-Laws Re-Write The Rules Of Cyber Warfare

    Directory of Open Access Journals (Sweden)

    David L. Bibighaus

    2015-12-01

    Full Text Available All warfare contains and element of randomness. This article will argue that, the kind uncertainty encountered in cyber warfare (Power-Law randomness is fundamentally different from the uncertainty the military has evolved to deal with in the physical world (Gaussian-Randomness. The article will explain the difference between these two kinds of randomness, and how cyber weapons appear to operate under Power-Law randomness. It then will show how in cyberspace, key aspects of strategic thought are based on a flaws assumption of randomness. Finally, this article shall argue that if the American military is going to be effective in cyberspace, it must re-examine the way the military assumes risk, recruits is forces, plans for war and maintains the peace.

  18. Analytic representations of Yang–Mills amplitudes

    Energy Technology Data Exchange (ETDEWEB)

    Bjerrum-Bohr, N.E.J. [Niels Bohr International Academy and Discovery Center, The Niels Bohr Institute, University of Copenhagen, Blegdamsvej 17, DK-2100 Copenhagen Ø (Denmark); Bourjaily, Jacob L., E-mail: bourjaily@nbi.ku.dk [Niels Bohr International Academy and Discovery Center, The Niels Bohr Institute, University of Copenhagen, Blegdamsvej 17, DK-2100 Copenhagen Ø (Denmark); Damgaard, Poul H. [Niels Bohr International Academy and Discovery Center, The Niels Bohr Institute, University of Copenhagen, Blegdamsvej 17, DK-2100 Copenhagen Ø (Denmark); Feng, Bo [Zhejiang Institute of Modern Physics, Zhejiang University, Hangzhou City, 310027 (China)

    2016-12-15

    Scattering amplitudes in Yang–Mills theory can be represented in the formalism of Cachazo, He and Yuan (CHY) as integrals over an auxiliary projective space—fully localized on the support of the scattering equations. Because solving the scattering equations is difficult and summing over the solutions algebraically complex, a method of directly integrating the terms that appear in this representation has long been sought. We solve this important open problem by first rewriting the terms in a manifestly Möbius-invariant form and then using monodromy relations (inspired by analogy to string theory) to decompose terms into those for which combinatorial rules of integration are known. The result is the foundations of a systematic procedure to obtain analytic, covariant forms of Yang–Mills tree-amplitudes for any number of external legs and in any number of dimensions. As examples, we provide compact analytic expressions for amplitudes involving up to six gluons of arbitrary helicities.

  19. Automatic inference of indexing rules for MEDLINE

    Directory of Open Access Journals (Sweden)

    Shooshan Sonya E

    2008-11-01

    Full Text Available Abstract Background: Indexing is a crucial step in any information retrieval system. In MEDLINE, a widely used database of the biomedical literature, the indexing process involves the selection of Medical Subject Headings in order to describe the subject matter of articles. The need for automatic tools to assist MEDLINE indexers in this task is growing with the increasing number of publications being added to MEDLINE. Methods: In this paper, we describe the use and the customization of Inductive Logic Programming (ILP to infer indexing rules that may be used to produce automatic indexing recommendations for MEDLINE indexers. Results: Our results show that this original ILP-based approach outperforms manual rules when they exist. In addition, the use of ILP rules also improves the overall performance of the Medical Text Indexer (MTI, a system producing automatic indexing recommendations for MEDLINE. Conclusion: We expect the sets of ILP rules obtained in this experiment to be integrated into MTI.

  20. Thin-plate spline quadrature of geodetic integrals

    Science.gov (United States)

    Vangysen, Herman

    1989-01-01

    Thin-plate spline functions (known for their flexibility and fidelity in representing experimental data) are especially well-suited for the numerical integration of geodetic integrals in the area where the integration is most sensitive to the data, i.e., in the immediate vicinity of the evaluation point. Spline quadrature rules are derived for the contribution of a circular innermost zone to Stoke's formula, to the formulae of Vening Meinesz, and to the recursively evaluated operator L(n) in the analytical continuation solution of Molodensky's problem. These rules are exact for interpolating thin-plate splines. In cases where the integration data are distributed irregularly, a system of linear equations needs to be solved for the quadrature coefficients. Formulae are given for the terms appearing in these equations. In case the data are regularly distributed, the coefficients may be determined once-and-for-all. Examples are given of some fixed-point rules. With such rules successive evaluation, within a circular disk, of the terms in Molodensky's series becomes relatively easy. The spline quadrature technique presented complements other techniques such as ring integration for intermediate integration zones.

  1. Robust Query Processing for Personalized Information Access on the Semantic Web

    DEFF Research Database (Denmark)

    Dolog, Peter; Stuckenschmidt, Heiner; Wache, Holger

    and user preferences. We describe a framework for information access that combines query refinement and relaxation in order to provide robust, personalized access to heterogeneous RDF data as well as an implementation in terms of rewriting rules and explain its application in the context of e-learning...

  2. A rule-based automatic sleep staging method.

    Science.gov (United States)

    Liang, Sheng-Fu; Kuo, Chin-En; Hu, Yu-Han; Cheng, Yu-Shian

    2012-03-30

    In this paper, a rule-based automatic sleep staging method was proposed. Twelve features including temporal and spectrum analyses of the EEG, EOG, and EMG signals were utilized. Normalization was applied to each feature to eliminating individual differences. A hierarchical decision tree with fourteen rules was constructed for sleep stage classification. Finally, a smoothing process considering the temporal contextual information was applied for the continuity. The overall agreement and kappa coefficient of the proposed method applied to the all night polysomnography (PSG) of seventeen healthy subjects compared with the manual scorings by R&K rules can reach 86.68% and 0.79, respectively. This method can integrate with portable PSG system for sleep evaluation at-home in the near future. Copyright © 2012 Elsevier B.V. All rights reserved.

  3. Q2 evolution of generalized Baldin sum rule for the proton

    International Nuclear Information System (INIS)

    Liang, Y.; Christy, M. E.; Ent, R.; Keppel, C. E.

    2006-01-01

    The generalized Baldin sum rule for virtual photon scattering, the unpolarized analogy of the generalized Gerasimov-Drell-Hearn integral provides an important way to investigate the transition between perturbative QCD and hadronic descriptions of nucleon structure. This sum rule requires integration of the nucleon structure function F 1 , which until recently had not been measured at low Q 2 and large x, i.e., in the nucleon resonance region. This work uses new data from inclusive electron-proton scattering in the resonance region obtained at Jefferson Lab, in combination with SLAC deep inelastic scattering data, to present first precision measurements of the generalized Baldin integral for the proton in the Q 2 range of 0.3 to 4.0 GeV 2

  4. Organizational Knowledge Transfer Using Ontologies and a Rule-Based System

    Science.gov (United States)

    Okabe, Masao; Yoshioka, Akiko; Kobayashi, Keido; Yamaguchi, Takahira

    In recent automated and integrated manufacturing, so-called intelligence skill is becoming more and more important and its efficient transfer to next-generation engineers is one of the urgent issues. In this paper, we propose a new approach without costly OJT (on-the-job training), that is, combinational usage of a domain ontology, a rule ontology and a rule-based system. Intelligence skill can be decomposed into pieces of simple engineering rules. A rule ontology consists of these engineering rules as primitives and the semantic relations among them. A domain ontology consists of technical terms in the engineering rules and the semantic relations among them. A rule ontology helps novices get the total picture of the intelligence skill and a domain ontology helps them understand the exact meanings of the engineering rules. A rule-based system helps domain experts externalize their tacit intelligence skill to ontologies and also helps novices internalize them. As a case study, we applied our proposal to some actual job at a remote control and maintenance office of hydroelectric power stations in Tokyo Electric Power Co., Inc. We also did an evaluation experiment for this case study and the result supports our proposal.

  5. Model Development to Establish Integrated Operational Rule Curves for Hungry Horse and Libby Reservoirs - Montana, 1996 Final Report.

    Energy Technology Data Exchange (ETDEWEB)

    Marotz, Brian; Althen, Craig; Gustafson, Daniel

    1996-01-01

    Hungry Horse and Libby dams have profoundly affected the aquatic ecosystems in two major tributaries of the Columbia River by altering habitat and water quality, and by imposing barriers to fish migration. In 1980, the U.S. Congress passed the Pacific Northwest Electric Power Planning and Conservation Act, designed in part to balance hydropower development with other natural resources in the Columbia System. The Act formed the Northwest Power Planning Council (Council) who developed a program to protect, mitigate and enhance fish and wildlife on the Columbia River and its tributaries. Pursuant to the Council`s Fish and Wildlife Program for the Columbia River System (1987), we constructed computer models to simulate the trophic dynamics of the reservoir biota as related to dam operation. Results were used to develop strategies to minimize impacts and enhance the reservoir and riverine fisheries, following program measures 903(a)(1-4) and 903(b)(1-5). Two FORTRAN simulation models were developed for Hungry Horse and Libby reservoirs located in northwestern Montana. The models were designed to generate accurate, short-term predictions specific to two reservoirs and are not directly applicable to other waters. The modeling strategy, however, is portable to other reservoir systems where sufficient data are available. Reservoir operation guidelines were developed to balance fisheries concerns in the headwaters with anadromous species recovery actions in the lower Columbia (Biological Rule Curves). These BRCs were then integrated with power production and flood control to reduce the economic impact of basin-wide fisheries recovery actions. These Integrated Rule Curves (IRCs) were developed simultaneously in the Columbia Basin System Operation Review (SOR), the Council`s phase IV amendment process and recovery actions associated with endangered Columbia Basin fish species.

  6. Manufacturing process of rewritable CD and DVD; Kakikae gata CD, DVD no seizo process

    Energy Technology Data Exchange (ETDEWEB)

    Horie, M. [Mitsubishi Chemical Corp., Tokyo (Japan)

    1998-11-05

    Development of rewritable DVD is desired which has feedback compatibility with the existing players and ROM drives. The DVD is formed on a substrate with a thickness of 0.6 mm (dummy plate), and is composed of the multilayer film, i.e., protective coating made of UV hardening resin, reflective layer, dielectric protective layer, phase change type recording layer, and polycarbonate layer from the lower in order. A pair of dummy plates are pasted to enhance the mechanical strength, which has the same thickness of 1.2 mm as CD. Since the grooves and prepits are very fine, injection molding is more difficult compared with CD. Since a great stress change occurs during the formation and initialization processes of multilayer of phase change recording medium layer which is particular to DVD manufacturing process, control of warping is significant. Control of warping of the substrate is also significant, which affects the pasting and the whole process. The recording layer, dielectric protective layer and reflective layer are formed by the discharge spattering. The initialization is a particular process to the phase change medium. Complete non-recording state can be obtained by crystallizing the amorphous recording layer after the film formation. 3 figs.

  7. Designing business rules for mediation : a process towards agent-mediated business coordination

    OpenAIRE

    Zhao, Z.; Dignum, M.V.; Dignum, F.P.M.

    2008-01-01

    Business process integration is a very active research area, in which mediation is one of the fundamental architectural choices. Mediators have difficulties to design mediation services that meet the requirements of the different stakeholders. Business rules play an important role in the decision process of mediation. In this paper, we analyze the role of business rules in the decision process, and use some examples to illustrate how business rules should be designed in order to help the deci...

  8. The man revamping Brazil's approach to water quality | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2017-09-20

    Sep 20, 2017 ... Following the rupture of a large dam in southeastern Brazil, metal waste and mud flowed downstream, contaminating the water and wreaking havoc as the worst environmental disaster in the nation's history. Adalto Bianchini's research is helping the country rewrite its rules on one of its most precious ...

  9. Computational Nonlinear Morphology with Emphasis on Semitic Languages. Studies in Natural Language Processing.

    Science.gov (United States)

    Kiraz, George Anton

    This book presents a tractable computational model that can cope with complex morphological operations, especially in Semitic languages, and less complex morphological systems present in Western languages. It outlines a new generalized regular rewrite rule system that uses multiple finite-state automata to cater to root-and-pattern morphology,…

  10. Rule Systems for Runtime Verification: A Short Tutorial

    Science.gov (United States)

    Barringer, Howard; Havelund, Klaus; Rydeheard, David; Groce, Alex

    In this tutorial, we introduce two rule-based systems for on and off-line trace analysis, RuleR and LogScope. RuleR is a conditional rule-based system, which has a simple and easily implemented algorithm for effective runtime verification, and into which one can compile a wide range of temporal logics and other specification formalisms used for runtime verification. Specifications can be parameterized with data, or even with specifications, allowing for temporal logic combinators to be defined. We outline a number of simple syntactic extensions of core RuleR that can lead to further conciseness of specification but still enabling easy and efficient implementation. RuleR is implemented in Java and we will demonstrate its ease of use in monitoring Java programs. LogScope is a derivation of RuleR adding a simple very user-friendly temporal logic. It was developed in Python, specifically for supporting testing of spacecraft flight software for NASA’s next 2011 Mars mission MSL (Mars Science Laboratory). The system has been applied by test engineers to analysis of log files generated by running the flight software. Detailed logging is already part of the system design approach, and hence there is no added instrumentation overhead caused by this approach. While post-mortem log analysis prevents the autonomous reaction to problems possible with traditional runtime verification, it provides a powerful tool for test automation. A new system is being developed that integrates features from both RuleR and LogScope.

  11. Ontario emissions trading code : emission reduction credit creation, recording and transfer rules, rules for renewable energy projects and conservation projects, and rules for the operation of the Ontario Emissions Trading Registry

    International Nuclear Information System (INIS)

    2001-12-01

    Emissions trading has been an integral part of Ontario's air quality strategy since December 31, 2001. Ontario has adopted the 'cap, credit and trade' type of emissions trading system, a hybrid that takes the best features of pure 'cap-and-trade' and 'baseline-and-credit' type systems. It covers nitric oxide and sulphur dioxide. The Ontario Emissions Trading Code supplements Ontario Regulation 397/01 and sets out rules for renewable energy projects and conservation projects for which applications for emission allowances can be made. This Code describes the rules for the creation and transfer of emission reduction credits (ERCs). It also explains the rules for the operation of the registry that has been established to provide information to the public about the emissions trading program and records decisions about credit creation and credit and allowance retirement. 3 tabs

  12. A model of guarded recursion with clock synchronisation

    DEFF Research Database (Denmark)

    Bizjak, Aleš; Møgelberg, Rasmus Ejlers

    2015-01-01

    productivity to be captured in types. The calculus uses clocks representing time streams and clock quantifiers which allow limited and controlled elimination of modalities. The calculus has since been extended to dependent types by Møgelberg. Both works give denotational semantics but no rewrite semantics....... In previous versions of this calculus, different clocks represented separate time streams and clock synchronisation was prohibited. In this paper we show that allowing clock synchronisation is safe by constructing a new model of guarded recursion and clocks. This result will greatly simplify the type theory...... by removing freshness restrictions from typing rules, and is a necessary step towards defining rewrite semantics, and ultimately implementing the calculus....

  13. Integration of iRevive with the Lightweight Trauma Module

    Data.gov (United States)

    National Aeronautics and Space Administration — Key to this system is the collection and presentation of data. This has required: 1) rewriting the iRevive GUI and database codebase using current technology; 2)...

  14. A Scalable Data Integration and Analysis Architecture for Sensor Data of Pediatric Asthma.

    Science.gov (United States)

    Stripelis, Dimitris; Ambite, José Luis; Chiang, Yao-Yi; Eckel, Sandrah P; Habre, Rima

    2017-04-01

    According to the Centers for Disease Control, in the United States there are 6.8 million children living with asthma. Despite the importance of the disease, the available prognostic tools are not sufficient for biomedical researchers to thoroughly investigate the potential risks of the disease at scale. To overcome these challenges we present a big data integration and analysis infrastructure developed by our Data and Software Coordination and Integration Center (DSCIC) of the NIBIB-funded Pediatric Research using Integrated Sensor Monitoring Systems (PRISMS) program. Our goal is to help biomedical researchers to efficiently predict and prevent asthma attacks. The PRISMS-DSCIC is responsible for collecting, integrating, storing, and analyzing real-time environmental, physiological and behavioral data obtained from heterogeneous sensor and traditional data sources. Our architecture is based on the Apache Kafka, Spark and Hadoop frameworks and PostgreSQL DBMS. A main contribution of this work is extending the Spark framework with a mediation layer, based on logical schema mappings and query rewriting, to facilitate data analysis over a consistent harmonized schema. The system provides both batch and stream analytic capabilities over the massive data generated by wearable and fixed sensors.

  15. Business rules for creating process flexibility : Mapping RIF rules and BDI rules

    NARCIS (Netherlands)

    Gong, Y.; Overbeek, S.J.; Janssen, M.

    2011-01-01

    Business rules and software agents can be used for creating flexible business processes. The Rule Interchange Format (RIF) is a new W3C recommendation standard for exchanging rules among disparate systems. Yet, the impact that the introduction of RIF has on the design of flexible business processes

  16. Learning Expressive Linkage Rules for Entity Matching using Genetic Programming

    OpenAIRE

    Isele, Robert

    2013-01-01

    A central problem in data integration and data cleansing is to identify pairs of entities in data sets that describe the same real-world object. Many existing methods for matching entities rely on explicit linkage rules, which specify how two entities are compared for equivalence. Unfortunately, writing accurate linkage rules by hand is a non-trivial problem that requires detailed knowledge of the involved data sets. Another important issue is the efficient execution of link...

  17. Rule-Based Event Processing and Reaction Rules

    Science.gov (United States)

    Paschke, Adrian; Kozlenkov, Alexander

    Reaction rules and event processing technologies play a key role in making business and IT / Internet infrastructures more agile and active. While event processing is concerned with detecting events from large event clouds or streams in almost real-time, reaction rules are concerned with the invocation of actions in response to events and actionable situations. They state the conditions under which actions must be taken. In the last decades various reaction rule and event processing approaches have been developed, which for the most part have been advanced separately. In this paper we survey reaction rule approaches and rule-based event processing systems and languages.

  18. Almost Poisson integration of rigid body systems

    International Nuclear Information System (INIS)

    Austin, M.A.; Krishnaprasad, P.S.; Li-Sheng Wang

    1993-01-01

    In this paper we discuss the numerical integration of Lie-Poisson systems using the mid-point rule. Since such systems result from the reduction of hamiltonian systems with symmetry by lie group actions, we also present examples of reconstruction rules for the full dynamics. A primary motivation is to preserve in the integration process, various conserved quantities of the original dynamics. A main result of this paper is an O(h 3 ) error estimate for the Lie-Poisson structure, where h is the integration step-size. We note that Lie-Poisson systems appear naturally in many areas of physical science and engineering, including theoretical mechanics of fluids and plasmas, satellite dynamics, and polarization dynamics. In the present paper we consider a series of progressively complicated examples related to rigid body systems. We also consider a dissipative example associated to a Lie-Poisson system. The behavior of the mid-point rule and an associated reconstruction rule is numerically explored. 24 refs., 9 figs

  19. Complex-energy approach to sum rules within nuclear density functional theory

    Science.gov (United States)

    Hinohara, Nobuo; Kortelainen, Markus; Nazarewicz, Witold; Olsen, Erik

    2015-04-01

    Background: The linear response of the nucleus to an external field contains unique information about the effective interaction, the correlations governing the behavior of the many-body system, and the properties of its excited states. To characterize the response, it is useful to use its energy-weighted moments, or sum rules. By comparing computed sum rules with experimental values, the information content of the response can be utilized in the optimization process of the nuclear Hamiltonian or the nuclear energy density functional (EDF). But the additional information comes at a price: compared to the ground state, computation of excited states is more demanding. Purpose: To establish an efficient framework to compute energy-weighted sum rules of the response that is adaptable to the optimization of the nuclear EDF and large-scale surveys of collective strength, we have developed a new technique within the complex-energy finite-amplitude method (FAM) based on the quasiparticle random-phase approximation (QRPA). Methods: To compute sum rules, we carry out contour integration of the response function in the complex-energy plane. We benchmark our results against the conventional matrix formulation of the QRPA theory, the Thouless theorem for the energy-weighted sum rule, and the dielectric theorem for the inverse-energy-weighted sum rule. Results: We derive the sum-rule expressions from the contour integration of the complex-energy FAM. We demonstrate that calculated sum-rule values agree with those obtained from the matrix formulation of the QRPA. We also discuss the applicability of both the Thouless theorem about the energy-weighted sum rule and the dielectric theorem for the inverse-energy-weighted sum rule to nuclear density functional theory in cases when the EDF is not based on a Hamiltonian. Conclusions: The proposed sum-rule technique based on the complex-energy FAM is a tool of choice when optimizing effective interactions or energy functionals. The method

  20. Self-adaptive numerical integrator for analytic functions

    International Nuclear Information System (INIS)

    Garribba, S.; Quartapelle, L.; Reina, G.

    1978-01-01

    A new adaptive algorithm for the integration of analytical functions is presented. The algorithm processes the integration interval by generating local subintervals whose length is controlled through a feedback loop. The control is obtained by means of a relation derived on an analytical basis and valid for an arbitrary integration rule: two different estimates of an integral are used to compute the interval length necessary to obtain an integral estimate with accuracy within the assigned error bounds. The implied method for local generation of subintervals and an effective assumption of error partition among subintervals give rise to an adaptive algorithm provided with a highly accurate and very efficient integration procedure. The particular algorithm obtained by choosing the 6-point Gauss-Legendre integration rule is considered and extensive comparisons are made with other outstanding integration algorithms

  1. Strategies in PRholog

    Directory of Open Access Journals (Sweden)

    Besik Dundua

    2010-01-01

    Full Text Available PRholog is an experimental extension of logic programming with strategic conditional transformation rules, combining Prolog with Rholog calculus. The rules perform nondeterministic transformations on hedges. Queries may have several results that can be explored on backtracking. Strategies provide a control on rule applications in a declarative way. With strategy combinators, the user can construct more complex strategies from simpler ones. Matching with four different kinds of variables provides a flexible mechanism of selecting (subterms during execution. We give an overview on programming with strategies in PRholog and demonstrate how rewriting strategies can be expressed.

  2. The HIPAA Security Rule: implications for biomedical devices.

    Science.gov (United States)

    2004-11-01

    The HIPAA Security Rule, with which hospitals must become compliant by April 2005, is broad in scope. Some aspect of this rule will affect virtually every function and department within a healthcare organization. The functions and departments that deal with biomedical technologies face special challenges due to the great diversity of technologies, the variety of data maintained and transmitted, and the risks associated with compromises to data security--combined with the presence of older technology and the absence of integrated expertise. It is essential that hospitals recognize this challenge and initiate steps now to implement appropriate information security management.

  3. Phonological reduplication in sign language: rules rule

    Directory of Open Access Journals (Sweden)

    Iris eBerent

    2014-06-01

    Full Text Available Productivity—the hallmark of linguistic competence—is typically attributed to algebraic rules that support broad generalizations. Past research on spoken language has documented such generalizations in both adults and infants. But whether algebraic rules form part of the linguistic competence of signers remains unknown. To address this question, here we gauge the generalization afforded by American Sign Language (ASL. As a case study, we examine reduplication (X→XX—a rule that, inter alia, generates ASL nouns from verbs. If signers encode this rule, then they should freely extend it to novel syllables, including ones with features that are unattested in ASL. And since reduplicated disyllables are preferred in ASL, such rule should favor novel reduplicated signs. Novel reduplicated signs should thus be preferred to nonreduplicative controls (in rating, and consequently, such stimuli should also be harder to classify as nonsigns (in the lexical decision task. The results of four experiments support this prediction. These findings suggest that the phonological knowledge of signers includes powerful algebraic rules. The convergence between these conclusions and previous evidence for phonological rules in spoken language suggests that the architecture of the phonological mind is partly amodal.

  4. 18 CFR 385.104 - Rule of construction (Rule 104).

    Science.gov (United States)

    2010-04-01

    ... Definitions § 385.104 Rule of construction (Rule 104). To the extent that the text of a rule is inconsistent with its caption, the text of the rule controls. [Order 376, 49 FR 21705, May 23, 1984] ...

  5. FeynRules - Feynman rules made easy

    OpenAIRE

    Christensen, Neil D.; Duhr, Claude

    2008-01-01

    In this paper we present FeynRules, a new Mathematica package that facilitates the implementation of new particle physics models. After the user implements the basic model information (e.g. particle content, parameters and Lagrangian), FeynRules derives the Feynman rules and stores them in a generic form suitable for translation to any Feynman diagram calculation program. The model can then be translated to the format specific to a particular Feynman diagram calculator via F...

  6. Rewriting the rules governing high intensity interactions of light with matter

    Science.gov (United States)

    Borisov, Alex B.; McCorkindale, John C.; Poopalasingam, Sankar; Longworth, James W.; Simon, Peter; Szatmári, Sándor; Rhodes, Charles K.

    2016-04-01

    The trajectory of discovery associated with the study of high-intensity nonlinear radiative interactions with matter and corresponding nonlinear modes of electromagnetic propagation through material that have been conducted over the last 50 years can be presented as a landscape in the intensity/quantum energy [I-ħω] plane. Based on an extensive series of experimental and theoretical findings, a universal zone of anomalous enhanced electromagnetic coupling, designated as the fundamental nonlinear domain, can be defined. Since the lower boundaries of this region for all atomic matter correspond to ħω ~ 103 eV and I  ≈  1016 W cm-2, it heralds a future dominated by x-ray and γ-ray studies of all phases of matter including nuclear states. The augmented strength of the interaction with materials can be generally expressed as an increase in the basic electromagnetic coupling constant in which the fine structure constant α  →  Z 2 α, where Z denotes the number of electrons participating in an ordered response to the driving field. Since radiative conditions strongly favoring the development of this enhanced electromagnetic coupling are readily produced in self-trapped plasma channels, the processes associated with the generation of nonlinear interactions with materials stand in natural alliance with the nonlinear mechanisms that induce confined propagation. An experimental example involving the Xe (4d105s25p6) supershell for which Z  ≅  18 that falls in the specified anomalous nonlinear domain is described. This yields an effective coupling constant of Z 2 α  ≅  2.4  >  1, a magnitude comparable to the strong interaction and a value rendering as useless conventional perturbative analyses founded on an expansion in powers of α. This enhancement can be quantitatively understood as a direct consequence of the dominant role played by coherently driven multiply-excited states in the dynamics of the coupling. It is also conclusively demonstrated by an abundance of data that the utterly peerless champion of the experimental campaign leading to the definition of the fundamental nonlinear domain was excimer laser technology. The basis of this unique role was the ability to satisfy simultaneously a triplet (ω, I, P) of conditions stating the minimal values of the frequency ω, intensity I, and the power P necessary to enable the key physical processes to be experimentally observed and controllably combined. The historical confluence of these developments creates a solid foundation for the prediction of future advances in the fundamental understanding of ultra-high power density states of matter. The atomic findings graciously generalize to the composition of a nuclear stanza expressing the accessibility of the nuclear domain. With this basis serving as the launch platform, a cadenza of three grand challenge problems representing both new materials and new interactions is presented for future solution; they are (1) the performance of an experimental probe of the properties of the vacuum state associated with the dark energy at an intensity approaching the Schwinger/Heisenberg limit, (2) the attainment of amplification in the γ-ray region (~1 MeV) and the discovery of a nuclear excimer, and (3) the determination of a path to the projected super-heavy nuclear island of stability.

  7. Learning the Rules of the Game

    Science.gov (United States)

    Smith, Donald A.

    2018-03-01

    Games have often been used in the classroom to teach physics ideas and concepts, but there has been less published on games that can be used to teach scientific thinking. D. Maloney and M. Masters describe an activity in which students attempt to infer rules to a game from a history of moves, but the students don't actually play the game. Giving the list of moves allows the instructor to emphasize the important fact that nature usually gives us incomplete data sets, but it does make the activity less immersive. E. Kimmel suggested letting students attempt to figure out the rules to Reversi by playing it, but this game only has two players, which makes it difficult to apply in a classroom setting. Kimmel himself admits the choice of Reversi is somewhat arbitrary. There are games, however, that are designed to make the process of figuring out the rules an integral aspect of play. These games involve more people and require only a deck or two of cards. I present here an activity constructed around the card game Mao, which can be used to help students recognize aspects of scientific thinking. The game is particularly good at illustrating the importance of falsification tests (questions designed to elicit a negative answer) over verification tests (examples that confirm what is already suspected) for illuminating the underlying rules.

  8. An updated nuclear criticality slide rule

    International Nuclear Information System (INIS)

    Hopper, C.M.; Broadhead, B.L.

    1998-04-01

    This Volume 2 contains the functional version of the updated nuclear criticality slide rule (more accurately, sliding graphs) that is referenced in An Updated Nuclear Criticality Slide Rule: Technical Basis, NUREG/CR-6504, Vol. 1 (ORNL/TM-13322/V1). This functional slide rule provides a readily usable open-quotes in-handclose quotes method for estimating pertinent nuclear criticality accident information from sliding graphs, thereby permitting (1) the rapid estimation of pertinent criticality accident information without laborious or sophisticated calculations in a nuclear criticality emergency situation, (2) the appraisal of potential fission yields and external personnel radiation exposures for facility safety analyses, and (3) a technical basis for emergency preparedness and training programs at nonreactor nuclear facilities. The slide rule permits the estimation of neutron and gamma dose rates and integrated doses based upon estimated fission yields, distance from the fission source, and time-after criticality accidents for five different critical systems. Another sliding graph permits the estimation of critical solution fission yields based upon fissile material concentration, critical vessel geometry, and solution addition rate. Another graph provides neutron and gamma dose-reduction factors for water, steel, and concrete. Graphs from historic documents are provided as references for estimating critical parameters of various fissile material systems. Conversion factors for various English and metric units are provided for quick reference

  9. Rewriting Germany's nuclear law

    International Nuclear Information System (INIS)

    Roser, T.

    1992-01-01

    In Germany, the private use of nuclear energy for peaceful uses is strictly regulated by a Nuclear Energy Act. Since its enactment back in 1959, this legislation has been overhauled five times - most recently in 1985. Now Klaus Toepfer, Germany's Federal Minister for the Environment, Protection of Nature, and Nuclear Safety, has set out to revise the Act for the sixth time. The present draft bill is intended to reorganise the back end of the nuclear fuel cycle; eliminate public promotion of nuclear power; clarify points of legal dispute. Of the draft bill's three aims, the last two are more parochial. The real novelty lies in the changes to the rules for the back end of the fuel cycle. First, the Federal Government proposes to abandon the priority given to spent fuel recycling. In future, direct disposal will be an equivalent option, and waste avoidance will have top priority. Intimately linked to the back end proposal is the Government's plan to load on the shoulders of nuclear operators the full responsibility for building and operating repositories for the final disposal of nuclear waste. The third aspect of Government's back end plans concerns decommissioning. At present, operators accumulate provisions over the plant lifetime, which for that purpose is estimated at 19 years. The provisions vary from plant to plant but are generally around DM1 billion and are tax free. Under the proposed regulations, this sum must be available from the first day of operation to cover the case of an early shutdown. In practice, this will increase the initial investment for a nuclear power plant in Germany by 10-20% and so make nuclear power less competitive. (author)

  10. A Type System for Required/Excluded Elements in CLS

    Directory of Open Access Journals (Sweden)

    Mariangiola Dezani-Ciancaglini

    2009-11-01

    Full Text Available The calculus of looping sequences is a formalism for describing the evolution of biological systems by means of term rewriting rules. We enrich this calculus with a type discipline to guarantee the soundness of reduction rules with respect to some biological properties deriving from the requirement of certain elements, and the repellency of others. As an example, we model a toy system where the repellency of a certain element is captured by our type system and forbids another element to exit a compartment.

  11. The Power of Love: Rewriting the Romance in Isabel Allende's The House of the Spirits and Eva Luna

    Directory of Open Access Journals (Sweden)

    Frances Jane P. Abao

    2000-12-01

    Full Text Available Despite its ongoing popularity with women readers, romantic fiction has traditionally been regarded as an instrument of women's oppression, largely due to its reinforcement and even glorification of sexual stereotypes and bourgeois values. Latin American writer Isabel Allende's novels The House of the Spirits and Eva Luna both contain a number of the elements and conventions of romantic fiction, including distinct similarities to the two acknowledged foundations of this genre: Charlotte Brontë's Jane Eyre and Emily Brontë's Wuthering Heights.However, The House of the Spirits and Eva Luna can also be read as rewritings of the genre of romantic fiction. In these two texts, Isabel Allende appropriates and then reworks certain conventions of romantic fiction in order to portray her notion of "fulfilling egalitarian relationships" between men and women. Nevertheless, despite these feminist revisions, Allende's rewritten romances do retain the "wish-fulfillment" element-or ideal-of romantic fiction, its depiction of women's fantasy of feminine values being appreciated and validated within heterosexual romantic relationships in the real world.

  12. New Safety rules

    CERN Multimedia

    Safety Commission

    2008-01-01

    The revision of CERN Safety rules is in progress and the following new Safety rules have been issued on 15-04-2008: Safety Procedure SP-R1 Establishing, Updating and Publishing CERN Safety rules: http://cern.ch/safety-rules/SP-R1.htm; Safety Regulation SR-S Smoking at CERN: http://cern.ch/safety-rules/SR-S.htm; Safety Regulation SR-M Mechanical Equipment: http://cern.ch/safety-rules/SR-M.htm; General Safety Instruction GSI-M1 Standard Lifting Equipment: http://cern.ch/safety-rules/GSI-M1.htm; General Safety Instruction GSI-M2 Standard Pressure Equipment: http://cern.ch/safety-rules/GSI-M2.htm; General Safety Instruction GSI-M3 Special Mechanical Equipment: http://cern.ch/safety-rules/GSI-M3.htm. These documents apply to all persons under the Director General’s authority. All Safety rules are available at the web page: http://www.cern.ch/safety-rules The Safety Commission

  13. Sleep promotes the extraction of grammatical rules.

    Directory of Open Access Journals (Sweden)

    Ingrid L C Nieuwenhuis

    Full Text Available Grammar acquisition is a high level cognitive function that requires the extraction of complex rules. While it has been proposed that offline time might benefit this type of rule extraction, this remains to be tested. Here, we addressed this question using an artificial grammar learning paradigm. During a short-term memory cover task, eighty-one human participants were exposed to letter sequences generated according to an unknown artificial grammar. Following a time delay of 15 min, 12 h (wake or sleep or 24 h, participants classified novel test sequences as Grammatical or Non-Grammatical. Previous behavioral and functional neuroimaging work has shown that classification can be guided by two distinct underlying processes: (1 the holistic abstraction of the underlying grammar rules and (2 the detection of sequence chunks that appear at varying frequencies during exposure. Here, we show that classification performance improved after sleep. Moreover, this improvement was due to an enhancement of rule abstraction, while the effect of chunk frequency was unaltered by sleep. These findings suggest that sleep plays a critical role in extracting complex structure from separate but related items during integrative memory processing. Our findings stress the importance of alternating periods of learning with sleep in settings in which complex information must be acquired.

  14. Trade and investment rules for energy

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2009-09-15

    Rules that govern energy trade is an issue that has generated increasing concern everywhere, from the standpoint of both the security of supply for consumers and security of demand for suppliers. This concern reflects the importance of rules that comprehensively address the needs from supply and demand point of view and integrate the international fabric of energy trade. The GATT and the WTO Agreement define trans-border movement of energy but leave many aspects unclear, particularly as efforts accelerate to control carbon emissions. This timely report by a WEC Task Force of experts with legal standing in the energy business identifies the most pressing issues relating to energy trade and suggests actions and measures which, if implemented, would provide clarity and answer many questions. More importantly, these measures would strengthen the WTO and coming rounds of negotiations.

  15. Rule-based topology system for spatial databases to validate complex geographic datasets

    Science.gov (United States)

    Martinez-Llario, J.; Coll, E.; Núñez-Andrés, M.; Femenia-Ribera, C.

    2017-06-01

    A rule-based topology software system providing a highly flexible and fast procedure to enforce integrity in spatial relationships among datasets is presented. This improved topology rule system is built over the spatial extension Jaspa. Both projects are open source, freely available software developed by the corresponding author of this paper. Currently, there is no spatial DBMS that implements a rule-based topology engine (considering that the topology rules are designed and performed in the spatial backend). If the topology rules are applied in the frontend (as in many GIS desktop programs), ArcGIS is the most advanced solution. The system presented in this paper has several major advantages over the ArcGIS approach: it can be extended with new topology rules, it has a much wider set of rules, and it can mix feature attributes with topology rules as filters. In addition, the topology rule system can work with various DBMSs, including PostgreSQL, H2 or Oracle, and the logic is performed in the spatial backend. The proposed topology system allows users to check the complex spatial relationships among features (from one or several spatial layers) that require some complex cartographic datasets, such as the data specifications proposed by INSPIRE in Europe and the Land Administration Domain Model (LADM) for Cadastral data.

  16. [Ginseng prescription rules and molecular mechanism in treating coronary heart disease based on data mining and integrative pharmacology].

    Science.gov (United States)

    Li, Sen; Tang, Shi-Huan; Liu, Jin-Ling; Su, Jin; He, Fu-Yuan

    2018-04-01

    The ancient dragon Materia Medica, Compendium of Materia Medica and other works recorded that the main effect of ginseng is tonifying qi. It is reported that the main active ingredient of ginseng is ginsenoside. Modern studies have found that ginseng mono saponins are effective for cardiovascular related diseases. This paper preliminary clarified the efficacy of traditional ginseng-nourishing qi and cardiovascular disease through the traditional Chinese medicine (TCM) inheritance auxiliary platform and integration platform of association of pharmacology. With the help of TCM inheritance auxiliary platform-analysis of "Chinese medicine database", Chinese medicine treatment of modern diseases that ginseng rules, so the traditional effect associated with modern medicine and pharmacology; application integration platform enrichment analysis on the target of drug and gene function, metabolic pathway, to further explore the molecular mechanism of ginseng in the treatment of coronary heart disease, aimed at mining the molecular mechanism of ginseng in the treatment of coronary heart disease. Chinese medicine containing ginseng 307 prescriptions, 87 kinds of disease indications, western medicine disease Chinese medicine therapy for ginseng main coronary heart disease; analysis of molecular mechanism of ginseng pharmacology integration platform for the treatment of coronary heart disease. Ginsenosides(Ra₁, Ra₂, Rb₁, Rb₂, Rg₁, Ro) bind these targets, PRKAA1, PRKAA2, NDUFA4, COX5B, UQCRC1, affect chemokines, non-alcoholic fatty liver, gonadotropin, carbon metabolism, glucose metabolism and other pathways to treat coronary heart disease indirectly. The molecular mechanism of Panax ginseng's multi-component, multi-target and synergistic action is preliminarily elucidated in this paper. Copyright© by the Chinese Pharmaceutical Association.

  17. Rules and routines in organizations and the management of safety rules

    Energy Technology Data Exchange (ETDEWEB)

    Weichbrodt, J. Ch.

    2013-07-01

    This thesis is concerned with the relationship between rules and routines in organizations and how the former can be used to steer the latter. Rules are understood as formal organizational artifacts, whereas organizational routines are collective patterns of action. While research on routines has been thriving, a clear understanding of how rules can be used to influence or control organizational routines (and vice-versa) is still lacking. This question is of particular relevance to safety rules in high-risk organizations, where the way in which organizational routines unfold can ultimately be a matter of life and death. In these organizations, an important and related issue is the balancing of standardization and flexibility – which, in the case of rules, takes the form of finding the right degree of formalization. In high-risk organizations, the question is how to adequately regulate actors’ routines in order to facilitate safe behavior, while at the same time leaving enough leeway for actors to make good decisions in abnormal situations. The railroads are regarded as high-risk industries and also rely heavily on formal rules. In this thesis, the Swiss Federal Railways (SBB) were therefore selected for a field study on rules and routines. The issues outlined so far are being tackled theoretically (paper 1), empirically (paper 2), and from a practitioner’s (i.e., rule maker’s) point of view (paper 3). In paper 1, the relationship between rules and routines is theoretically conceptualized, based on a literature review. Literature on organizational control and coordination, on rules in human factors and safety, and on organizational routines is combined. Three distinct roles (rule maker, rule supervisor, and rule follower) are outlined. Six propositions are developed regarding the necessary characteristics of both routines and rules, the respective influence of the three roles on the rule-routine relationship, and regarding organizational aspects such as

  18. Rules and routines in organizations and the management of safety rules

    International Nuclear Information System (INIS)

    Weichbrodt, J. Ch.

    2013-01-01

    This thesis is concerned with the relationship between rules and routines in organizations and how the former can be used to steer the latter. Rules are understood as formal organizational artifacts, whereas organizational routines are collective patterns of action. While research on routines has been thriving, a clear understanding of how rules can be used to influence or control organizational routines (and vice-versa) is still lacking. This question is of particular relevance to safety rules in high-risk organizations, where the way in which organizational routines unfold can ultimately be a matter of life and death. In these organizations, an important and related issue is the balancing of standardization and flexibility – which, in the case of rules, takes the form of finding the right degree of formalization. In high-risk organizations, the question is how to adequately regulate actors’ routines in order to facilitate safe behavior, while at the same time leaving enough leeway for actors to make good decisions in abnormal situations. The railroads are regarded as high-risk industries and also rely heavily on formal rules. In this thesis, the Swiss Federal Railways (SBB) were therefore selected for a field study on rules and routines. The issues outlined so far are being tackled theoretically (paper 1), empirically (paper 2), and from a practitioner’s (i.e., rule maker’s) point of view (paper 3). In paper 1, the relationship between rules and routines is theoretically conceptualized, based on a literature review. Literature on organizational control and coordination, on rules in human factors and safety, and on organizational routines is combined. Three distinct roles (rule maker, rule supervisor, and rule follower) are outlined. Six propositions are developed regarding the necessary characteristics of both routines and rules, the respective influence of the three roles on the rule-routine relationship, and regarding organizational aspects such as

  19. The Rules of Origin of Goods as an Instrument of the State Foreign Trade Policy

    Directory of Open Access Journals (Sweden)

    Storozhchuk Volodymyr M.

    2018-01-01

    Full Text Available The article is aimed at analyzing the types of rules of origin of goods, existing in the international practice, and approaches to assess their impact on the foreign trade flows. The article considers two types of rules for determining the country of origin of goods used in the international practice: non-preferential and preferential. The main characteristics of the non-preferential rules of origin and peculiarities of their application in Ukraine are defined and systematized. The article defines the priority functions of the customs tariff, subject to the use of non-preferential rules of origin of goods, to which are classified: protective, fiscal, and regulatory. The criteria used in the non-preferential rules of origin of goods have been considered. It has been substantiated that the priority functions of the customs tariff subject to the use of preferential rules of origin of goods are the integration and progressive functions. The criteria used in the preferential rules of origin of goods have been considered. Based on the results of the analysis of the rules of origin of goods, it has been substantiated that their use can be considered as a restrictive or an incentive tool of the State foreign trade policy. It has been shown that of special importance, in the context of Ukraine’s integration into the global value chains, is the goods’ acquisition of the status of preferential origin in accordance with the criterion of diagonal cumulation within the framework of the Regional Pan-Euro-Med Convention, which requires Ukraine to conclude a number of bilateral agreements with the identical preferential rules of origin of goods.

  20. Exploration of SWRL Rule Bases through Visualization, Paraphrasing, and Categorization of Rules

    Science.gov (United States)

    Hassanpour, Saeed; O'Connor, Martin J.; Das, Amar K.

    Rule bases are increasingly being used as repositories of knowledge content on the Semantic Web. As the size and complexity of these rule bases increases, developers and end users need methods of rule abstraction to facilitate rule management. In this paper, we describe a rule abstraction method for Semantic Web Rule Language (SWRL) rules that is based on lexical analysis and a set of heuristics. Our method results in a tree data structure that we exploit in creating techniques to visualize, paraphrase, and categorize SWRL rules. We evaluate our approach by applying it to several biomedical ontologies that contain SWRL rules, and show how the results reveal rule patterns within the rule base. We have implemented our method as a plug-in tool for Protégé-OWL, the most widely used ontology modeling software for the Semantic Web. Our tool can allow users to rapidly explore content and patterns in SWRL rule bases, enabling their acquisition and management.

  1. A history of slide rules for blackbody radiation computations

    Science.gov (United States)

    Johnson, R. Barry; Stewart, Sean M.

    2012-10-01

    During the Second World War the importance of utilizing detection devices capable of operating in the infrared portion of the electromagnetic spectrum was firmly established. Up until that time, laboriously constructed tables for blackbody radiation needed to be used in calculations involving the amount of radiation radiated within a given spectral region or for other related radiometric quantities. To rapidly achieve reasonably accurate calculations of such radiometric quantities, a blackbody radiation calculator was devised in slide rule form first in Germany in 1944 and soon after in England and the United States. In the immediate decades after its introduction, the radiation slide rule was widely adopted and recognized as a useful and important tool for engineers and scientists working in the infrared field. It reached its pinnacle in the United States in 1970 in a rule introduced by Electro Optical Industries, Inc. With the onset in the latter half of the 1970s of affordable, hand-held electronic calculators, the impending demise of the radiation slide rule was evident. No longer the calculational device of choice, the radiation slide rule all but disappeared within a few short years. Although today blackbody radiation calculations can be readily accomplished using anything from a programmable pocket calculator upwards, with each device making use of a wide variety of numerical approximations to the integral of Planck's function, radiation slide rules were in the early decades of infrared technology the definitive "workhorse" for those involved in infrared systems design and engineering. This paper presents a historical development of radiation slide rules with many versions being discussed.

  2. Australian road rules

    Science.gov (United States)

    2009-02-01

    *These are national-level rules. Australian Road Rules - 2009 Version, Part 18, Division 1, Rule 300 "Use of Mobile Phones" describes restrictions of mobile phone use while driving. The rule basically states that drivers cannot make or receive calls ...

  3. Electromagnetic compatibility design and cabling system rules; Regles de conception et de cablage des systemes electroniques

    Energy Technology Data Exchange (ETDEWEB)

    Raimbourg, J.

    2009-07-01

    This report is devoted to establish EMC (Electromagnetic Compatibility) design and cabling system rules. It is intended for hardware designers in charge of designing electronic maps or integrating existing materials into a comprehensive system. It is a practical guide. The rules described in this document do not require enhanced knowledge of advanced mathematical or physical concepts. The key point is to understand phenomena with a pragmatic approach to highlight the design and protection rules. (author)

  4. Rule Versus the Causality Rule in Insurance Law

    DEFF Research Database (Denmark)

    Lando, Henrik

    When the Buyer of insurance has negligently kept silent or misrepresented a (material) fact to the Seller, one of two rules will determine the extent to which cover will consequently be reduced. The pro-rata rule lowers cover in proportion to how much the Seller would have increased the premium had...... he been correctly informed; the causality rule provides either zero cover if the omitted fact has caused the insurance event, or full cover if the event would have occurred regardless of the fact. This article explores which rule is more efficient. Using the framework proposed by Picard and Dixit...... it subjects the risk averse Buyer of insurance to less variance. This implies that the pro rata rule should apply when there is significant risk for a Buyer of unintentional misrepresentation, and when the incentive to intentionally misrepresent can be curtailed through frequent verification of the Buyer...

  5. Global symplectic structure-preserving integrators for spinning compact binaries

    Science.gov (United States)

    Zhong, Shuang-Ying; Wu, Xin; Liu, San-Qiu; Deng, Xin-Fa

    2010-12-01

    This paper deals mainly with the application of the second-order symplectic implicit midpoint rule and its symmetric compositions to a post-Newtonian Hamiltonian formulation with canonical spin variables in relativistic compact binaries. The midpoint rule, as a basic algorithm, is directly used to integrate the completely canonical Hamiltonian system. On the other hand, there are symmetric composite methods based on a splitting of the Hamiltonian into two parts: the Newtonian part associated with a Kepler motion, and a perturbation part involving the orbital post-Newtonian and spin contributions, where the Kepler flow has an analytic solution and the perturbation can be calculated by the midpoint rule. An example is the second-order mixed leapfrog symplectic integrator with one stage integration of the perturbation flow and two semistage computations of the Kepler flow at every integration step. Also, higher-order composite methods such as the Forest-Ruth fourth-order symplectic integrator and its optimized algorithm are applicable. Various numerical tests including simulations of chaotic orbits show that the mixed leapfrog integrator is always superior to the midpoint rule in energy accuracy, while both of them are almost equivalent in computational efficiency. Particularly, the optimized fourth-order algorithm compared with the mixed leapfrog scheme provides good precision and needs no expensive additional computational time. As a result, it is worth performing a more detailed and careful examination of the dynamical structure of chaos and order in the parameter windows and phase space of the binary system.

  6. The Half RR Rule: A Poor Rule of Thumb and Not a Risk Assessment Tool for QT Interval Prolongation.

    Science.gov (United States)

    Berling, Ingrid; Isbister, Geoffrey K

    2015-10-01

    Measuring the QT interval on an electrocardiogram (ECG) is integral to risk assessment of Torsade de Pointes (TdP). This study aimed to investigate the accuracy of the 1/2 RR rule as a risk assessment tool for drug-induced TdP, comparing it to the QT nomogram, Bazett's corrected QT (QTcB), and Fridericia's corrected QT (QTcF). The authors calculated sensitivity and specificity of the 1/2 RR rule using a published data set of 129 cases of drug-induced TdP and 316 controls (noncardiotoxic overdoses), compared to the QT nomogram, QTcB > 500 msec and QTcF > 500 msec. To further determine the value of the 1/2 RR rule, its observed positive, and negative agreement were calculated when compared to the QT nomogram for determining an abnormal QT in eight samples of different drugs in overdose. The sensitivity and specificity of the 1/2 RR rule were 88% (95% confidence interval [CI] = 80% to 93%) and 53% (95% CI = 47% to 58%), respectively, compared to the QT nomogram (sensitivity = 97%, 95% CI = 92% to 99%; specificity = 99%, 95% CI = 97% to 100%). It was also less sensitive than QTcB > 500 msec and had a lower specificity than QTcB > 500 msec and QTcF > 500 msec. In drug overdose patients, the 1/2 RR rule had poor observed agreement averaging 41%, which was mainly due to poor positive agreement, except for amisulpride where there was good agreement. The 1/2 RR rule was not as sensitive as the QT nomogram or QTcB > 500 msec for drug-induced TdP. It had poor positive agreement in almost all overdose patients, resulting in over half of patients receiving unnecessary cardiac monitoring and repeat ECGs. © 2015 by the Society for Academic Emergency Medicine.

  7. Markov chain aggregation and its applications to combinatorial reaction networks.

    Science.gov (United States)

    Ganguly, Arnab; Petrov, Tatjana; Koeppl, Heinz

    2014-09-01

    We consider a continuous-time Markov chain (CTMC) whose state space is partitioned into aggregates, and each aggregate is assigned a probability measure. A sufficient condition for defining a CTMC over the aggregates is presented as a variant of weak lumpability, which also characterizes that the measure over the original process can be recovered from that of the aggregated one. We show how the applicability of de-aggregation depends on the initial distribution. The application section is devoted to illustrate how the developed theory aids in reducing CTMC models of biochemical systems particularly in connection to protein-protein interactions. We assume that the model is written by a biologist in form of site-graph-rewrite rules. Site-graph-rewrite rules compactly express that, often, only a local context of a protein (instead of a full molecular species) needs to be in a certain configuration in order to trigger a reaction event. This observation leads to suitable aggregate Markov chains with smaller state spaces, thereby providing sufficient reduction in computational complexity. This is further exemplified in two case studies: simple unbounded polymerization and early EGFR/insulin crosstalk.

  8. Delayed rule following

    OpenAIRE

    Schmitt, David R.

    2001-01-01

    Although the elements of a fully stated rule (discriminative stimulus [SD], some behavior, and a consequence) can occur nearly contemporaneously with the statement of the rule, there is often a delay between the rule statement and the SD. The effects of this delay on rule following have not been studied in behavior analysis, but they have been investigated in rule-like settings in the areas of prospective memory (remembering to do something in the future) and goal pursuit. Discriminative even...

  9. Functionalized Graphitic Carbon Nitride for Metal-free, Flexible and Rewritable Nonvolatile Memory Device via Direct Laser-Writing

    Science.gov (United States)

    Zhao, Fei; Cheng, Huhu; Hu, Yue; Song, Long; Zhang, Zhipan; Jiang, Lan; Qu, Liangti

    2014-07-01

    Graphitic carbon nitride nanosheet (g-C3N4-NS) has layered structure similar with graphene nanosheet and presents unusual physicochemical properties due to the s-triazine fragments. But their electronic and electrochemical applications are limited by the relatively poor conductivity. The current work provides the first example that atomically thick g-C3N4-NSs are the ideal candidate as the active insulator layer with tunable conductivity for achieving the high performance memory devices with electrical bistability. Unlike in conventional memory diodes, the g-C3N4-NSs based devices combined with graphene layer electrodes are flexible, metal-free and low cost. The functionalized g-C3N4-NSs exhibit desirable dispersibility and dielectricity which support the all-solution fabrication and high performance of the memory diodes. Moreover, the flexible memory diodes are conveniently fabricated through the fast laser writing process on graphene oxide/g-C3N4-NSs/graphene oxide thin film. The obtained devices not only have the nonvolatile electrical bistability with great retention and endurance, but also show the rewritable memory effect with a reliable ON/OFF ratio of up to 105, which is the highest among all the metal-free flexible memory diodes reported so far, and even higher than those of metal-containing devices.

  10. Finding a Forest in a Tree

    DEFF Research Database (Denmark)

    Bacci, Giorgio; Miculan, Marino; Rizzi, Romeo

    2014-01-01

    Wide reactive systems are rewriting systems specified by wide reaction rules, where redex and reactum are lists of terms (forests), i.e. rules of the form ⟨l1(x1),…,ln(xn)⟩⇒⟨r1(y1),…,rn(yn)⟩ such that ∪iyi⊆∪ixi. Wide reaction rules are particularly useful for process calculi for mobile and global...... system), possibly finding the subtrees to be grafted at the forest’s leaves (i.e., instantiating the variables)? We show that, although the problem is NP-complete in general, the exponential explosion depends only on the number n of roots of the forest (the width of the redex), and not on the size...

  11. Integrable anyon chains: From fusion rules to face models to effective field theories

    International Nuclear Information System (INIS)

    Finch, Peter E.; Flohr, Michael; Frahm, Holger

    2014-01-01

    Starting from the fusion rules for the algebra SO(5) 2 we construct one-dimensional lattice models of interacting anyons with commuting transfer matrices of ‘interactions round the face’ (IRF) type. The conserved topological charges of the anyon chain are recovered from the transfer matrices in the limit of large spectral parameter. The properties of the models in the thermodynamic limit and the low energy excitations are studied using Bethe ansatz methods. Two of the anyon models are critical at zero temperature. From the analysis of the finite size spectrum we find that they are effectively described by rational conformal field theories invariant under extensions of the Virasoro algebra, namely WB 2 and WD 5 , respectively. The latter contains primaries with half and quarter spin. The modular partition function and fusion rules are derived and found to be consistent with the results for the lattice model

  12. Hamiltonian path integrals

    International Nuclear Information System (INIS)

    Prokhorov, L.V.

    1982-01-01

    Problems related to consideration of operator nonpermutability in Hamiltonian path integral (HPI) are considered in the review. Integrals are investigated using trajectories in configuration space (nonrelativistic quantum mechanics). Problems related to trajectory integrals in HPI phase space are discussed: the problem of operator nonpermutability consideration (extra terms problem) and corresponding equivalence rules; ambiguity of HPI usual recording; transition to curvilinear coordinates. Problem of quantization of dynamical systems with couplings has been studied. As in the case of canonical transformations, quantization of the systems with couplings of the first kind requires the consideration of extra terms

  13. Continual integral in perturbation theory

    International Nuclear Information System (INIS)

    Slavnov, A.A.

    1975-01-01

    It is shown that all results obtained by means of continual integration within the framework of perturbation theory are completely equivalent to those obtained by the usual diagram technique and are therfore just as rigorous. A rigorous justification is given for the rules for operating with continual integrals in perturbation theory. (author)

  14. Endpoint behavior of the pion distribution amplitude in QCD sum rules with nonlocal condensates

    International Nuclear Information System (INIS)

    Mikhailov, S. V.; Pimikov, A. V.; Stefanis, N. G.

    2010-01-01

    Starting from the QCD sum rules with nonlocal condensates for the pion distribution amplitude, we derive another sum rule for its derivative and its ''integral derivatives''--defined in this work. We use this new sum rule to analyze the fine details of the pion distribution amplitude in the endpoint region x∼0. The results for endpoint-suppressed and flattop (or flatlike) pion distribution amplitudes are compared with those we obtained with differential sum rules by employing two different models for the distribution of vacuum-quark virtualities. We determine the range of values of the derivatives of the pion distribution amplitude and show that endpoint-suppressed distribution amplitudes lie within this range, while those with endpoint enhancement--flat-type or Chernyak-Zhitnitsky like--yield values outside this range.

  15. De la primera lengua a la traducción literaria: Itinerarios de evaluación y reescritura creativa / From mother tongue teaching to literary translation: Assessing and creative rewriting

    Directory of Open Access Journals (Sweden)

    Jorge J. SÁNCHEZ IGLESIAS

    2012-03-01

    Full Text Available Esta propuesta parte de las particularidades de la formación en Lengua A para Traductores, un ámbito poco definido y normalmente muy alejado de los contenidos literarios. Se plantean dos conjuntos de actividades, vinculados a la evaluación y a la reescritura, de cuya vinculación surgen los conceptos de lectura intencional y desautomatización de la escritura, y que parecen por tanto especialmente adecuadas para fomentar una creatividad en el uso de la lengua que resulta de la mayor importancia para la traducción literaria. A partir de unas primeras experimentaciones con reescritura de textos literarios, se puede concluir que las nociones de tono y estilo están intuitivamente disponibles para los escritores noveles y son por tanto excelentes candidatas para ser operativas en la formación en traducción literaria.  The distinguishing characteristics of First Language training - a vaguely defined area of study which is not usually explored in literary publications - will form the basis of our investigation.  We will consider two sets of activities, both linked to evaluation and rewriting, which will allow us to explore the concepts of intentional reading and deautomisation of the writing process. These notions seem especially useful for encouraging creativity in language use, a highly important skill in literary translation. Based on the results of a few initial experiments involving the rewriting of literary texts, we can conclude that novice writers are intuitively aware of tone and style. These notions could therefore provide an excellent focus for literary translation training. 

  16. Action Rules Mining

    CERN Document Server

    Dardzinska, Agnieszka

    2013-01-01

    We are surrounded by data, numerical, categorical and otherwise, which must to be analyzed and processed to convert it into information that instructs, answers or aids understanding and decision making. Data analysts in many disciplines such as business, education or medicine, are frequently asked to analyze new data sets which are often composed of numerous tables possessing different properties. They try to find completely new correlations between attributes and show new possibilities for users.   Action rules mining discusses some of data mining and knowledge discovery principles and then describe representative concepts, methods and algorithms connected with action. The author introduces the formal definition of action rule, notion of a simple association action rule and a representative action rule, the cost of association action rule, and gives a strategy how to construct simple association action rules of a lowest cost. A new approach for generating action rules from datasets with numerical attributes...

  17. Finite energy sum rules and instantons in the instanton liquid model

    International Nuclear Information System (INIS)

    Elias, V.; Fang Shi; Steele, T.G.

    1998-01-01

    We obtain the imaginary part of the direct single-instanton contribution to the pseudoscalar correlator, as defined by the appropriate dispersion relation, in order to derive an explicit integral representation for the instanton contribution to finite energy sum rules in the instanton liquid model. (author)

  18. MAPI: towards the integrated exploitation of bioinformatics Web Services.

    Science.gov (United States)

    Ramirez, Sergio; Karlsson, Johan; Trelles, Oswaldo

    2011-10-27

    Bioinformatics is commonly featured as a well assorted list of available web resources. Although diversity of services is positive in general, the proliferation of tools, their dispersion and heterogeneity complicate the integrated exploitation of such data processing capacity. To facilitate the construction of software clients and make integrated use of this variety of tools, we present a modular programmatic application interface (MAPI) that provides the necessary functionality for uniform representation of Web Services metadata descriptors including their management and invocation protocols of the services which they represent. This document describes the main functionality of the framework and how it can be used to facilitate the deployment of new software under a unified structure of bioinformatics Web Services. A notable feature of MAPI is the modular organization of the functionality into different modules associated with specific tasks. This means that only the modules needed for the client have to be installed, and that the module functionality can be extended without the need for re-writing the software client. The potential utility and versatility of the software library has been demonstrated by the implementation of several currently available clients that cover different aspects of integrated data processing, ranging from service discovery to service invocation with advanced features such as workflows composition and asynchronous services calls to multiple types of Web Services including those registered in repositories (e.g. GRID-based, SOAP, BioMOBY, R-bioconductor, and others).

  19. GOLD: Integration of model-based control systems with artificial intelligence and workstations

    International Nuclear Information System (INIS)

    Lee, M.; Clearwater, S.

    1987-08-01

    Our experience with model-based accelerator control started at SPEAR. Since that time nearly all accelerator beamlines have been controlled using model-based application programs, for example, PEP and SLC at SLAC. In order to take advantage of state-of-the-art hardware and software technology, the design and implementation of the accelerator control programs have undergone radical changes with time. Consequently, SPEAR, PEP and SLC all use different control programs. Since many of these application programs are embedded deep into the control system, they had to be rewritten each time. Each time this rewriting has occurred a great deal of time and effort has been spent on training physicists and programmers to do the job. Now, we have developed an integrated system called GOLD (Genetic Orbit and Lattice Debugger) for debugging and correcting trajectory errors in accelerator lattices. The system consists of a lattice modeling program (COMFORT), a beam simulator (PLUS), a graphical workstation environment (micro-VAX) and an expert system (ABLE). This paper will describe some of the features and applications of our integrated system with emphasis on the automation offered by expert systems. 5 refs

  20. Olap and data mining technologies' integration in the construction of interdimensional associative rules in multidimensional data

    Directory of Open Access Journals (Sweden)

    Микола Тихонович Фісун

    2015-06-01

    Full Text Available The features of associative rules in multidimensional data searching are presented in the article, specifically theoretical basis of association searching between different dimensions in OLAP cubes and formulas of their significance characteristics (support, confidence, lift, leverage calculation are shown. The method of interdimensional association rules generation is proposed. The implementation of this method as a component of operative and intellectual data analysis information system on database management system Caché platform is described.

  1. Proof of Kochen–Specker Theorem: Conversion of Product Rule to Sum Rule

    International Nuclear Information System (INIS)

    Toh, S.P.; Zainuddin, Hishamuddin

    2009-01-01

    Valuation functions of observables in quantum mechanics are often expected to obey two constraints called the sum rule and product rule. However, the Kochen–Specker (KS) theorem shows that for a Hilbert space of quantum mechanics of dimension d ≤ 3, these constraints contradict individually with the assumption of value definiteness. The two rules are not irrelated and Peres [Found. Phys. 26 (1996) 807] has conceived a method of converting the product rule into a sum rule for the case of two qubits. Here we apply this method to a proof provided by Mermin based on the product rule for a three-qubit system involving nine operators. We provide the conversion of this proof to one based on sum rule involving ten operators. (general)

  2. Analyzing large gene expression and methylation data profiles using StatBicRM: statistical biclustering-based rule mining.

    Directory of Open Access Journals (Sweden)

    Ujjwal Maulik

    Full Text Available Microarray and beadchip are two most efficient techniques for measuring gene expression and methylation data in bioinformatics. Biclustering deals with the simultaneous clustering of genes and samples. In this article, we propose a computational rule mining framework, StatBicRM (i.e., statistical biclustering-based rule mining to identify special type of rules and potential biomarkers using integrated approaches of statistical and binary inclusion-maximal biclustering techniques from the biological datasets. At first, a novel statistical strategy has been utilized to eliminate the insignificant/low-significant/redundant genes in such way that significance level must satisfy the data distribution property (viz., either normal distribution or non-normal distribution. The data is then discretized and post-discretized, consecutively. Thereafter, the biclustering technique is applied to identify maximal frequent closed homogeneous itemsets. Corresponding special type of rules are then extracted from the selected itemsets. Our proposed rule mining method performs better than the other rule mining algorithms as it generates maximal frequent closed homogeneous itemsets instead of frequent itemsets. Thus, it saves elapsed time, and can work on big dataset. Pathway and Gene Ontology analyses are conducted on the genes of the evolved rules using David database. Frequency analysis of the genes appearing in the evolved rules is performed to determine potential biomarkers. Furthermore, we also classify the data to know how much the evolved rules are able to describe accurately the remaining test (unknown data. Subsequently, we also compare the average classification accuracy, and other related factors with other rule-based classifiers. Statistical significance tests are also performed for verifying the statistical relevance of the comparative results. Here, each of the other rule mining methods or rule-based classifiers is also starting with the same post

  3. Analyzing large gene expression and methylation data profiles using StatBicRM: statistical biclustering-based rule mining.

    Science.gov (United States)

    Maulik, Ujjwal; Mallik, Saurav; Mukhopadhyay, Anirban; Bandyopadhyay, Sanghamitra

    2015-01-01

    Microarray and beadchip are two most efficient techniques for measuring gene expression and methylation data in bioinformatics. Biclustering deals with the simultaneous clustering of genes and samples. In this article, we propose a computational rule mining framework, StatBicRM (i.e., statistical biclustering-based rule mining) to identify special type of rules and potential biomarkers using integrated approaches of statistical and binary inclusion-maximal biclustering techniques from the biological datasets. At first, a novel statistical strategy has been utilized to eliminate the insignificant/low-significant/redundant genes in such way that significance level must satisfy the data distribution property (viz., either normal distribution or non-normal distribution). The data is then discretized and post-discretized, consecutively. Thereafter, the biclustering technique is applied to identify maximal frequent closed homogeneous itemsets. Corresponding special type of rules are then extracted from the selected itemsets. Our proposed rule mining method performs better than the other rule mining algorithms as it generates maximal frequent closed homogeneous itemsets instead of frequent itemsets. Thus, it saves elapsed time, and can work on big dataset. Pathway and Gene Ontology analyses are conducted on the genes of the evolved rules using David database. Frequency analysis of the genes appearing in the evolved rules is performed to determine potential biomarkers. Furthermore, we also classify the data to know how much the evolved rules are able to describe accurately the remaining test (unknown) data. Subsequently, we also compare the average classification accuracy, and other related factors with other rule-based classifiers. Statistical significance tests are also performed for verifying the statistical relevance of the comparative results. Here, each of the other rule mining methods or rule-based classifiers is also starting with the same post-discretized data

  4. Path integrals over phase space, their definition and simple properties

    International Nuclear Information System (INIS)

    Tarski, J.; Technische Univ. Clausthal, Clausthal-Zellerfeld

    1981-10-01

    Path integrals over phase space are defined in two ways. Some properties of these integrals are established. These properties concern the technique of integration and the quantization rule isup(-I)deltasub(q) p. (author)

  5. Using Rule-Based Computer Programming to Unify Communication Rules Research.

    Science.gov (United States)

    Sanford, David L.; Roach, J. W.

    This paper proposes the use of a rule-based computer programming language as a standard for the expression of rules, arguing that the adoption of a standard would enable researchers to communicate about rules in a consistent and significant way. Focusing on the formal equivalence of artificial intelligence (AI) programming to different types of…

  6. Convention on nuclear safety. Rules of procedure and financial rules

    International Nuclear Information System (INIS)

    1998-01-01

    The document presents the Rules of Procedure and Financial Rules that apply mutatis mutandis to any meeting of the Contracting Parties to the Convention on Nuclear Safety (INFCIRC/449) convened in accordance with Chapter 3 of the Convention. It includes four parts: General provisions, Preparatory process for review meetings, Review meetings, and Amendment and interpretation of rules

  7. Delayed rule following.

    Science.gov (United States)

    Schmitt, D R

    2001-01-01

    Although the elements of a fully stated rule (discriminative stimulus [S(D)], some behavior, and a consequence) can occur nearly contemporaneously with the statement of the rule, there is often a delay between the rule statement and the S(D). The effects of this delay on rule following have not been studied in behavior analysis, but they have been investigated in rule-like settings in the areas of prospective memory (remembering to do something in the future) and goal pursuit. Discriminative events for some behavior can be event based (a specific setting stimulus) or time based. The latter are more demanding with respect to intention following and show age-related deficits. Studies suggest that the specificity with which the components of a rule (termed intention) are stated has a substantial effect on intention following, with more detailed specifications increasing following. Reminders of an intention, too, are most effective when they refer specifically to both the behavior and its occasion. Covert review and written notes are two effective strategies for remembering everyday intentions, but people who use notes appear not to be able to switch quickly to covert review. By focusing on aspects of the setting and rule structure, research on prospective memory and goal pursuit expands the agenda for a more complete explanation of rule effects.

  8. Solving Hammerstein Type Integral Equation by New Discrete Adomian Decomposition Methods

    Directory of Open Access Journals (Sweden)

    Huda O. Bakodah

    2013-01-01

    Full Text Available New discrete Adomian decomposition methods are presented by using some identified Clenshaw-Curtis quadrature rules. We investigate two mixed quadrature rules one of precision five and the other of precision seven. The first rule is formed by using the Fejér second rule of precision three and Simpson rule of precision three, while the second rule is formed by using the Fejér second rule of precision five and the Boole rule of precision five. Our methods were applied to a nonlinear integral equation of the Hammerstein type and some examples are given to illustrate the validity of our methods.

  9. Hamburg rules V Hague Visby rules an English perspective

    OpenAIRE

    Tozaj Dorian; Xhelilaj Ermal

    2010-01-01

    It has often been argued for the effect of defences provided to carriers under Art IV (2) of Hague Visby Rules to almost nullify the protection guaranteed to shippers in other provisions of this convention. Therefore an all embracing universal shipper friendly convention, merely the Hamburg Rules, need be incorporated in all countries in order to address this issue and fully satisfy the intentions of the parties for the establishment of international rules in international trade

  10. Property Integration: Componentless Design Techniques and Visualization Tools

    DEFF Research Database (Denmark)

    El-Halwagi, Mahmoud M; Glasgow, I.M.; Eden, Mario Richard

    2004-01-01

    integration is defined as a functionality-based, holistic approach to the allocation and manipulation of streams and processing units, which is based on tracking, adjusting, assigning, and matching functionalities throughout the process. Revised lever arm rules are devised to allow optimal allocation while...... maintaining intra- and interstream conservation of the property-based clusters. The property integration problem is mapped into the cluster domain. This dual problem is solved in terms of clusters and then mapped to the primal problem in the property domain. Several new rules are derived for graphical...... techniques. Particularly, systematic rules and visualization techniques for the identification of optimal mixing of streams and their allocation to units. Furthermore, a derivation of the correspondence between clustering arms and fractional contribution of streams is presented. This correspondence...

  11. Designing business rules for mediation : a process towards agent-mediated business coordination

    NARCIS (Netherlands)

    Zhao, Z.; Dignum, M.V.; Dignum, F.P.M.

    2008-01-01

    Business process integration is a very active research area, in which mediation is one of the fundamental architectural choices. Mediators have difficulties to design mediation services that meet the requirements of the different stakeholders. Business rules play an important role in the

  12. Resolving task rule incongruence during task switching by competitor rule suppression.

    Science.gov (United States)

    Meiran, Nachshon; Hsieh, Shulan; Dimov, Eduard

    2010-07-01

    Task switching requires maintaining readiness to execute any task of a given set of tasks. However, when tasks switch, the readiness to execute the now-irrelevant task generates interference, as seen in the task rule incongruence effect. Overcoming such interference requires fine-tuned inhibition that impairs task readiness only minimally. In an experiment involving 2 object classification tasks and 2 location classification tasks, the authors show that irrelevant task rules that generate response conflicts are inhibited. This competitor rule suppression (CRS) is seen in response slowing in subsequent trials, when the competing rules become relevant. CRS is shown to operate on specific rules without affecting similar rules. CRS and backward inhibition, which is another inhibitory phenomenon, produced additive effects on reaction time, suggesting their mutual independence. Implications for current formal theories of task switching as well as for conflict monitoring theories are discussed. (c) 2010 APA, all rights reserved

  13. A new sum rule relating the deep-inelastic polarized structure function to the cross section of photoproduction

    International Nuclear Information System (INIS)

    Koretune, Susumu

    1993-01-01

    A sum rule which relates the deep-inelastic polarized structure function g 1 p (x,Q 2 ) to the cross section of photoproduction, (σ 3/2 -σ 1/2 ), is derived. This rule makes it possible to compare the integral of g 1 p (x,Q 2 ) with the Drell-Hearn-Gerasimov sum rule without worrying about contributions from higher twist terms. Further this sum rule shows that there may exist a dynamical mechanism which relates the low energy region to the high energy one. It is conjectured that the spontaneous chiral symmetry breaking of the vacuum is the origin of this mechanism. (author)

  14. Functionalized Graphitic Carbon Nitride for Metal-free, Flexible and Rewritable Nonvolatile Memory Device via Direct Laser-Writing

    Science.gov (United States)

    Zhao, Fei; Cheng, Huhu; Hu, Yue; Song, Long; Zhang, Zhipan; Jiang, Lan; Qu, Liangti

    2014-01-01

    Graphitic carbon nitride nanosheet (g-C3N4-NS) has layered structure similar with graphene nanosheet and presents unusual physicochemical properties due to the s-triazine fragments. But their electronic and electrochemical applications are limited by the relatively poor conductivity. The current work provides the first example that atomically thick g-C3N4-NSs are the ideal candidate as the active insulator layer with tunable conductivity for achieving the high performance memory devices with electrical bistability. Unlike in conventional memory diodes, the g-C3N4-NSs based devices combined with graphene layer electrodes are flexible, metal-free and low cost. The functionalized g-C3N4-NSs exhibit desirable dispersibility and dielectricity which support the all-solution fabrication and high performance of the memory diodes. Moreover, the flexible memory diodes are conveniently fabricated through the fast laser writing process on graphene oxide/g-C3N4-NSs/graphene oxide thin film. The obtained devices not only have the nonvolatile electrical bistability with great retention and endurance, but also show the rewritable memory effect with a reliable ON/OFF ratio of up to 105, which is the highest among all the metal-free flexible memory diodes reported so far, and even higher than those of metal-containing devices. PMID:25073687

  15. Choosing the rules: distinct and overlapping frontoparietal representations of task rules for perceptual decisions.

    Science.gov (United States)

    Zhang, Jiaxiang; Kriegeskorte, Nikolaus; Carlin, Johan D; Rowe, James B

    2013-07-17

    Behavior is governed by rules that associate stimuli with responses and outcomes. Human and monkey studies have shown that rule-specific information is widely represented in the frontoparietal cortex. However, it is not known how establishing a rule under different contexts affects its neural representation. Here, we use event-related functional MRI (fMRI) and multivoxel pattern classification methods to investigate the human brain's mechanisms of establishing and maintaining rules for multiple perceptual decision tasks. Rules were either chosen by participants or specifically instructed to them, and the fMRI activation patterns representing rule-specific information were compared between these contexts. We show that frontoparietal regions differ in the properties of their rule representations during active maintenance before execution. First, rule-specific information maintained in the dorsolateral and medial frontal cortex depends on the context in which it was established (chosen vs specified). Second, rule representations maintained in the ventrolateral frontal and parietal cortex are independent of the context in which they were established. Furthermore, we found that the rule-specific coding maintained in anticipation of stimuli may change with execution of the rule: representations in context-independent regions remain invariant from maintenance to execution stages, whereas rule representations in context-dependent regions do not generalize to execution stage. The identification of distinct frontoparietal systems with context-independent and context-dependent task rule representations, and the distinction between anticipatory and executive rule representations, provide new insights into the functional architecture of goal-directed behavior.

  16. RCC-M - Design and Conception Rules for Mechanical Components of PWR Nuclear Islands

    International Nuclear Information System (INIS)

    2007-01-01

    The design and construction rules applicable to mechanical components of PWR Nuclear Islands (RCC-M) are a part of the collection of design and construction rules for nuclear power plants. It covers the rules applicable to the design and manufacture of pressure boundaries of mechanical equipment of pressurized water reactors (PWR). The pressure components subject to the RCC-M are specified in A 4000. They include the reactor fluid systems (primary, secondary and auxiliary systems) and other components which are not subject to pressure: vessel internals, supports for pressure components subject to the RCC-M, nuclear island storage tanks. When a pressure equipment is subject to the RCC-M, all its elements subject to pressure are also, in accordance with the provisions of A 4000, and these elements are the same class as the component. In this case all the provisions of the RCC-M are applicable: design, procurement, manufacture, inspection and pressure testing. Elements which are not subject to pressure and which are subject to the RCC-M may be covered within the Code by limited specific provisions (procurement of materials for example). The other rules applicable to this equipment must be in contractual form. The assemblies comprising pressure equipment assembled by a manufacturer to constitute an integrated and functional whole, shall be subject to the rules indicated in this Code. Main objectives of Code Requirements are to ensure the integrity and mechanical stability over the equipment design life. Function ability and operability of equipment are not directly addressed in the Code. The RCC-M contributes to ensuring compliance with regulatory requirements. These requirements depend on the applicable regulatory context. The RCC-M is representative of the state of the art as concerns the design and manufacture of PWR components, ensuring an overall safety level tested through experience. The RCC-M consists of five sections, which provide rules for the design and

  17. Smooth criminal: convicted rule-breakers show reduced cognitive conflict during deliberate rule violations.

    Science.gov (United States)

    Jusyte, Aiste; Pfister, Roland; Mayer, Sarah V; Schwarz, Katharina A; Wirth, Robert; Kunde, Wilfried; Schönenberg, Michael

    2017-09-01

    Classic findings on conformity and obedience document a strong and automatic drive of human agents to follow any type of rule or social norm. At the same time, most individuals tend to violate rules on occasion, and such deliberate rule violations have recently been shown to yield cognitive conflict for the rule-breaker. These findings indicate persistent difficulty to suppress the rule representation, even though rule violations were studied in a controlled experimental setting with neither gains nor possible sanctions for violators. In the current study, we validate these findings by showing that convicted criminals, i.e., individuals with a history of habitual and severe forms of rule violations, can free themselves from such cognitive conflict in a similarly controlled laboratory task. These findings support an emerging view that aims at understanding rule violations from the perspective of the violating agent rather than from the perspective of outside observer.

  18. Light Cone Sum Rules for gamma*N ->Delta Transition Form Factors

    Energy Technology Data Exchange (ETDEWEB)

    V.M. Braun; A. Lenz; G. Peters; A. Radyushkin

    2006-02-01

    A theoretical framework is suggested for the calculation of {gamma}* N {yields} {Delta} transition form factors using the light-cone sum rule approach. Leading-order sum rules are derived and compared with the existing experimental data. We find that the transition form factors in a several GeV region are dominated by the ''soft'' contributions that can be thought of as overlap integrals of the valence components of the hadron wave functions. The ''minus'' components of the quark fields contribute significantly to the result, which can be reinterpreted as large contributions of the quark orbital angular momentum.

  19. Signal Integrity Analysis of High-Speed Interconnects

    CERN Document Server

    Oltean Karlsson, A

    2007-01-01

    LHC detectors and future experiments will produce very large amount of data that will be transferred at multi-Gigabit speeds. At such data rates, signal-integrity effects become important and traditional rules of thumb are no longer enough for the design and layout of the traces. Simulations for signal-integrity effects at board level provide a way to study and validate several scenarios before arriving at a set of optimized design rules prior to building the actual printed circuit board (PCB). This article describes some of the available tools at CERN. Two case studies will be used to highlight the capabilities of these programs.

  20. The Rules of the Game—The Rules of the Player

    DEFF Research Database (Denmark)

    Thorhauge, Anne Mette

    2013-01-01

    of the game manager in order to implement the rules and provide a world for the other players. In online role-playing games, a programmed system simulates the rule system as well as part of the game manager’s tasks, while the rest of the activity is up to the players to define. Some aspects may translate more......This article presents a critical view of the concept of rules in game studies on the basis of a case study of role-playing across media. Role-playing in its traditional form is a complex activity including a game system and a number of communicative conventions where one player takes the role...... or less unproblematically across media, others are transformed by the introduction of the programmed system. This reveals some important perspectives on the sort of rules that can be simulated in a programmed system and what this means to the concept of rules in game studies....

  1. Proposal to modify Rule 6, Rule 10a, and Rule 12c of the International Code of Nomenclature of Prokaryotes.

    Science.gov (United States)

    Oren, Aharon; Garrity, George M; Schink, Bernhard

    2014-04-01

    According to the current versions of Rule 10a and Rule 12c of the International Code of Nomenclature of Prokaryotes, names of a genus or subgenus and specific epithets may be taken from any source and may even be composed in an arbitrary manner. Based on these rules, names may be composed of any word or any combination of elements derived from any language with a Latin ending. We propose modifying these rules by adding the text, currently part of Recommendation 6, according to which words from languages other than Latin or Greek should be avoided as long as equivalents exist in Latin or Greek or can be constructed by combining word elements from these two languages. We also propose modification of Rule 6 by adopting some of the current paragraphs of Recommendation 6 to become part of the Rule.

  2. An Embedded Rule-Based Diagnostic Expert System in Ada

    Science.gov (United States)

    Jones, Robert E.; Liberman, Eugene M.

    1992-01-01

    Ada is becoming an increasingly popular programming language for large Government-funded software projects. Ada with it portability, transportability, and maintainability lends itself well to today's complex programming environment. In addition, expert systems have also assumed a growing role in providing human-like reasoning capability expertise for computer systems. The integration is discussed of expert system technology with Ada programming language, especially a rule-based expert system using an ART-Ada (Automated Reasoning Tool for Ada) system shell. NASA Lewis was chosen as a beta test site for ART-Ada. The test was conducted by implementing the existing Autonomous Power EXpert System (APEX), a Lisp-based power expert system, in ART-Ada. Three components, the rule-based expert systems, a graphics user interface, and communications software make up SMART-Ada (Systems fault Management with ART-Ada). The rules were written in the ART-Ada development environment and converted to Ada source code. The graphics interface was developed with the Transportable Application Environment (TAE) Plus, which generates Ada source code to control graphics images. SMART-Ada communicates with a remote host to obtain either simulated or real data. The Ada source code generated with ART-Ada, TAE Plus, and communications code was incorporated into an Ada expert system that reads the data from a power distribution test bed, applies the rule to determine a fault, if one exists, and graphically displays it on the screen. The main objective, to conduct a beta test on the ART-Ada rule-based expert system shell, was achieved. The system is operational. New Ada tools will assist in future successful projects. ART-Ada is one such tool and is a viable alternative to the straight Ada code when an application requires a rule-based or knowledge-based approach.

  3. The Story of Heathcliff’s Journey Back to Wuthering Heights de Lin Haire-Sargeant (1992, ou le « deux en un » de la ré-écriture The Story of Heathcliff’s Journey Back to Wuthering Heights by Lin Haire-Sargeant (1992, and a “Two in one” Rewrite

    Directory of Open Access Journals (Sweden)

    Isabelle Roblin

    2009-10-01

    Full Text Available Lin Haire-Sargeant’s 1992 novel The Story of Heathcliff’s Journey Back to Wuthering Heights is typical of the interest shown by contemporary American writers in Victorian novels. It could indeed be classified doubly as a “retro-Victorian novel” since it partly re-writes not only Emily Brontë’s most famous novel, Wuthering Heights, as the title points out, but also, somewhat less obviously, Charlotte Brontë’s Jane Eyre. We will study in this article how Lin Haire-Sargeant’s attempt at re-writing highlights the usual aims of the retro-Victorian novel: taking advantage of the blanks left by the source novels to propose to the reader a modern critical approach, while at the same time being as faithful as possible to the writing conventions of the 19th century, and suggesting another point of view on a well-known story, through a postmodern mixing of historical and fictive characters.

  4. RuleMaDrone: A Web-Interface to Visualise Space Usage Rules for Drones

    OpenAIRE

    Trippaers, Aäron

    2015-01-01

    RuleMaDrone, an application developed within this thesis, is presented as a solution to communicate the rules and regulations to drone operators. To provide the solution a framework for drone safety was designed which consists of the rules and regulations, the drone properties and the environmental factors. RuleMaDrone is developed with this framework and thus will provide drone operators with an application which they can use to find a safe and legal fly zone. RuleMaDrone u...

  5. Strategy as simple rules.

    Science.gov (United States)

    Eisenhardt, K M; Sull, D N

    2001-01-01

    The success of Yahoo!, eBay, Enron, and other companies that have become adept at morphing to meet the demands of changing markets can't be explained using traditional thinking about competitive strategy. These companies have succeeded by pursuing constantly evolving strategies in market spaces that were considered unattractive according to traditional measures. In this article--the third in an HBR series by Kathleen Eisenhardt and Donald Sull on strategy in the new economy--the authors ask, what are the sources of competitive advantage in high-velocity markets? The secret, they say, is strategy as simple rules. The companies know that the greatest opportunities for competitive advantage lie in market confusion, but they recognize the need for a few crucial strategic processes and a few simple rules. In traditional strategy, advantage comes from exploiting resources or stable market positions. In strategy as simple rules, advantage comes from successfully seizing fleeting opportunities. Key strategic processes, such as product innovation, partnering, or spinout creation, place the company where the flow of opportunities is greatest. Simple rules then provide the guidelines within which managers can pursue such opportunities. Simple rules, which grow out of experience, fall into five broad categories: how- to rules, boundary conditions, priority rules, timing rules, and exit rules. Companies with simple-rules strategies must follow the rules religiously and avoid the temptation to change them too frequently. A consistent strategy helps managers sort through opportunities and gain short-term advantage by exploiting the attractive ones. In stable markets, managers rely on complicated strategies built on detailed predictions of the future. But when business is complicated, strategy should be simple.

  6. 49 CFR 222.41 - How does this rule affect Pre-Rule Quiet Zones and Pre-Rule Partial Quiet Zones?

    Science.gov (United States)

    2010-10-01

    ...-Rule Quiet Zone may be established by automatic approval and remain in effect, subject to § 222.51, if... Zone may be established by automatic approval and remain in effect, subject to § 222.51, if the Pre... 49 Transportation 4 2010-10-01 2010-10-01 false How does this rule affect Pre-Rule Quiet Zones and...

  7. Spent nuclear fuel project integrated schedule plan

    International Nuclear Information System (INIS)

    Squires, K.G.

    1995-01-01

    The Spent Nuclear Fuel Integrated Schedule Plan establishes the organizational responsibilities, rules for developing, maintain and status of the SNF integrated schedule, and an implementation plan for the integrated schedule. The mission of the SNFP on the Hanford site is to provide safe, economic, environmentally sound management of Hanford SNF in a manner which stages it to final disposition. This particularly involves K Basin fuel

  8. Spent nuclear fuel project integrated schedule plan

    Energy Technology Data Exchange (ETDEWEB)

    Squires, K.G.

    1995-03-06

    The Spent Nuclear Fuel Integrated Schedule Plan establishes the organizational responsibilities, rules for developing, maintain and status of the SNF integrated schedule, and an implementation plan for the integrated schedule. The mission of the SNFP on the Hanford site is to provide safe, economic, environmentally sound management of Hanford SNF in a manner which stages it to final disposition. This particularly involves K Basin fuel.

  9. In-medium QCD sum rules for {omega} meson, nucleon and D meson

    Energy Technology Data Exchange (ETDEWEB)

    Thomas, Ronny

    2008-07-01

    The modifications of hadronic properties caused by an ambient nuclear medium are investigated within the scope of QCD sum rules. This is exemplified for the cases of the {omega} meson, the nucleon and the D meson. By virtue of the sum rules, integrated spectral densities of these hadrons are linked to properties of the QCD ground state, quantified in condensates. For the cases of the {omega} meson and the nucleon it is discussed how the sum rules allow a restriction of the parameter range of poorly known four-quark condensates by a comparison of experimental and theoretical knowledge. The catalog of independent four-quark condensates is covered and relations among these condensates are revealed. The behavior of four-quark condensates under the chiral symmetry group and the relation to order parameters of spontaneous chiral symmetry breaking are outlined. In this respect, also the QCD condensates appearing in differences of sum rules of chiral partners are investigated. Finally, the effects of an ambient nuclear medium on the D meson are discussed and relevant condensates are identified. (orig.)

  10. Dynamically Integrating OSM Data into a Borderland Database

    Directory of Open Access Journals (Sweden)

    Xiaoguang Zhou

    2015-09-01

    Full Text Available Spatial data are fundamental for borderland analyses of geography, natural resources, demography, politics, economy, and culture. As the spatial data used in borderland research usually cover the borderland regions of several neighboring countries, it is difficult for anyone research institution of government to collect them. Volunteered Geographic Information (VGI is a highly successful method for acquiring timely and detailed global spatial data at a very low cost. Therefore, VGI is a reasonable source of borderland spatial data. OpenStreetMap (OSM is known as the most successful VGI resource. However, OSM's data model is far different from the traditional geographic information model. Thus, the OSM data must be converted in the scientist’s customized data model. Because the real world changes rapidly, the converted data must be updated incrementally. Therefore, this paper presents a method used to dynamically integrate OSM data into the borderland database. In this method, a basic transformation rule base is formed by comparing the OSM Map Feature description document and the destination model definitions. Using the basic rules, the main features can be automatically converted to the destination model. A human-computer interaction model transformation and a rule/automatic-remember mechanism are developed to interactively transfer the unusual features that cannot be transferred by the basic rules to the target model and to remember the reusable rules automatically. To keep the borderland database current, the global OsmChange daily diff file is used to extract the change-only information for the research region. To extract the changed objects in the region under study, the relationship between the changed object and the research region is analyzed considering the evolution of the involved objects. In addition, five rules are determined to select the objects and integrate the changed objects with multi-versions over time. The objects

  11. Using the Chain Rule as the Key Link in Deriving the General Rules for Differentiation

    Science.gov (United States)

    Sprows, David

    2011-01-01

    The standard approach to the general rules for differentiation is to first derive the power, product, and quotient rules and then derive the chain rule. In this short article we give an approach to these rules which uses the chain rule as the main tool in deriving the power, product, and quotient rules in a manner which is more student-friendly…

  12. 19 CFR 10.532 - Integrated Sourcing Initiative.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 1 2010-04-01 2010-04-01 false Integrated Sourcing Initiative. 10.532 Section 10... Trade Agreement Rules of Origin § 10.532 Integrated Sourcing Initiative. (a) For purposes of General... Sourcing Initiative if: (1) The good, in its condition as imported, is both classified in a tariff...

  13. Managing Objects in a Relational Framework

    Science.gov (United States)

    1989-01-01

    Database Week, San Jose CA, May.1983, pp.107-113. [Stonebraker 85] Stonebraker,M. and Rowe,L.: "The Design of POSTGRES " Tech.Report UC Berkeley, Nov...latter is equivalent to the definition of an attribute in a POSTGRES relation using the generic Quel facility. Recently, recursive query languages have...utilize rewrite rules. OSQL [Lynl 88] provides a language for associative access. 2. The POSTGRES model [Sto 86] allows Quel and C-procedures as the

  14. Automated implementation of rule-based expert systems with neural networks for time-critical applications

    Science.gov (United States)

    Ramamoorthy, P. A.; Huang, Song; Govind, Girish

    1991-01-01

    In fault diagnosis, control and real-time monitoring, both timing and accuracy are critical for operators or machines to reach proper solutions or appropriate actions. Expert systems are becoming more popular in the manufacturing community for dealing with such problems. In recent years, neural networks have revived and their applications have spread to many areas of science and engineering. A method of using neural networks to implement rule-based expert systems for time-critical applications is discussed here. This method can convert a given rule-based system into a neural network with fixed weights and thresholds. The rules governing the translation are presented along with some examples. We also present the results of automated machine implementation of such networks from the given rule-base. This significantly simplifies the translation process to neural network expert systems from conventional rule-based systems. Results comparing the performance of the proposed approach based on neural networks vs. the classical approach are given. The possibility of very large scale integration (VLSI) realization of such neural network expert systems is also discussed.

  15. Consistence of Network Filtering Rules

    Institute of Scientific and Technical Information of China (English)

    SHE Kun; WU Yuancheng; HUANG Juncai; ZHOU Mingtian

    2004-01-01

    The inconsistence of firewall/VPN(Virtual Private Network) rule makes a huge maintainable cost.With development of Multinational Company,SOHO office,E-government the number of firewalls/VPN will increase rapidly.Rule table in stand-alone or network will be increased in geometric series accordingly.Checking the consistence of rule table manually is inadequate.A formal approach can define semantic consistence,make a theoretic foundation of intelligent management about rule tables.In this paper,a kind of formalization of host rules and network ones for auto rule-validation based on SET theory were proporsed and a rule validation scheme was defined.The analysis results show the superior performance of the methods and demonstrate its potential for the intelligent management based on rule tables.

  16. Tuning rules for robust FOPID controllers based on multi-objective optimization with FOPDT models.

    Science.gov (United States)

    Sánchez, Helem Sabina; Padula, Fabrizio; Visioli, Antonio; Vilanova, Ramon

    2017-01-01

    In this paper a set of optimally balanced tuning rules for fractional-order proportional-integral-derivative controllers is proposed. The control problem of minimizing at once the integrated absolute error for both the set-point and the load disturbance responses is addressed. The control problem is stated as a multi-objective optimization problem where a first-order-plus-dead-time process model subject to a robustness, maximum sensitivity based, constraint has been considered. A set of Pareto optimal solutions is obtained for different normalized dead times and then the optimal balance between the competing objectives is obtained by choosing the Nash solution among the Pareto-optimal ones. A curve fitting procedure has then been applied in order to generate suitable tuning rules. Several simulation results show the effectiveness of the proposed approach. Copyright © 2016. Published by Elsevier Ltd.

  17. Understanding signal integrity

    CERN Document Server

    Thierauf, Stephen C

    2010-01-01

    This unique book provides you with practical guidance on understanding and interpreting signal integrity (SI) performance to help you with your challenging circuit board design projects. You find high-level discussions of important SI concepts presented in a clear and easily accessible format, including question and answer sections and bulleted lists.This valuable resource features rules of thumb and simple equations to help you make estimates of critical signal integrity parameters without using circuit simulators of CAD (computer-aided design). The book is supported with over 120 illustratio

  18. Max-out-in pivot rule with Dantzig's safeguarding rule for the simplex method

    International Nuclear Information System (INIS)

    Tipawanna, Monsicha; Sinapiromsaran, Krung

    2014-01-01

    The simplex method is used to solve linear programming problem by improving the current basic feasible solution. It uses a pivot rule to guide the search in the feasible region. The pivot rule is used to select an entering index in simplex method. Nowadays, many pivot rule have been presented, but no pivot rule shows superior performance than other. Therefore, this is still an active research in linear programming. In this research, we present the max-out-in pivot rule with Dantzig's safeguarding for simplex method. This rule is based on maximum improvement of objective value of the current basic feasible point similar to the Dantzig's rule. We can illustrate by Klee and Minty problems that our rule outperforms that of Dantzig's rule by the number of iterations for solving linear programming problems

  19. Sum rules and constraints on passive systems

    International Nuclear Information System (INIS)

    Bernland, A; Gustafsson, M; Luger, A

    2011-01-01

    A passive system is one that cannot produce energy, a property that naturally poses constraints on the system. A system in convolution form is fully described by its transfer function, and the class of Herglotz functions, holomorphic functions mapping the open upper half-plane to the closed upper half-plane, is closely related to the transfer functions of passive systems. Following a well-known representation theorem, Herglotz functions can be represented by means of positive measures on the real line. This fact is exploited in this paper in order to rigorously prove a set of integral identities for Herglotz functions that relate weighted integrals of the function to its asymptotic expansions at the origin and infinity. The integral identities are the core of a general approach introduced here to derive sum rules and physical limitations on various passive physical systems. Although similar approaches have previously been applied to a wide range of specific applications, this paper is the first to deliver a general procedure together with the necessary proofs. This procedure is described thoroughly and exemplified with examples from electromagnetic theory.

  20. Totally optimal decision rules

    KAUST Repository

    Amin, Talha

    2017-11-22

    Optimality of decision rules (patterns) can be measured in many ways. One of these is referred to as length. Length signifies the number of terms in a decision rule and is optimally minimized. Another, coverage represents the width of a rule’s applicability and generality. As such, it is desirable to maximize coverage. A totally optimal decision rule is a decision rule that has the minimum possible length and the maximum possible coverage. This paper presents a method for determining the presence of totally optimal decision rules for “complete” decision tables (representations of total functions in which different variables can have domains of differing values). Depending on the cardinalities of the domains, we can either guarantee for each tuple of values of the function that totally optimal rules exist for each row of the table (as in the case of total Boolean functions where the cardinalities are equal to 2) or, for each row, we can find a tuple of values of the function for which totally optimal rules do not exist for this row.

  1. Totally optimal decision rules

    KAUST Repository

    Amin, Talha M.; Moshkov, Mikhail

    2017-01-01

    Optimality of decision rules (patterns) can be measured in many ways. One of these is referred to as length. Length signifies the number of terms in a decision rule and is optimally minimized. Another, coverage represents the width of a rule’s applicability and generality. As such, it is desirable to maximize coverage. A totally optimal decision rule is a decision rule that has the minimum possible length and the maximum possible coverage. This paper presents a method for determining the presence of totally optimal decision rules for “complete” decision tables (representations of total functions in which different variables can have domains of differing values). Depending on the cardinalities of the domains, we can either guarantee for each tuple of values of the function that totally optimal rules exist for each row of the table (as in the case of total Boolean functions where the cardinalities are equal to 2) or, for each row, we can find a tuple of values of the function for which totally optimal rules do not exist for this row.

  2. On applicability of crack shape characterization rules for multiple in-plane surface cracks

    International Nuclear Information System (INIS)

    Kim, Jong Min; Choi, Suhn; Park, Keun Bae; Choi, Jae Boong; Huh, Nam Su

    2009-01-01

    The fracture mechanics assessment parameters, such as the elastic stress intensity factor and the elastic-plastic J-integral, for a surface crack can be significantly affected by adjacent cracks. Regarding such an interaction effect, the relative distance between adjacent cracks, crack aspect ratio and loading condition were known to be important factors for multiple cracks, which affects the fracture mechanics assessment parameters. Although several guidance (ASME Sec. XI, BS7910, British Energy R6 and API RP579) on a crack interaction effect (crack combination rule) have been proposed and used for assessing the interaction effect, each guidance provides different rules for combining multiple surface cracks into a single surface crack. Based on the systematic elastic and elastic-plastic finite element analyses, the present study investigated the acceptability of the crack combination rules provided in the existing guidance, and the relevant recommendations on a crack interaction for in-plane surface cracks in a plate were discussed. To quantify the interaction effect, the elastic stress intensity factor and elastic-plastic J-integral along the crack front were used. As for the loading condition, only axial tension was considered. As a result, BS7910 seems to provide the most relevant crack combination rule for in-plane dual surface cracks, whereas API RP579 provides the most conservative results. In particular, ASME Sec. XI still seems to have some room for a revision to shorten the critical distance between two adjacent cracks for a crack combination. The overall tendency of the elastic-plastic analyses results is identical to that of the elastic analyses results.

  3. ASPECTS OF PERSONNEL INTEGRATION IN MULTINATIONAL ORGANIZATIONS

    OpenAIRE

    Craiovan, Petru Mihai; Cramariuc, Alexandra

    2011-01-01

    Organizational integration is the process which involves adaptation, accommodation, assimilation by which the employee compiles with the requests, the rules of the objective situations and of the collectivity. The new employee must adapt both professional and social in order to fulfill his tasks and to integrate in the new organizational culture. The integration strategies are: formal/informal, individual/group, sequenced/no sequenced, nonmobile/mobile, serials/disjunctives, investment/disinv...

  4. Optimal offering and operating strategies for wind-storage systems with linear decision rules

    DEFF Research Database (Denmark)

    Ding, Huajie; Pinson, Pierre; Hu, Zechun

    2016-01-01

    The participation of wind farm-energy storage systems (WF-ESS) in electricity markets calls for an integrated view of day-ahead offering strategies and real-time operation policies. Such an integrated strategy is proposed here by co-optimizing offering at the day-ahead stage and operation policy...... to be used at the balancing stage. Linear decision rules are seen as a natural approach to model and optimize the real-time operation policy. These allow enhancing profits from balancing markets based on updated information on prices and wind power generation. Our integrated strategies for WF...

  5. Reservoir adaptive operating rules based on both of historical streamflow and future projections

    Science.gov (United States)

    Zhang, Wei; Liu, Pan; Wang, Hao; Chen, Jie; Lei, Xiaohui; Feng, Maoyuan

    2017-10-01

    Climate change is affecting hydrological variables and consequently is impacting water resources management. Historical strategies are no longer applicable under climate change. Therefore, adaptive management, especially adaptive operating rules for reservoirs, has been developed to mitigate the possible adverse effects of climate change. However, to date, adaptive operating rules are generally based on future projections involving uncertainties under climate change, yet ignoring historical information. To address this, we propose an approach for deriving adaptive operating rules considering both historical information and future projections, namely historical and future operating rules (HAFOR). A robustness index was developed by comparing benefits from HAFOR with benefits from conventional operating rules (COR). For both historical and future streamflow series, maximizations of both average benefits and the robustness index were employed as objectives, and four trade-offs were implemented to solve the multi-objective problem. Based on the integrated objective, the simulation-based optimization method was used to optimize the parameters of HAFOR. Using the Dongwushi Reservoir in China as a case study, HAFOR was demonstrated to be an effective and robust method for developing adaptive operating rules under the uncertain changing environment. Compared with historical or projected future operating rules (HOR or FPOR), HAFOR can reduce the uncertainty and increase the robustness for future projections, especially regarding results of reservoir releases and volumes. HAFOR, therefore, facilitates adaptive management in the context that climate change is difficult to predict accurately.

  6. Do Group Decision Rules Affect Trust? A Laboratory Experiment on Group Decision Rules and Trust

    DEFF Research Database (Denmark)

    Nielsen, Julie Hassing

    2016-01-01

    Enhanced participation has been prescribed as the way forward for improving democratic decision making while generating positive attributes like trust. Yet we do not know the extent to which rules affect the outcome of decision making. This article investigates how different group decision rules......-hierarchical decision-making procedures enhance trust vis-à-vis other more hierarchical decision-making procedures....... affect group trust by testing three ideal types of decision rules (i.e., a Unilateral rule, a Representative rule and a 'Non-rule') in a laboratory experiment. The article shows significant differences between the three decision rules on trust after deliberation. Interestingly, however, it finds...

  7. The Relationship between Second-Order False Belief and Display Rules Reasoning: The Integration of Cognitive and Affective Social Understanding

    Science.gov (United States)

    Naito, Mika; Seki, Yoshimi

    2009-01-01

    To investigate the relation between cognitive and affective social understanding, Japanese 4- to 8-year-olds received tasks of first- and second-order false beliefs and prosocial and self-presentational display rules. From 6 to 8 years, children comprehended display rules, as well as second-order false belief, using social pressures justifications…

  8. Verification of business rules programs

    CERN Document Server

    Silva, Bruno Berstel-Da

    2013-01-01

    Rules represent a simplified means of programming, congruent with our understanding of human brain constructs. With the advent of business rules management systems, it has been possible to introduce rule-based programming to nonprogrammers, allowing them to map expert intent into code in applications such as fraud detection, financial transactions, healthcare, retail, and marketing. However, a remaining concern is the quality, safety, and reliability of the resulting programs.  This book is on business rules programs, that is, rule programs as handled in business rules management systems. Its

  9. RIGHTS, RULES, AND DEMOCRACY

    Directory of Open Access Journals (Sweden)

    Richard S. Kay, University of Connecticut-School of Law, Estados Unidos

    2012-11-01

    Full Text Available Abstract: Democracy require protection of certain fundamental rights, but can we expect courts to follow rules? There seems little escape from the proposition that substantive constitutional review by an unelected judiciary is a presumptive abridgement of democratic decision-making. Once we have accepted the proposition that there exist human rights that ought to be protected, this should hardly surprise us. No one thinks courts are perfect translators of the rules invoked before them on every occasion. But it is equally clear that rules sometimes do decide cases. In modern legal systems the relative roles of courts and legislators with respect to the rules of the system is a commonplace. Legislatures make rules. Courts apply them in particular disputes. When we are talking about human rights, however, that assumption must be clarified in at least one way. The defense of the practice of constitutional review in this article assumes courts can and do enforce rules. This article also makes clear what is the meaning of “following rules”. Preference for judicial over legislative interpretation of rights, therefore, seems to hang on the question of whether or not judges are capable of subordinating their own judgment to that incorporated in the rules by their makers. This article maintains that, in general, entrenched constitutional rules (and not just constitutional courts can and do constrain public conduct and protect human rights. The article concludes that the value judgments will depend on our estimate of the benefits we derive from the process of representative self-government. Against those benefits we will have to measure the importance we place on being able to live our lives with the security created by a regime of human rights protected by the rule of law. Keywords: Democracy. Human Rights. Rules. Judicial Review.

  10. Convention on nuclear safety. Rules of procedure and financial rules

    International Nuclear Information System (INIS)

    1999-01-01

    The document is the first revision of the Rules of Procedures and Financial Rules that apply mutatis mutandis to any meetings of the Contracting Parties to the Convention on Nuclear Safety (INFCIRC/573), convened in accordance with the Chapter 3 of the Convention

  11. Convention on Nuclear Safety. Rules of procedure and financial rules

    International Nuclear Information System (INIS)

    2002-01-01

    The document is the second revision of the Rules of Procedures and Financial Rules that apply mutatis mutandis to any meetings of the Contracting Parties to the Convention on Nuclear Safety (INFCIRC/573), convened in accordance with the Chapter 3 of the Convention

  12. Finite automata, their algebras and grammars towards a theory of formal expressions

    CERN Document Server

    Büchi, J Richard

    1989-01-01

    The author, who died in 1984, is well-known both as a person and through his research in mathematical logic and theoretical computer science. In the first part of the book he presents the new classical theory of finite automata as unary algebras which he himself invented about 30 years ago. Many results, like his work on structure lattices or his characterization of regular sets by generalized regular rules, are unknown to a wider audience. In the second part of the book he extends the theory to general (non-unary, many-sorted) algebras, term rewriting systems, tree automata, and pushdown automata. Essentially Büchi worked independent of other rersearch, following a novel and stimulating approach. He aimed for a mathematical theory of terms, but could not finish the book. Many of the results are known by now, but to work further along this line presents a challenging research program on the borderline between universal algebra, term rewriting systems, and automata theory. For the whole book and aga...

  13. Techniques and implementation of the embedded rule-based expert system using Ada

    Science.gov (United States)

    Liberman, Eugene M.; Jones, Robert E.

    1991-01-01

    Ada is becoming an increasingly popular programming language for large Government-funded software projects. Ada with its portability, transportability, and maintainability lends itself well to today's complex programming environment. In addition, expert systems have also assured a growing role in providing human-like reasoning capability and expertise for computer systems. The integration of expert system technology with Ada programming language, specifically a rule-based expert system using an ART-Ada (Automated Reasoning Tool for Ada) system shell is discussed. The NASA Lewis Research Center was chosen as a beta test site for ART-Ada. The test was conducted by implementing the existing Autonomous Power EXpert System (APEX), a Lisp-base power expert system, in ART-Ada. Three components, the rule-based expert system, a graphics user interface, and communications software make up SMART-Ada (Systems fault Management with ART-Ada). The main objective, to conduct a beta test on the ART-Ada rule-based expert system shell, was achieved. The system is operational. New Ada tools will assist in future successful projects. ART-Ada is one such tool and is a viable alternative to the straight Ada code when an application requires a rule-based or knowledge-based approach.

  14. WellnessRules: A Web 3.0 Case Study in RuleML-Based Prolog-N3 Profile Interoperation

    Science.gov (United States)

    Boley, Harold; Osmun, Taylor Michael; Craig, Benjamin Larry

    An interoperation study, WellnessRules, is described, where rules about wellness opportunities are created by participants in rule languages such as Prolog and N3, and translated within a wellness community using RuleML/XML. The wellness rules are centered around participants, as profiles, encoding knowledge about their activities conditional on the season, the time-of-day, the weather, etc. This distributed knowledge base extends FOAF profiles with a vocabulary and rules about wellness group networking. The communication between participants is organized through Rule Responder, permitting wellness-profile translation and distributed querying across engines. WellnessRules interoperates between rules and queries in the relational (Datalog) paradigm of the pure-Prolog subset of POSL and in the frame (F-logic) paradigm of N3. An evaluation of Rule Responder instantiated for WellnessRules revealed acceptable Web response times.

  15. The role of traffic rules.

    NARCIS (Netherlands)

    Noordzij, P.C.

    1988-01-01

    Experienced road users seem to have their own set of traffic rules (including rules about when to violate the official rules). The number of violations is enormous, causing great concern for the authorities. The situation could be improved by separating a set of rules with the aim of deterring road

  16. A GIS-based multi-criteria seismic vulnerability assessment using the integration of granular computing rule extraction and artificial neural networks

    NARCIS (Netherlands)

    Sheikhian, Hossein; Delavar, Mahmoud Reza; Stein, Alfred

    2017-01-01

    This study proposes multi‐criteria group decision‐making to address seismic physical vulnerability assessment. Granular computing rule extraction is combined with a feed forward artificial neural network to form a classifier capable of training a neural network on the basis of the rules provided by

  17. Life fraction rules

    International Nuclear Information System (INIS)

    Maile, K.

    1989-01-01

    Evaluations for lifetime estimation of high temperature loaded HTR-components under creep fatigue load had been performed. The evaluations were carried out on the basis of experimental data of strain controlled fatigue tests with respectively without hold times performed on material NiCr 22 Co 12 Mo (Inconel 617). Life prediction was made by means of the linear damage accumulation rule. Due to the high temperatures no realistic estimates of creep damage can be obtained with this rule. Therefore the rule was modified. The modifications consist in a different analysis of the relaxation curve including different calculation of the creep damage estimate resp. in an extended rule, taking into consideration the interaction between creep and fatigue. In order to reach a better result transparency and to reduce data set dependent result scattering a round robin with a given data set was carried out. The round robin yielded that for a given test temperature of T = 950deg C realistic estimate of damage can be obtained with each modification. Furthermore a reduction of resulting scatterbands in the interaction diagram can be observed, i.e. the practicability of the rule has been increased. (orig.)

  18. Analysis of Rules for Islamic Inheritance Law in Indonesia Using Hybrid Rule Based Learning

    Science.gov (United States)

    Khosyi'ah, S.; Irfan, M.; Maylawati, D. S.; Mukhlas, O. S.

    2018-01-01

    Along with the development of human civilization in Indonesia, the changes and reform of Islamic inheritance law so as to conform to the conditions and culture cannot be denied. The distribution of inheritance in Indonesia can be done automatically by storing the rule of Islamic inheritance law in the expert system. In this study, we analyze the knowledge of experts in Islamic inheritance in Indonesia and represent it in the form of rules using rule-based Forward Chaining (FC) and Davis-Putman-Logemann-Loveland (DPLL) algorithms. By hybridizing FC and DPLL algorithms, the rules of Islamic inheritance law in Indonesia are clearly defined and measured. The rules were conceptually validated by some experts in Islamic laws and informatics. The results revealed that generally all rules were ready for use in an expert system.

  19. Higher-order (non-)modularity

    DEFF Research Database (Denmark)

    Appel, Claus; van Oostrom, Vincent; Simonsen, Jakob Grue

    2010-01-01

    We show that, contrary to the situation in first-order term rewriting, almost none of the usual properties of rewriting are modular for higher-order rewriting, irrespective of the higher-order rewriting format. We show that for the particular format of simply typed applicative term rewriting...... systems modularity of confluence, normalization, and termination can be recovered by imposing suitable linearity constraints....

  20. A Better Budget Rule

    Science.gov (United States)

    Dothan, Michael; Thompson, Fred

    2009-01-01

    Debt limits, interest coverage ratios, one-off balanced budget requirements, pay-as-you-go rules, and tax and expenditure limits are among the most important fiscal rules for constraining intertemporal transfers. There is considerable evidence that the least costly and most effective of such rules are those that focus directly on the rate of…

  1. Composite Gauss-Legendre Formulas for Solving Fuzzy Integration

    Directory of Open Access Journals (Sweden)

    Xiaobin Guo

    2014-01-01

    Full Text Available Two numerical integration rules based on composition of Gauss-Legendre formulas for solving integration of fuzzy numbers-valued functions are investigated in this paper. The methods' constructions are presented and the corresponding convergence theorems are shown in detail. Two numerical examples are given to illustrate the proposed algorithms finally.

  2. Communicating rules in recreation areas

    Science.gov (United States)

    Terence L. Ross; George H. Moeller

    1974-01-01

    Five hundred fifty-eight campers were surveyed on the Allegheny National Forest to determine their knowledge of rules governing recreation behavior. Most of them were uninformed about the rules. Results of the study suggest that previous camping experience, age, camping style, and residence significantly affect knowledge of rules. Campers who received rule brochures or...

  3. Experimental check of the Gerasimov-Drell-Hearn sum rule for H1

    International Nuclear Information System (INIS)

    Dutz, H.; Drachenfels, W. von; Frommberger, F.; Hillert, W.; Klein, F.; Menze, D.; Rohlof, C.; Schoch, B.; Helbing, K.; Speckner, T.; Zeitler, G.; Anton, G.; Bock, A.; Godo, M.; Kiel, B.; Michel, T.; Naumann, J.; Krimmer, J.; Grabmayr, P.; Sauer, M.

    2004-01-01

    For the first time we checked the fundamental Gerasimov-Drell-Hearn (GDH) sum rule for the proton experimentally in the photon energy range from 0.2-2.9 GeV with the tagged photon facilities at MAMI (Mainz) and ELSA (Bonn). New data of the doubly polarized total cross section difference are presented in the energy range from 1.6 to 2.9 GeV. The contribution to the GDH integral from 0.2-2.9 GeV yields [254±5(stat)±12(syst)] μb with negative contributions in the Regge regime at photon energies above 2.1 GeV. This trend supports the validity of the GDH sum rule

  4. Capacities and overlap indexes with an application in fuzzy rule-based classification systems

    Czech Academy of Sciences Publication Activity Database

    Paternain, D.; Bustince, H.; Pagola, M.; Sussner, P.; Kolesárová, A.; Mesiar, Radko

    2016-01-01

    Roč. 305, č. 1 (2016), s. 70-94 ISSN 0165-0114 Institutional support: RVO:67985556 Keywords : Capacity * Overlap index * Overlap function * Choquet integral * Fuzzy rule-based classification systems Subject RIV: BA - General Mathematics Impact factor: 2.718, year: 2016 http://library.utia.cas.cz/separaty/2016/E/mesiar-0465739.pdf

  5. Methodological approaches based on business rules

    Directory of Open Access Journals (Sweden)

    Anca Ioana ANDREESCU

    2008-01-01

    Full Text Available Business rules and business processes are essential artifacts in defining the requirements of a software system. Business processes capture business behavior, while rules connect processes and thus control processes and business behavior. Traditionally, rules are scattered inside application code. This approach makes it very difficult to change rules and shorten the life cycle of the software system. Because rules change more quickly than the application itself, it is desirable to externalize the rules and move them outside the application. This paper analyzes and evaluates three well-known business rules approaches. It also outlines some critical factors that have to be taken into account in the decision to introduce business rules facilities in a software system. Based on the concept of explicit manipulation of business rules in a software system, the need for a general approach based on business rules is discussed.

  6. Integration of model-based control systems with artificial intelligence and workstations

    International Nuclear Information System (INIS)

    Lee, M.; Clearwater, S.

    1987-01-01

    Experience with model based accelerator control started at SPEAR. Since that SPEAR. Since that time nearly all accelerator beam lines have been controlled using model-based application programs, for example, PEP and SLC at SLAC. In order to take advantage of state-of-the-art hardware and software technology, the design and implementation of the accelerator control programs have undergone radical changes with time. Consequently, SPEAR, PEP, and SLC all use different control programs. Since many of these application programs are imbedded deep into the control system, they had to be rewritten each time. Each time this rewriting has occurred a great deal of time and effort has been spent on training physicists and programmers to do the job. Now, these application programs have been developed for a fourth time. This time, however, the programs being developed are generic so that they will not have to be done again. An integrated system called GOLD (Generic Orbit ampersand Lattice Debugger) has been developed for debugging and correcting trajectory errors in accelerator lattices. The system consists of a lattice modeling program (COMFORT), a beam simulator (PLUS), a graphical workstation environment (micro-VAX) and an expert system (ABLE). This paper will describe some of the features and applications of our integrated system with emphasis on the automation offered by expert systems. 5 refs., 4 figs

  7. Spatio-Temporal Rule Mining

    DEFF Research Database (Denmark)

    Gidofalvi, Gyozo; Pedersen, Torben Bach

    2005-01-01

    Recent advances in communication and information technology, such as the increasing accuracy of GPS technology and the miniaturization of wireless communication devices pave the road for Location-Based Services (LBS). To achieve high quality for such services, spatio-temporal data mining techniques...... are needed. In this paper, we describe experiences with spatio-temporal rule mining in a Danish data mining company. First, a number of real world spatio-temporal data sets are described, leading to a taxonomy of spatio-temporal data. Second, the paper describes a general methodology that transforms...... the spatio-temporal rule mining task to the traditional market basket analysis task and applies it to the described data sets, enabling traditional association rule mining methods to discover spatio-temporal rules for LBS. Finally, unique issues in spatio-temporal rule mining are identified and discussed....

  8. Organisational Rules in Schools: Teachers' Opinions about Functions of Rules, Rule-Following and Breaking Behaviours in Relation to Their Locus of Control

    Science.gov (United States)

    Demirkasimoglu, Nihan; Aydin, Inayet; Erdogan, Cetin; Akin, Ugur

    2012-01-01

    The main aim of this research is to examine teachers' opinions about functions of school rules, reasons for rule-breaking and results of rule-breaking in relation to their locus of control, gender, age, seniority and branch. 350 public elementary school teachers in Ankara are included in the correlational survey model study. According to the…

  9. 77 FR 59790 - General Services Administration Acquisition Regulation (GSAR); Rewrite of Part 504...

    Science.gov (United States)

    2012-10-01

    ... and Forms. This final rule is part of the General Services Administration Acquisition Manual (GSAM... the prescription for inclusion of the clause at 552.204-9, Personal Identity Verification Requirements... the ``National Industrial Security Program Operating Manual (NISPOM)'', and link to the web address...

  10. The knowledge of dietary rules among patients with diabetes

    Directory of Open Access Journals (Sweden)

    Joanna Świrska

    2017-05-01

    Full Text Available Introduction: The incidence of diabetes increases in Poland and all over the world. Diet is an integral element of diabetes therapy. The knowledge of dietary rules and compliance with them facilitates body mass reduction and improves metabolic parameters of the body thus preventing diabetes’ complications development. Aim: The aim of the study was to evaluate the knowledge of dietary rules among diabetic patients. Material and methods: The study included 50 patients with recognized diabetes  who were hospitalized in SPSK-4 hospital in Lublin from January to May, 2016. In the study the diagnostic survey was applied. Results: The knowledge of basic dietary rules in diabetes among the majority of surveyed diabetic patients (64% was unsatisfactory. The most significant deficit included lack of acquaintance with glycemic index and carbohydrate exchanges thus making it impossible to make use of them in preparing everyday meals. The knowledge of the surveyed patients depended on their educational status, place of residence and age. Unsatisfactory knowledge was found among 82% of patients  with primary education vs. 40% with higher education, in 80% with countryside residence vs. 53% residing in town and in 80% of patients aged 31-40  and 41-55 years vs. 50% aged 18-30. Conclusion: Dietary education is a necessary element of diabetes therapy. Educating patients about diabetic diet should be repeated regularly as even patients with long-standing diabetes history have unsatisfactory knowledge about the dietary rules. Preferably, educating should be individual and adjusted to patient’s age and education.

  11. Method to integrate clinical guidelines into the electronic health record (EHR) by applying the archetypes approach.

    Science.gov (United States)

    Garcia, Diego; Moro, Claudia Maria Cabral; Cicogna, Paulo Eduardo; Carvalho, Deborah Ribeiro

    2013-01-01

    Clinical guidelines are documents that assist healthcare professionals, facilitating and standardizing diagnosis, management, and treatment in specific areas. Computerized guidelines as decision support systems (DSS) attempt to increase the performance of tasks and facilitate the use of guidelines. Most DSS are not integrated into the electronic health record (EHR), ordering some degree of rework especially related to data collection. This study's objective was to present a method for integrating clinical guidelines into the EHR. The study developed first a way to identify data and rules contained in the guidelines, and then incorporate rules into an archetype-based EHR. The proposed method tested was anemia treatment in the Chronic Kidney Disease Guideline. The phases of the method are: data and rules identification; archetypes elaboration; rules definition and inclusion in inference engine; and DSS-EHR integration and validation. The main feature of the proposed method is that it is generic and can be applied toany type of guideline.

  12. Binary effectivity rules

    DEFF Research Database (Denmark)

    Keiding, Hans; Peleg, Bezalel

    2006-01-01

    is binary if it is rationalized by an acyclic binary relation. The foregoing result motivates our definition of a binary effectivity rule as the effectivity rule of some binary SCR. A binary SCR is regular if it satisfies unanimity, monotonicity, and independence of infeasible alternatives. A binary...

  13. Technical rules in law

    Energy Technology Data Exchange (ETDEWEB)

    Debelius, J

    1978-08-01

    An important source of knowledge for technical experts is the state of the art reflected by catalogues of technical rules. Technical rules may also achieve importance in law due to a legal transformation standard. Here, rigid and flexible reference are controversial with regard to their admissibility from the point of view of constitutional law. In case of a divergence from the generally accepted technical rules, it is assumed - refutably - that the necessary care had not been taken. Technical rules are one out of several sources of information; they have no normative effect. This may result in a duty of anyone applying them to review the state of technology himself.

  14. Technical rules in law

    International Nuclear Information System (INIS)

    Debelius, J.

    1978-01-01

    An important source of knowledge for technical experts is the state of the art reflected by catalogues of technical rules. Technical rules may also achieve importance in law due to a legal transformation standard. Here, rigid and flexible reference are controversial with regard to their admissibility from the point of view of constitutional law. In case of a divergence from the generally accepted technical rules, it is assumed - refutably - that the necessary care had not been taken. Technical rules are one out of several sources of information; they have no normative effect. This may result in a duty of anyone applying them to review the state of technology himself. (orig.) [de

  15. Assessing the operation rules of a reservoir system based on a detailed modelling-chain

    Science.gov (United States)

    Bruwier, M.; Erpicum, S.; Pirotton, M.; Archambeau, P.; Dewals, B.

    2014-09-01

    According to available climate change scenarios for Belgium, drier summers and wetter winters are expected. In this study, we focus on two muti-purpose reservoirs located in the Vesdre catchment, which is part of the Meuse basin. The current operation rules of the reservoirs are first analysed. Next, the impacts of two climate change scenarios are assessed and enhanced operation rules are proposed to mitigate these impacts. For this purpose, an integrated model of the catchment was used. It includes a hydrological model, one-dimensional and two-dimensional hydraulic models of the river and its main tributaries, a model of the reservoir system and a flood damage model. Five performance indicators of the reservoir system have been defined, reflecting its ability to provide sufficient drinking, to control floods, to produce hydropower and to reduce low-flow condition. As shown by the results, enhanced operation rules may improve the drinking water potential and the low-flow augmentation while the existing operation rules are efficient for flood control and for hydropower production.

  16. Assessing the operation rules of a reservoir system based on a detailed modelling chain

    Science.gov (United States)

    Bruwier, M.; Erpicum, S.; Pirotton, M.; Archambeau, P.; Dewals, B. J.

    2015-03-01

    According to available climate change scenarios for Belgium, drier summers and wetter winters are expected. In this study, we focus on two multi-purpose reservoirs located in the Vesdre catchment, which is part of the Meuse basin. The current operation rules of the reservoirs are first analysed. Next, the impacts of two climate change scenarios are assessed and enhanced operation rules are proposed to mitigate these impacts. For this purpose, an integrated model of the catchment was used. It includes a hydrological model, one-dimensional and two-dimensional hydraulic models of the river and its main tributaries, a model of the reservoir system and a flood damage model. Five performance indicators of the reservoir system have been defined, reflecting its ability to provide sufficient drinking water, to control floods, to produce hydropower and to reduce low-flow conditions. As shown by the results, enhanced operation rules may improve the drinking water potential and the low-flow augmentation while the existing operation rules are efficient for flood control and for hydropower production.

  17. Projection operator and propagator for an arbitrary integral spin

    CERN Document Server

    Huang Shi Zhong; Wu Ning; Zheng Zhi Peng

    2002-01-01

    Based on the solution of the Bargmann-Wigner equation for an arbitrary integral spin, a direct derivation of the projection operator and propagator for an arbitrary integral spin is presented. The explicit form for the spin projection operators constructed by Behrends and Fronsdal is confirmed. The commutation rules and a general expression for the Feynman propagator for a free particle of arbitrary integral spin are deduced

  18. GMRES and integral operators

    Energy Technology Data Exchange (ETDEWEB)

    Kelley, C.T.; Xue, Z.Q. [North Carolina State Univ., Raleigh, NC (United States)

    1994-12-31

    Many discretizations of integral equations and compact fixed point problems are collectively compact and strongly convergent in spaces of continuous functions. These properties not only lead to stable and convergent approximations but also can be used in the construction of fast multilevel algorithms. Recently the GMRES algorithm has become a standard coarse mesh solver. The purpose of this paper is to show how the special properties of integral operators and their approximations are reflected in the performance of the GMRES iteration and how these properties can be used to strengthen the norm in which convergence takes place. The authors illustrate these ideas with composite Gauss rules for integral equations on the unit interval.

  19. Critical Evaluation of Validation Rules Automated Extraction from Data

    Directory of Open Access Journals (Sweden)

    David Pejcoch

    2014-10-01

    Full Text Available The goal of this article is to critically evaluate a possibility of automatic extraction of such kind of rules which could be later used within a Data Quality Management process for validation of records newly incoming to Information System. For practical demonstration the 4FT-Miner procedure implemented in LISpMiner System was chosen. A motivation for this task is the potential simplification of projects focused on Data Quality Management. Initially, this article is going to critically evaluate a possibility of fully automated extraction with the aim to identify strengths and weaknesses of this approach in comparison to its alternative, when at least some a priori knowledge is available. As a result of practical implementation, this article provides design of recommended process which would be used as a guideline for future projects. Also the question of how to store and maintain extracted rules and how to integrate them with existing tools supporting Data Quality Management is discussed

  20. Towards a flexible service integration through separation of business rules

    NARCIS (Netherlands)

    Asuncion, C.H.; Iacob, Maria Eugenia; van Sinderen, Marten J.

    2010-01-01

    Driven by dynamic market demands, enterprises are continuously exploring collaborations with others to add value to their services and seize new market opportunities. Achieving enterprise collaboration is facilitated by Enterprise Application Integration and Business-to-Business approaches that

  1. Development of the International Trade in Terms of Incoterms 2010 Rules

    Directory of Open Access Journals (Sweden)

    Lucia PALIU - POPA

    2012-04-01

    Full Text Available It is known that the world economy provides the entrepreneurs a wide range of functional integration in foreign trade systems, but these commercial transactions are subject to common rules established and uniformly applied throughout the world. In the context of the importance of time or place of the transfer of ownership from seller to buyer, in carrying out intra-Community and international trade, time that also influences the price of goods, as now and then there takes place the transfer and the acquisition of costs and of the risk that the delivery involves, in this paper we will analyse the new delivery terms used in foreign trade, regulated under the name of Incoterms 2010, after which analysis we will issue opinions on the benefits of the proper use of such rules.

  2. An investigation of some quantum systems using modified quantization rule form

    Energy Technology Data Exchange (ETDEWEB)

    Maiz, F., E-mail: fethimaiz@gmail.com [University of Cartage, Nabeul Engineering Preparatory Institute, Merazka, 8000 Nabeul (Tunisia); King Khalid University, Faculty of Science, Physics Department, P.O. Box 9004, Abha 61413 (Saudi Arabia)

    2014-09-15

    We propose a new simple quantization rule form: J{sub n}=nπ+δ(n), for exactly solvable and nonsolvable quantum systems. Here, J{sub n} is the momentum integral between two turning points, n the principal quantum number, and δ(n) is a function of potential parameters and n. This new quantization rule form is a generalization of the conventional one, already developed for exactly solvable quantum systems. We found that δ(n) is a constant independent of n for exactly solvable quantum systems. We carry out the expression of δ(n) for V-shape potential, and show that it takes this form δ(n)=(π/2)+(1/a+bn+cn{sup 2}) for anharmonic oscillators potential V(x)=αx{sup p}+βx{sup 2}.

  3. Integrated layout based Monte-Carlo simulation for design arc optimization

    Science.gov (United States)

    Shao, Dongbing; Clevenger, Larry; Zhuang, Lei; Liebmann, Lars; Wong, Robert; Culp, James

    2016-03-01

    Design rules are created considering a wafer fail mechanism with the relevant design levels under various design cases, and the values are set to cover the worst scenario. Because of the simplification and generalization, design rule hinders, rather than helps, dense device scaling. As an example, SRAM designs always need extensive ground rule waivers. Furthermore, dense design also often involves "design arc", a collection of design rules, the sum of which equals critical pitch defined by technology. In design arc, a single rule change can lead to chain reaction of other rule violations. In this talk we present a methodology using Layout Based Monte-Carlo Simulation (LBMCS) with integrated multiple ground rule checks. We apply this methodology on SRAM word line contact, and the result is a layout that has balanced wafer fail risks based on Process Assumptions (PAs). This work was performed at the IBM Microelectronics Div, Semiconductor Research and Development Center, Hopewell Junction, NY 12533

  4. Applying recursive numerical integration techniques for solving high dimensional integrals

    International Nuclear Information System (INIS)

    Ammon, Andreas; Genz, Alan; Hartung, Tobias; Jansen, Karl; Volmer, Julia; Leoevey, Hernan

    2016-11-01

    The error scaling for Markov-Chain Monte Carlo techniques (MCMC) with N samples behaves like 1/√(N). This scaling makes it often very time intensive to reduce the error of computed observables, in particular for applications in lattice QCD. It is therefore highly desirable to have alternative methods at hand which show an improved error scaling. One candidate for such an alternative integration technique is the method of recursive numerical integration (RNI). The basic idea of this method is to use an efficient low-dimensional quadrature rule (usually of Gaussian type) and apply it iteratively to integrate over high-dimensional observables and Boltzmann weights. We present the application of such an algorithm to the topological rotor and the anharmonic oscillator and compare the error scaling to MCMC results. In particular, we demonstrate that the RNI technique shows an error scaling in the number of integration points m that is at least exponential.

  5. Applying recursive numerical integration techniques for solving high dimensional integrals

    Energy Technology Data Exchange (ETDEWEB)

    Ammon, Andreas [IVU Traffic Technologies AG, Berlin (Germany); Genz, Alan [Washington State Univ., Pullman, WA (United States). Dept. of Mathematics; Hartung, Tobias [King' s College, London (United Kingdom). Dept. of Mathematics; Jansen, Karl; Volmer, Julia [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany). John von Neumann-Inst. fuer Computing NIC; Leoevey, Hernan [Humboldt Univ. Berlin (Germany). Inst. fuer Mathematik

    2016-11-15

    The error scaling for Markov-Chain Monte Carlo techniques (MCMC) with N samples behaves like 1/√(N). This scaling makes it often very time intensive to reduce the error of computed observables, in particular for applications in lattice QCD. It is therefore highly desirable to have alternative methods at hand which show an improved error scaling. One candidate for such an alternative integration technique is the method of recursive numerical integration (RNI). The basic idea of this method is to use an efficient low-dimensional quadrature rule (usually of Gaussian type) and apply it iteratively to integrate over high-dimensional observables and Boltzmann weights. We present the application of such an algorithm to the topological rotor and the anharmonic oscillator and compare the error scaling to MCMC results. In particular, we demonstrate that the RNI technique shows an error scaling in the number of integration points m that is at least exponential.

  6. Path integrals for arbitrary canonical transformations

    International Nuclear Information System (INIS)

    Oliveira, L.A.R. de.

    1980-01-01

    Some aspects of the path integral formulation of quantum mechanics are studied. This formalism is generalized to arbitrary canonical transformations, by means of an association between path integral probalility amplitudes and classical generators of transformations, analogous to the usual Hamiltonian time development phase space expression. Such association turns out to be equivalent to the Weyl quantization rule, and it is also shown that this formalism furnishes a path integral representation for a Lie algebra of a given set of classical generators. Some physical considerations about the path integral quantization procedure and about the relationship between classical and quantum dynamical structures are also discussed. (Author) [pt

  7. The Role of Culture and Acculturation in Researchers' Perceptions of Rules in Science.

    Science.gov (United States)

    Antes, Alison L; English, Tammy; Baldwin, Kari A; DuBois, James M

    2018-04-01

    Successfully navigating the norms of a society is a complex task that involves recognizing diverse kinds of rules as well as the relative weight attached to them. In the United States (U.S.), different kinds of rules-federal statutes and regulations, scientific norms, and professional ideals-guide the work of researchers. Penalties for violating these different kinds of rules and norms can range from the displeasure of peers to criminal sanctions. We proposed that it would be more difficult for researchers working in the U.S. who were born in other nations to distinguish the seriousness of violating rules across diverse domains. We administered a new measure, the evaluating rules in science task (ERST), to National Institutes of Health-funded investigators (101 born in the U.S. and 102 born outside of the U.S.). The ERST assessed perceptions of the seriousness of violating research regulations, norms, and ideals, and allowed us to calculate the degree to which researchers distinguished between the seriousness of each rule category. The ERST also assessed researchers' predictions of the seriousness that research integrity officers (RIOs) would assign to the rules. We compared researchers' predictions to the seriousness ratings of 112 RIOs working at U.S. research-intensive universities. U.S.-born researchers were significantly better at distinguishing between the seriousness of violating federal research regulations and violating ideals of science, and they were more accurate in their predictions of the views of RIOs. Acculturation to the U.S. moderated the effects of nationality on accuracy. We discuss the implications of these findings in terms of future research and education.

  8. Following the Rules.

    Science.gov (United States)

    Katz, Anne

    2016-05-01

    I am getting better at following the rules as I grow older, although I still bristle at many of them. I was a typical rebellious teenager; no one understood me, David Bowie was my idol, and, one day, my generation was going to change the world. Now I really want people to understand me: David Bowie remains one of my favorite singers and, yes, my generation has changed the world, and not necessarily for the better. Growing up means that you have to make the rules, not just follow those set by others, and, at times, having rules makes a lot of sense.
.

  9. Electricity and gas market in Switzerland - concepts and rules

    International Nuclear Information System (INIS)

    Fuchs, A.

    2003-01-01

    The political process to introduce the opening of the market in Switzerland is slow, but in movement. The preparation allows to participate in the experience of other countries and to adapt the system to the particularities of the industries and the country. The principle of subsidiarity allows the utilities to organise the technical and organisational realisation and to keep the legal rules to a minimum. The high technical integration in the European interconnection network asks for an EU compatible, but not identical, system in Switzerland.(author)

  10. GOLD: Integration of model-based control systems with artificial intelligence and workstations

    International Nuclear Information System (INIS)

    Lee, M.; Clearwater, S.

    1987-08-01

    Our experience with model based accelerator control started at SPEAR. Since that time nearly all accelerator beam lines have been controlled using model-based application programs, for example, PEP and SLC at SLAC. In order to take advantage of state-of-the-art hardware and software technology, the design and implementation of the accelerator control programs have undergone radical change with time. Consequently, SPEAR, PEP, and SLC all use different control programs. Since many of these application programs are imbedded deep into the control system, they had to be rewritten each time. Each time this rewriting has occurred a great deal of time and effort has been spent on training physicists and programmers to do the job. Now, we have developed these application programs for a fourth time. This time, however, the programs we are developing are generic so that we will not have to do it again. We have developed an integrated system called GOLD (Generic Orbit and Lattice Debugger) for debugging and correcting trajectory errors in accelerator lattices. The system consists of a lattice modeling program (COMFORT), a beam simulator (PLUS), a graphical workstation environment (micro-VAX) and an expert system (ABLE). This paper will describe some of the features and applications of our integrated system with emphasis on the automation offered by expert systems. 5 refs

  11. Firm heterogeneity, Rules of Origin and Rules of Cumulation

    OpenAIRE

    Bombarda , Pamela; Gamberoni , Elisa

    2013-01-01

    We analyse the impact of relaxing rules of origin (ROOs) in a simple setting with heterogeneous firms that buy intermediate inputs from domestic and foreign sources. In particular, we consider the impact of switching from bilateral to diagonal cumulation when using preferences (instead of paying the MFN tariff) involving the respect of rules of origin. We find that relaxing the restrictiveness of the ROOs leads the least productive exporters to stop exporting. The empirical part confirms thes...

  12. The Product and Quotient Rules Revisited

    Science.gov (United States)

    Eggleton, Roger; Kustov, Vladimir

    2011-01-01

    Mathematical elegance is illustrated by strikingly parallel versions of the product and quotient rules of basic calculus, with some applications. Corresponding rules for second derivatives are given: the product rule is familiar, but the quotient rule is less so.

  13. Three religious rules of nonlinear physics

    International Nuclear Information System (INIS)

    Yankov, V.V.

    1993-01-01

    The theory of strong turbulence is a part of nonlinear physics. The three open-quotes religious rulesclose quotes of nonlinear physics present a heuristic viewpoint that can be used to qualitatively predict the evolution of nonlinear systems. These rules are as follows. (1) The basic results can be obtained from the conservation laws. If some kind of process is not forbidden by these laws, it generally occurs. If it doesn't this means that another conserved quantity imposing the constraint is being missed. (2) The universal law of open-quotes 20/80close quotes takes place: 20% of people drink 80% of beer. In other words, interesting processes usually take place in localized structures occupying a small share of volume. The localized structures interact weakly and therefore maintain their identity. For this reason they are universal and can be investigated. (3) The open-quotes general situationclose quotes is nonintegrable. The special case of exact solutions in integrable models represent a degenerate (nontypical) behavior. Particular exact solutions cannot be taken as representative solutions unless they are attractors. The presence of attractors simplifies the analysis and clarifies the situation. In plasma physics one deals with infinite-dimensional (PDE) systems distributed in space. The application of the religious rules 1 and 2 then leads to the following. If the conservation laws do not prohibit the development of singularities they do occur. If the singularities are prohibited, then stable localized structures take place. Solitons (or solitary waves) and vortices are examples of such stable structures. Wave collapse, wave-breaking, shock waves, magnetic reconnection and singularities in ideal Euler liquid are the examples of singularities. According to rule 3, exact solutions are very essential if they are attractors in some sense. Analysis of this problem is presented for solitons in nonintegrable wave systems and 2D vortices

  14. Numerical evaluation of integrals containing a spherical Bessel function by product integration

    International Nuclear Information System (INIS)

    Lehman, D.R.; Parke, W.C.; Maximon, L.C.

    1981-01-01

    A method is developed for numerical evaluation of integrals with k-integration range from 0 to infinity that contain a spherical Bessel function j/sub l/(kr) explicitly. The required quadrature weights are easily calculated and the rate of convergence is rapid: only a relatively small number of quadrature points is needed: for an accurate evaluation even when r is large. The quadrature rule is obtained by the method of product integration. With the abscissas chosen to be those of Clenshaw--Curtis and the Chebyshev polynomials as the interpolating polynomials, quadrature weights are obtained that depend on the spherical Bessel function. An inhomogenous recurrence relation is derived from which the weights can be calculated without accumulation of roundoff error. The procedure is summarized as an easily implementable algorithm. Questions of convergence are discussed and the rate of convergence demonstrated for several test integrals. Alternative procedures are given for generating the integration weights and an error analysis of the method is presented

  15. Lightweight structure design for wind energy by integrating nanostructured materials

    International Nuclear Information System (INIS)

    Li, Ying; Lu, Jian

    2014-01-01

    Highlights: • Integrate high-strength nano-materials into lightweight design. • Lightweight design scheme for wind turbine tower application. • Expand the bending formulae for tapered tubular structures with varying thickness. • We rewrite the Secant Formula for a tapered beam under eccentric compression. - Abstract: Wind power develops very fast nowadays with high expectation. Although at the mean time, the use of taller towers, however, smacks head-on into the issue of transportability. The engineering base and computational tools have to be developed to match machine size and volume. Consequently the research on the light weight structures of tower is carrying out in the main countries which are actively developing wind energy. This paper reports a new design scheme of light weight structure for wind turbine tower. This design scheme is based on the integration of the nanostructured materials produced by the Surface Mechanical Attrition Treatment (SMAT) process. The objective of this study is to accomplish the weight reduction by optimizing the wall thickness of the tapered tubular structure. The basic methods include the identification of the critical zones and the distribution of the high strength materials according to different necessities. The equivalent strength or stiffness design method and the high strength material properties after SMAT process are combined together. Bending and buckling are two main kinds of static loads concerned in consideration. The study results reveal that there is still enough margin for weight reduction in the traditional wind turbine tower design

  16. Exact substitute processes for diffusion-reaction systems with local complete exclusion rules

    International Nuclear Information System (INIS)

    Schulz, Michael; Reineker, Peter

    2005-01-01

    Lattice systems with one species diffusion-reaction processes under local complete exclusion rules are studied analytically starting from the usual master equations with discrete variables and their corresponding representation in a Fock space. On this basis, a formulation of the transition probability as a Grassmann path integral is derived in a straightforward manner. It will be demonstrated that this Grassmann path integral is equivalent to a set of Ito stochastic differential equations. Averages of arbitrary variables and correlation functions of the underlying diffusion-reaction system can be expressed as weighted averages over all solutions of the system of stochastic differential equations. Furthermore, these differential equations are equivalent to a Fokker-Planck equation describing the probability distribution of the actual Ito solutions. This probability distribution depends on continuous variables in contrast to the original master equation, and their stochastic dynamics may be interpreted as a substitute process which is completely equivalent to the original lattice dynamics. Especially, averages and correlation functions of the continuous variables are connected to the corresponding lattice quantities by simple relations. Although the substitute process for diffusion-reaction systems with exclusion rules has some similarities to the well-known substitute process for the same system without exclusion rules, there exists a set of remarkable differences. The given approach is not only valid for the discussed single-species processes. We give sufficient arguments to show that arbitrary combinations of unimolecular and bimolecular lattice reactions under complete local exclusions may be described in terms of our approach

  17. 75 FR 51934 - Telemarketing Sales Rule

    Science.gov (United States)

    2010-08-24

    ... FEDERAL TRADE COMMISSION 16 CFR Part 310 Telemarketing Sales Rule AGENCY: Federal Trade Commission. ACTION: Final rule; correction. SUMMARY: The Federal Trade Commission (``Commission'') published a final rule on August 10, 2010, adopting amendments to the Telemarketing Sales Rule that address the...

  18. Demilitarization of the Police, Criminal Policy and Human Rights in the Democratic Rule of Law

    Directory of Open Access Journals (Sweden)

    Igor Frederico Fontes de Lima

    2016-10-01

    Full Text Available This article proposes a reflection on the incompatibility between the militarization of the police and the democratic rule of law. Seeing the violent mechanisms such as routine, relates to public safety model with Agamben's teachings on the state of exception as the rule. The culture of fear is seen as legitimizing the social longing for more militarized apparatus. Reconnecting Bauman, Zaffaroni and Foucault , the work points out that criminal policy is based on the annihilation of the other and that the penal system is extremely selective, using the PM's for vertical integration and standardization of acceptable profiles.

  19. Autonomous Rule Creation for Intrusion Detection

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-04-01

    Many computational intelligence techniques for anomaly based network intrusion detection can be found in literature. Translating a newly discovered intrusion recognition criteria into a distributable rule can be a human intensive effort. This paper explores a multi-modal genetic algorithm solution for autonomous rule creation. This algorithm focuses on the process of creating rules once an intrusion has been identified, rather than the evolution of rules to provide a solution for intrusion detection. The algorithm was demonstrated on anomalous ICMP network packets (input) and Snort rules (output of the algorithm). Output rules were sorted according to a fitness value and any duplicates were removed. The experimental results on ten test cases demonstrated a 100 percent rule alert rate. Out of 33,804 test packets 3 produced false positives. Each test case produced a minimum of three rule variations that could be used as candidates for a production system.

  20. Methodological approaches based on business rules

    OpenAIRE

    Anca Ioana ANDREESCU; Adina UTA

    2008-01-01

    Business rules and business processes are essential artifacts in defining the requirements of a software system. Business processes capture business behavior, while rules connect processes and thus control processes and business behavior. Traditionally, rules are scattered inside application code. This approach makes it very difficult to change rules and shorten the life cycle of the software system. Because rules change more quickly than the application itself, it is desirable to externalize...

  1. Endogeneously arising network allocation rules

    NARCIS (Netherlands)

    Slikker, M.

    2006-01-01

    In this paper we study endogenously arising network allocation rules. We focus on three allocation rules: the Myerson value, the position value and the component-wise egalitarian solution. For any of these three rules we provide a characterization based on component efficiency and some balanced

  2. Performance based regulation - The maintenance rule

    Energy Technology Data Exchange (ETDEWEB)

    Correia, Richard P. [NRR/DOTS/TQMP, U.S. Nuclear Regulatory Commission, Office of Nuclear Reactor Regulation, M/S OWFN 10A19, Washington, D.C. 20555 (United States)

    1997-07-01

    The U.S. Nuclear Regulatory Commission has begun a transition from 'process-oriented' to 'results-oriented' regulations. The maintenance rule is a results-oriented rule that mandates consideration of risk and plant performance. The Maintenance Rule allows licensees to devise the most effective and efficient means of achieving the results described in the rule including the use of Probabilistic Risk (or Safety) Assessments. The NRC staff conducted a series of site visits to evaluate implementation of the Rule. Conclusions from the site visits indicated that the results-oriented Maintenance Rule can be successfully implemented and enforced. (author)

  3. Performance based regulation - The maintenance rule

    International Nuclear Information System (INIS)

    Correia, Richard P.

    1997-01-01

    The U.S. Nuclear Regulatory Commission has begun a transition from 'process-oriented' to 'results-oriented' regulations. The maintenance rule is a results-oriented rule that mandates consideration of risk and plant performance. The Maintenance Rule allows licensees to devise the most effective and efficient means of achieving the results described in the rule including the use of Probabilistic Risk (or Safety) Assessments. The NRC staff conducted a series of site visits to evaluate implementation of the Rule. Conclusions from the site visits indicated that the results-oriented Maintenance Rule can be successfully implemented and enforced. (author)

  4. "Chaos Rules" Revisited

    Science.gov (United States)

    Murphy, David

    2011-01-01

    About 20 years ago, while lost in the midst of his PhD research, the author mused over proposed titles for his thesis. He was pretty pleased with himself when he came up with "Chaos Rules" (the implied double meaning was deliberate), or more completely, "Chaos Rules: An Exploration of the Work of Instructional Designers in Distance Education." He…

  5. Idioms-based Business Rule Extraction

    NARCIS (Netherlands)

    R Smit (Rob)

    2011-01-01

    htmlabstractThis thesis studies the extraction of embedded business rules, using the idioms of the used framework to identify them. Embedded business rules exist as source code in the software system and knowledge about them may get lost. Extraction of those business rules could make them accessible

  6. The influence of fiscal rules on healthcare policy in the United States and the Netherlands.

    Science.gov (United States)

    Schakel, H Christiaan; Jeurissen, Patrick; Glied, Sherry

    2017-10-01

    Governments use fiscal rules to put a framework and limits on how budgetary challenges are addressed, but the rules themselves are still an understudied area among health policy scholars. For a long time, healthcare held a somewhat separate status because of the reliance on entitlements and dedicated revenue streams. However, the combined forces of advocates for integral decision-making, central budget control and the increasing costs might shift healthcare towards budgetary frameworks that currently apply to other spending categories. In this paper, we study fiscal rules that the US and the Netherlands have adopted since 2010 and their impact on healthcare policy. Our analysis shows that fiscal rules can have an impact on the rationing of healthcare. In the studied timeframe, the rules seem to have more impact on budget outcomes than on the budget process itself. In addition, the convergence of fiscal and program policy objectives seems to be better accomplished in a budgetary system that applies enforceable budget ceilings. Budgeting for health entitlements requires a comprehensive and tailor-made approach and the composition of traditional rules might not fully answer to the complexities of healthcare policy. This paper aims to contribute to that debate and the way we think about healthcare budgeting. Copyright © 2016 John Wiley & Sons, Ltd. Copyright © 2016 John Wiley & Sons, Ltd.

  7. Integrative and distributive negotiation in small groups : Effects of task structure, decision rule, and social motive

    NARCIS (Netherlands)

    Beersma, Bianca; De Dreu, Carsten K W

    2002-01-01

    This study examined the interactive effects of task structure, decision rule, and social motive on small-group negotiation processes and outcomes. Three-person groups negotiated either within an asymmetrical task structure (in which a majority of group members have compatible interests) or within a

  8. 18 CFR 39.10 - Changes to an Electric Reliability Organization Rule or Regional Entity Rule.

    Science.gov (United States)

    2010-04-01

    ... RULES CONCERNING CERTIFICATION OF THE ELECTRIC RELIABILITY ORGANIZATION; AND PROCEDURES FOR THE ESTABLISHMENT, APPROVAL, AND ENFORCEMENT OF ELECTRIC RELIABILITY STANDARDS § 39.10 Changes to an Electric... Reliability Organization Rule or Regional Entity Rule. 39.10 Section 39.10 Conservation of Power and Water...

  9. Incremental Learning of Context Free Grammars by Parsing-Based Rule Generation and Rule Set Search

    Science.gov (United States)

    Nakamura, Katsuhiko; Hoshina, Akemi

    This paper discusses recent improvements and extensions in Synapse system for inductive inference of context free grammars (CFGs) from sample strings. Synapse uses incremental learning, rule generation based on bottom-up parsing, and the search for rule sets. The form of production rules in the previous system is extended from Revised Chomsky Normal Form A→βγ to Extended Chomsky Normal Form, which also includes A→B, where each of β and γ is either a terminal or nonterminal symbol. From the result of bottom-up parsing, a rule generation mechanism synthesizes minimum production rules required for parsing positive samples. Instead of inductive CYK algorithm in the previous version of Synapse, the improved version uses a novel rule generation method, called ``bridging,'' which bridges the lacked part of the derivation tree for the positive string. The improved version also employs a novel search strategy, called serial search in addition to minimum rule set search. The synthesis of grammars by the serial search is faster than the minimum set search in most cases. On the other hand, the size of the generated CFGs is generally larger than that by the minimum set search, and the system can find no appropriate grammar for some CFL by the serial search. The paper shows experimental results of incremental learning of several fundamental CFGs and compares the methods of rule generation and search strategies.

  10. Rules Extraction with an Immune Algorithm

    Directory of Open Access Journals (Sweden)

    Deqin Yan

    2007-12-01

    Full Text Available In this paper, a method of extracting rules with immune algorithms from information systems is proposed. Designing an immune algorithm is based on a sharing mechanism to extract rules. The principle of sharing and competing resources in the sharing mechanism is consistent with the relationship of sharing and rivalry among rules. In order to extract rules efficiently, a new concept of flexible confidence and rule measurement is introduced. Experiments demonstrate that the proposed method is effective.

  11. Parton distributions, the Gottfried sum rule and the W charge asymmetry

    International Nuclear Information System (INIS)

    Martin, A.D.; Stirling, W.J.; Roberts, R.G.

    1990-09-01

    Preliminary data from the New Muon Collaboration (NMC) allow a precise evaluation of I p-n (x) from a given integral formula for values of x down to 0.004. As x → 0, this integral should converge to a value I p-n (0) = 1/3 (Gottfried sum rule) if the light sea-quark distributions are equal. The NMC value I p-n (0.004) = 0.23 ± 0.03, though appearing to be well short of 1/3, is quite consistent with modern estimates for parton distributions extracted from a wide range of data. These parton distributions are also found to reproduce the W ± rapidity asymmetry recently measured by a European collaboration. (author)

  12. Space station operations task force. Panel 4 report: Management integration

    Science.gov (United States)

    1987-01-01

    The Management Integration Panel of the Space Station Operations Task Force was chartered to provide a structure and ground rules for integrating the efforts of the other three panels and to address a number of cross cutting issues that affect all areas of space station operations. Issues addressed include operations concept implementation, alternatives development and integration process, strategic policy issues and options, and program management emphasis areas.

  13. Proof Rules for Recursive Procedures

    NARCIS (Netherlands)

    Hesselink, Wim H.

    1993-01-01

    Four proof rules for recursive procedures in a Pascal-like language are presented. The main rule deals with total correctness and is based on results of Gries and Martin. The rule is easier to apply than Martin's. It is introduced as an extension of a specification format for Pascal-procedures, with

  14. Improved model reduction and tuning of fractional-order PI(λ)D(μ) controllers for analytical rule extraction with genetic programming.

    Science.gov (United States)

    Das, Saptarshi; Pan, Indranil; Das, Shantanu; Gupta, Amitava

    2012-03-01

    Genetic algorithm (GA) has been used in this study for a new approach of suboptimal model reduction in the Nyquist plane and optimal time domain tuning of proportional-integral-derivative (PID) and fractional-order (FO) PI(λ)D(μ) controllers. Simulation studies show that the new Nyquist-based model reduction technique outperforms the conventional H(2)-norm-based reduced parameter modeling technique. With the tuned controller parameters and reduced-order model parameter dataset, optimum tuning rules have been developed with a test-bench of higher-order processes via genetic programming (GP). The GP performs a symbolic regression on the reduced process parameters to evolve a tuning rule which provides the best analytical expression to map the data. The tuning rules are developed for a minimum time domain integral performance index described by a weighted sum of error index and controller effort. From the reported Pareto optimal front of the GP-based optimal rule extraction technique, a trade-off can be made between the complexity of the tuning formulae and the control performance. The efficacy of the single-gene and multi-gene GP-based tuning rules has been compared with the original GA-based control performance for the PID and PI(λ)D(μ) controllers, handling four different classes of representative higher-order processes. These rules are very useful for process control engineers, as they inherit the power of the GA-based tuning methodology, but can be easily calculated without the requirement for running the computationally intensive GA every time. Three-dimensional plots of the required variation in PID/fractional-order PID (FOPID) controller parameters with reduced process parameters have been shown as a guideline for the operator. Parametric robustness of the reported GP-based tuning rules has also been shown with credible simulation examples. Copyright © 2011 ISA. Published by Elsevier Ltd. All rights reserved.

  15. Considerations on Integrating Risk and Quality Management

    Directory of Open Access Journals (Sweden)

    Maria POPESCU

    2011-03-01

    Full Text Available This paper aims to highlight the links between risk management and quality management and to study the possibility of their integrated approach. The study reviews the evolution of risk approach within organizations and stresses the need to increase the effectiveness of this approach by incorporating risk management methodology in the quality management system. Starting from this idea, the authors present the current state of risk approach into quality management, basic rules of integrated quality-risk management and major difficulties which may arise in the implementation of integrated quality–risk systems.

  16. Rules Versus Discretion in Monetary Policy

    OpenAIRE

    Stanley Fischer

    1988-01-01

    This paper examines the case for rules rather than discretion in the conduct of monetary policy, from both historical and analytic perspectives. The paper starts with the rules of the game under the gold standard. These rules were ill-defined and not adhered to; active discretionary policy was pursued to defend the gold standard -- but the gold standard came closer to a regime of rules than the current system. The arguments for rules in general developed by Milton Friedman are described mo ap...

  17. Integrity Pledge (to be taken by all employees) ------------------- I ...

    Indian Academy of Sciences (India)

    standards of honesty and integrity at all times and support the fight against corruption. I therefore, pledge: To follow probity and rule of law in all walks of life;. To neither take nor offer bribe;. To perform all tasks in an honest and transparent manner;. To act in public interest;. To lead by example exhibiting integrity in personal ...

  18. Integrals of Frullani type and the method of brackets

    Directory of Open Access Journals (Sweden)

    Bravo Sergio

    2017-01-01

    Full Text Available The method of brackets is a collection of heuristic rules, some of which have being made rigorous, that provide a flexible, direct method for the evaluation of definite integrals. The present work uses this method to establish classical formulas due to Frullani which provide values of a specific family of integrals. Some generalizations are established.

  19. Rule Making and Rule Breaking: Game Development and the Governance of Emergent Behaviour

    Directory of Open Access Journals (Sweden)

    Jennifer R. Whitson

    2010-07-01

    Full Text Available Discussions of ‘control’ in games often center on players and their myriad attempts to push back upon the systems that seek to constrain them. The fact that players resist the constraints imposed upon them is not surprising, nor is it surprising that counterplay and control are such rich topics for game studies academics. In this article, I argue that players are invited by games to bend the rules. It is in the very nature of play to find the movement between the rules, and for many players the ‘fun’ in play is the inherent challenge of attempting to master, defeat, or remake games’ formal structures. These rationalities of play preclude blind obedience to the rules and have distinct implications for how games are governed. While there have been numerous studies of players who bend or break the rules (Consalvo, 2007; Foo and Koivisto, 2004; Dibbell, 1998; Kolko and Reid, 1998; Williams, 2006; Mnookin, 1997 and players who alter and re-make the rules in their role of co-producers (Sotamaa, 2009; Kücklich, 2005; Humphreys, 2005; Taylor, 2006b, there is little research on game development companies and their attempts to harness these rationalities of play and uphold the rules beyond the reflexive writings of game designers themselves (Curtis, 1992; Morningstar and Farmer, 1991; Koster, 2002.

  20. Gaming the system. Dodging the rules, ruling the dodgers.

    Science.gov (United States)

    Morreim, E H

    1991-03-01

    Although traditional obligations of fidelity require physicians to deliver quality care to their patients, including to utilize costly technologies, physicians are steadily losing their accustomed control over the necessary resources. The "economic agents" who own the medical and monetary resources of care now impose a wide array of rules and restrictions in order to contain their costs of operation. However, physicians can still control resources indirectly through "gaming the system," employing tactics such as "fudging" that exploit resource rules' ambiguity and flexibility to bypass the rules while ostensibly honoring them. Physicians may be especially inclined to game the system where resource rules seriously underserve patients' needs, where economic agents seem to be "gaming the patient," with needless obstacles to care, or where others, such as hospitals or even physicians themselves, may be denied needed reimbursements. Though tempting, gaming is morally and medically hazardous. It can harm patients and society, offend honesty, and violate basic principles of contractual and distributive justice. It is also, in fact, usually unnecessary in securing needed resources for patients. More fundamentally, we must reconsider what physicians owe their patients. They owe what is theirs to give: their competence, care and loyalty. In light of medicine's changing economics, two new duties emerge: economic advising, whereby physicians explicitly discuss the economic as well as medical aspects of each treatment option; and economic advocacy, whereby physicians intercede actively on their patients' behalf with the economic agents who control the resources.

  1. Integrating intermittent energy sources in liberalized electricity markets: from technical costs to economic penalties as a result of market rules

    International Nuclear Information System (INIS)

    Menanteau, Ph.; Finon, D.; Lamy, M.L.

    2003-06-01

    With the aim of preventing climatic change and ensuring the security of energy supplies, the recent European Directive on renewable energy production sources is aimed at bringing about a very substantial increase in electricity production from renewable sources in Europe by the 2010 horizon. Generally speaking, production of electricity from renewable sources will be assured by biomass and wind, and to a lesser extent by micro hydro, technologies whose characteristics are very different from the point of view of their integration into the electricity system. Their inclusion in the electricity systems will cause problems because of the intermittent nature of the production, a factor that does not enter into the paradigms of producers, system operators or regulators. The problems raised by the integration of intermittent production are technical in nature (risk of non-availability in peak periods, the need for additional reserves) and will incur adjustment costs, but the way in which the electricity markets function will impose economic penalties generally more substantial than the added technical costs. In this paper are examined in succession: (i) the additional costs raised by intermittence; (ii) the economic penalties imposed by the operating rules of de-regulated electricity markets with electricity production from renewable sources included, with particular reference to the case of the British and Nordic markets; and (iii) an analysis of the options that could limit the gap between the additional cost of intermittent production for the system and the adjustment surcharges imposed by the electricity markets, with the aim of reducing the tension between the deregulation of the electricity market and promoting the development of renewable energy sources. (A.L.B.)

  2. Usage of the Jess Engine, Rules and Ontology to Query a Relational Database

    Science.gov (United States)

    Bak, Jaroslaw; Jedrzejek, Czeslaw; Falkowski, Maciej

    We present a prototypical implementation of a library tool, the Semantic Data Library (SDL), which integrates the Jess (Java Expert System Shell) engine, rules and ontology to query a relational database. The tool extends functionalities of previous OWL2Jess with SWRL implementations and takes full advantage of the Jess engine, by separating forward and backward reasoning. The optimization of integration of all these technologies is an advancement over previous tools. We discuss the complexity of the query algorithm. As a demonstration of capability of the SDL library, we execute queries using crime ontology which is being developed in the Polish PPBW project.

  3. ERROR HANDLING IN INTEGRATION WORKFLOWS

    Directory of Open Access Journals (Sweden)

    Alexey M. Nazarenko

    2017-01-01

    Full Text Available Simulation experiments performed while solving multidisciplinary engineering and scientific problems require joint usage of multiple software tools. Further, when following a preset plan of experiment or searching for optimum solu- tions, the same sequence of calculations is run multiple times with various simulation parameters, input data, or conditions while overall workflow does not change. Automation of simulations like these requires implementing of a workflow where tool execution and data exchange is usually controlled by a special type of software, an integration environment or plat- form. The result is an integration workflow (a platform-dependent implementation of some computing workflow which, in the context of automation, is a composition of weakly coupled (in terms of communication intensity typical subtasks. These compositions can then be decomposed back into a few workflow patterns (types of subtasks interaction. The pat- terns, in their turn, can be interpreted as higher level subtasks.This paper considers execution control and data exchange rules that should be imposed by the integration envi- ronment in the case of an error encountered by some integrated software tool. An error is defined as any abnormal behavior of a tool that invalidates its result data thus disrupting the data flow within the integration workflow. The main requirementto the error handling mechanism implemented by the integration environment is to prevent abnormal termination of theentire workflow in case of missing intermediate results data. Error handling rules are formulated on the basic pattern level and on the level of a composite task that can combine several basic patterns as next level subtasks. The cases where workflow behavior may be different, depending on user's purposes, when an error takes place, and possible error handling op- tions that can be specified by the user are also noted in the work.

  4. 18 CFR 385.2201 - Rules governing off-the-record communications (Rule 2201).

    Science.gov (United States)

    2010-04-01

    ... 603, a neutral (other than an arbitrator) under Rule 604 in an alternative dispute resolution... any person outside the Commission, any off-the-record communication. (c) Definitions. For purposes of... in which an intervenor disputes any material issue, any proceeding initiated pursuant to rule 206 by...

  5. Adaptive control in multi-threaded iterated integration

    International Nuclear Information System (INIS)

    Doncker, Elise de; Yuasa, Fukuko

    2013-01-01

    In recent years we have developed a technique for the direct computation of Feynman loop-integrals, which are notorious for the occurrence of integrand singularities. Especially for handling singularities in the interior of the domain, we approximate the iterated integral using an adaptive algorithm in the coordinate directions. We present a novel multi-core parallelization scheme for adaptive multivariate integration, by assigning threads to the rule evaluations in the outer dimensions of the iterated integral. The method ensures a large parallel granularity as each function evaluation by itself comprises an integral over the lower dimensions, while the application of the threads is governed by the adaptive control in the outer level. We give computational results for a test set of 3- to 6-dimensional integrals, where several problems exhibit a loop integral behavior.

  6. Collective symplectic integrators

    International Nuclear Information System (INIS)

    McLachlan, Robert I; Modin, Klas; Verdier, Olivier

    2014-01-01

    We construct symplectic integrators for Lie–Poisson systems. The integrators are standard symplectic (partitioned) Runge–Kutta methods. Their phase space is a symplectic vector space equipped with a Hamiltonian action with momentum map J whose range is the target Lie–Poisson manifold, and their Hamiltonian is collective, that is, it is the target Hamiltonian pulled back by J. The method yields, for example, a symplectic midpoint rule expressed in 4 variables for arbitrary Hamiltonians on so(3) ∗ . The method specializes in the case that a sufficiently large symmetry group acts on the fibres of J, and generalizes to the case that the vector space carries a bifoliation. Examples involving many classical groups are presented. (paper)

  7. Canonical transformations and hamiltonian path integrals

    International Nuclear Information System (INIS)

    Prokhorov, L.V.

    1982-01-01

    Behaviour of the Hamiltonian path integrals under canonical transformations produced by a generator, is investigated. An exact form is determined for the kernel of the unitary operator realizing the corresponding quantum transformation. Equivalence rules are found (the Hamiltonian formalism, one-dimensional case) enabling one to exclude non-standard terms from the action. It is shown that the Hamiltonian path integral changes its form under cononical transformations: in the transformed expression besides the classical Hamiltonian function there appear some non-classical terms

  8. KEBERADAAN KONSEP RULE BY LAW (NEGARA BERDASARKAN HUKUM DIDALAM TEORI NEGARA HUKUM THE RULE OF LAW

    Directory of Open Access Journals (Sweden)

    Made Hendra Wijaya

    2013-11-01

    Full Text Available This research titled, the existence of the concept of rule by law (state law within thestate theories of law the rule of law, which is where the first problem: How can theadvantages of Rule by Law in the theory of law Rule of Law?, How is the dis advantages of aconcept of Rule by law in the theory of law Rule of Law.This research method using the method of normative, legal research that examines thewritten laws of the various aspects, ie aspects of the theory, history, philosophy, comparative,structure and composition, scope, and content, consistent, overview, and chapter by chapter,formality, and the binding force of a law, and the legal language used, but did not examine orimlementasi applied aspects. By using this approach of Historical analysis and approach oflegal conceptual analysis.In this research have found that the advantages of the concept of Rule by Law lies in theproviding of certainty, can also be social control for the community, thus ensuring all citizensin good order at all reciprocal relationships within the community. And Disadvantages of theconcept of Rule by Law if the Law which legalized state action is not supported by democracyand human rights, and the principles of justice, there will be a denial of human rights,widespread poverty, and racial segregation, and if the law is only utilized out by theauthorities as a means to legalize all forms of actions that violate human can inflicttotalitarian nature of the ruling

  9. Do Fiscal Rules Matter?

    DEFF Research Database (Denmark)

    Grembi, Veronica; Nannicini, Tommaso; Troiano, Ugo

    2016-01-01

    , the central government imposed fiscal rules on municipal governments, and in 2001 relaxed them below 5,000 inhabitants. We exploit the before/after and discontinuous policy variation, and show that relaxing fiscal rules increases deficits and lowers taxes. The effect is larger if the mayor can be reelected......Fiscal rules are laws aimed at reducing the incentive to accumulate debt, and many countries adopt them to discipline local governments. Yet, their effectiveness is disputed because of commitment and enforcement problems. We study their impact applying a quasi-experimental design in Italy. In 1999...

  10. Designing adaptive operating rules for a large multi-purpose reservoir

    Science.gov (United States)

    Geressu, Robel; Rougé, Charles; Harou, Julien

    2017-04-01

    Reservoirs whose live storage capacity is large compared with annual inflow have "memory", i.e., their storage levels contain information about past inflows and reservoir operations. Such "long-memory" reservoirs can be found in basins in dry regions such as the Nile River Basin in Africa, the Colorado River Basin in the US, or river basins in Western and Central Asia. There the effects of a dry year have the potential to impact reservoir levels and downstream releases for several subsequent years, prompting tensions in transboundary basins. Yet, current reservoir operation rules in those reservoirs do not reflect this by integrating past climate history and release decisions among the factors that influence operating decisions. This work proposes and demonstrates an adaptive reservoir operating rule that explicitly accounts for the recent history of release decisions, and not only current storage level and near-term inflow forecasts. This implies adding long-term (e.g., multiyear) objectives to the existing short-term (e.g., annual) ones. We apply these operating rules to the Grand Ethiopian Renaissance Dam, a large reservoir under construction on the Blue Nile River. Energy generation has to be balanced with the imperative of releasing enough water in low flow years (e.g., the minimum 1, 2 or 3 year cumulative flow) to avoid tensions with downstream countries, Sudan and Egypt. Maximizing the minimum multi-year releases could be of interest for the Nile problem to minimize the impact on performance of the large High Aswan Dam in Egypt. Objectives include maximizing the average and minimum annual energy generation and maximizing the minimum annual, two year and three year cumulative releases. The system model is tested using 30 stochastically generated streamflow series. One can then derive adaptive release rules depending on the value of one- and two-year total releases with respect to thresholds. Then, there are 3 sets of release rules for the reservoir depending

  11. Atypical Rulings of the Indonesian Constitutional Court

    Directory of Open Access Journals (Sweden)

    Bisariyadi

    2016-08-01

    Full Text Available In deciding judicial review cases, the Court may issue rulings that is not in accordance to what is stipulated in the Constitutional Court Law (Law Number 8 Year 2011. Atypical rulings means that the court may reconstruct a provision, delay the legislation/rulings enactment or give instruction to lawmakers. In addition, the court also introduce the “conditionally (unconstitutional” concept. This essay attempts to identify and classify these atypical rulings, including conditionally (un constitutional rulings, by examined the constitutional court judicial review rulings from 2003 to 2015. This study will provide a ground work for advance research on typical rulings by the Indonesian constitutional court.

  12. Numerical integration for ab initio many-electron self energy calculations within the GW approximation

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Fang, E-mail: fliu@lsec.cc.ac.cn [School of Statistics and Mathematics, Central University of Finance and Economics, Beijing 100081 (China); Lin, Lin, E-mail: linlin@math.berkeley.edu [Department of Mathematics, University of California, Berkeley, CA 94720 (United States); Computational Research Division, Lawrence Berkeley National Laboratory, Berkeley, CA 94720 (United States); Vigil-Fowler, Derek, E-mail: vigil@berkeley.edu [Department of Physics, University of California, Berkeley, CA 94720 (United States); Materials Sciences Division, Lawrence Berkeley National Laboratory, Berkeley, CA 94720 (United States); Lischner, Johannes, E-mail: jlischner597@gmail.com [Department of Physics, University of California, Berkeley, CA 94720 (United States); Materials Sciences Division, Lawrence Berkeley National Laboratory, Berkeley, CA 94720 (United States); Kemper, Alexander F., E-mail: afkemper@lbl.gov [Computational Research Division, Lawrence Berkeley National Laboratory, Berkeley, CA 94720 (United States); Sharifzadeh, Sahar, E-mail: ssharifz@bu.edu [Department of Electrical and Computer Engineering and Division of Materials Science and Engineering, Boston University, Boston, MA 02215 (United States); Jornada, Felipe H. da, E-mail: jornada@berkeley.edu [Department of Physics, University of California, Berkeley, CA 94720 (United States); Materials Sciences Division, Lawrence Berkeley National Laboratory, Berkeley, CA 94720 (United States); Deslippe, Jack, E-mail: jdeslippe@lbl.gov [NERSC, Lawrence Berkeley National Laboratory, Berkeley, CA 94720 (United States); Yang, Chao, E-mail: cyang@lbl.gov [Computational Research Division, Lawrence Berkeley National Laboratory, Berkeley, CA 94720 (United States); and others

    2015-04-01

    We present a numerical integration scheme for evaluating the convolution of a Green's function with a screened Coulomb potential on the real axis in the GW approximation of the self energy. Our scheme takes the zero broadening limit in Green's function first, replaces the numerator of the integrand with a piecewise polynomial approximation, and performs principal value integration on subintervals analytically. We give the error bound of our numerical integration scheme and show by numerical examples that it is more reliable and accurate than the standard quadrature rules such as the composite trapezoidal rule. We also discuss the benefit of using different self energy expressions to perform the numerical convolution at different frequencies.

  13. Comparison of Heuristics for Inhibitory Rule Optimization

    KAUST Repository

    Alsolami, Fawaz

    2014-09-13

    Knowledge representation and extraction are very important tasks in data mining. In this work, we proposed a variety of rule-based greedy algorithms that able to obtain knowledge contained in a given dataset as a series of inhibitory rules containing an expression “attribute ≠ value” on the right-hand side. The main goal of this paper is to determine based on rule characteristics, rule length and coverage, whether the proposed rule heuristics are statistically significantly different or not; if so, we aim to identify the best performing rule heuristics for minimization of rule length and maximization of rule coverage. Friedman test with Nemenyi post-hoc are used to compare the greedy algorithms statistically against each other for length and coverage. The experiments are carried out on real datasets from UCI Machine Learning Repository. For leading heuristics, the constructed rules are compared with optimal ones obtained based on dynamic programming approach. The results seem to be promising for the best heuristics: the average relative difference between length (coverage) of constructed and optimal rules is at most 2.27% (7%, respectively). Furthermore, the quality of classifiers based on sets of inhibitory rules constructed by the considered heuristics are compared against each other, and the results show that the three best heuristics from the point of view classification accuracy coincides with the three well-performed heuristics from the point of view of rule length minimization.

  14. Decision mining revisited - Discovering overlapping rules

    NARCIS (Netherlands)

    Mannhardt, Felix; De Leoni, Massimiliano; Reijers, Hajo A.; Van Der Aalst, Wil M P

    2016-01-01

    Decision mining enriches process models with rules underlying decisions in processes using historical process execution data. Choices between multiple activities are specified through rules defined over process data. Existing decision mining methods focus on discovering mutually-exclusive rules,

  15. Decision Mining Revisited - Discovering Overlapping Rules

    NARCIS (Netherlands)

    Mannhardt, F.; De Leoni, M.; Reijers, H.A.; van der Aalst, W.M.P.; Nurcan, S.; Soffer, P.; Bajec, M.; Eder, J.

    2016-01-01

    Decision mining enriches process models with rules underlying decisions in processes using historical process execution data. Choices between multiple activities are specified through rules defined over process data. Existing decision mining methods focus on discovering mutually-exclusive rules,

  16. The INCOTERMS rules and their importance

    Directory of Open Access Journals (Sweden)

    Anca LAZĂR

    2011-06-01

    Full Text Available The content INCOTERMS are a set of rules that determine the rights and obligations of the international sales contract, selecting a rule of interpretation of commercial terms INCOTERMS, progress is the result of negotiation between the parties and expresses the ratio of these economic forces. In relation to the obligations of the parties to an international sales contract are several different types of contracts covered by the clause. To define the main rules INCOTERMS was considered as a starting point delivery of goods, establishment of the seller and the buyer2, the rules concerning the obligations of each party that are grouped into ten items with identical titles for all the rules. Due to significant developments in international trade, for making available to retailers in the interpretation of the rules commonly used trade terms in international trade, the International Chamber of Commerce in Paris draw a set of delivery conditions for their interpretation in international sales, rules that were in international trade practice some habits, but who were not of equal significance to traders in different countries.

  17. Targeted training of the decision rule benefits rule-guided behavior in Parkinson's disease.

    Science.gov (United States)

    Ell, Shawn W

    2013-12-01

    The impact of Parkinson's disease (PD) on rule-guided behavior has received considerable attention in cognitive neuroscience. The majority of research has used PD as a model of dysfunction in frontostriatal networks, but very few attempts have been made to investigate the possibility of adapting common experimental techniques in an effort to identify the conditions that are most likely to facilitate successful performance. The present study investigated a targeted training paradigm designed to facilitate rule learning and application using rule-based categorization as a model task. Participants received targeted training in which there was no selective-attention demand (i.e., stimuli varied along a single, relevant dimension) or nontargeted training in which there was selective-attention demand (i.e., stimuli varied along a relevant dimension as well as an irrelevant dimension). Following training, all participants were tested on a rule-based task with selective-attention demand. During the test phase, PD patients who received targeted training performed similarly to control participants and outperformed patients who did not receive targeted training. As a preliminary test of the generalizability of the benefit of targeted training, a subset of the PD patients were tested on the Wisconsin card sorting task (WCST). PD patients who received targeted training outperformed PD patients who did not receive targeted training on several WCST performance measures. These data further characterize the contribution of frontostriatal circuitry to rule-guided behavior. Importantly, these data also suggest that PD patient impairment, on selective-attention-demanding tasks of rule-guided behavior, is not inevitable and highlight the potential benefit of targeted training.

  18. Staff rules and regulations

    CERN Multimedia

    HR Department

    2007-01-01

    The 11th edition of the Staff Rules and Regulations, dated 1 January 2007, adopted by the Council and the Finance Committee in December 2006, is currently being distributed to departmental secretariats. The Staff Rules and Regulations, together with a summary of the main modifications made, will be available, as from next week, on the Human Resources Department's intranet site: http://cern.ch/hr-web/internal/admin_services/rules/default.asp The main changes made to the Staff Rules and Regulations stem from the five-yearly review of employment conditions of members of the personnel. The changes notably relate to: the categories of members of the personnel (e.g. removal of the local staff category); the careers structure and the merit recognition system; the non-residence, installation and re-installation allowances; the definition of family, family allowances and family-related leave; recognition of partnerships; education fees. The administrative circulars, some of which are being revised following the m...

  19. Staff rules and regulations

    CERN Multimedia

    HR Department

    2007-01-01

    The 11th edition of the Staff Rules and Regulations, dated 1 January 2007, adopted by the Council and the Finance Committee in December 2006, is currently being distributed to departmental secretariats. The Staff Rules and Regulations, together with a summary of the main modifications made, will be available, as from next week, on the Human Resources Department's intranet site: http://cern.ch/hr-web/internal/admin_services/rules/default.asp The main changes made to the Staff Rules and Regulations stem from the five-yearly review of employment conditions of members of the personnel. The changes notably relate to: the categories of members of the personnel (e.g. removal of the local staff category); the careers structure and the merit recognition system; the non-residence, installation and re-installation allowances; the definition of family, family allowances and family-related leave; recognition of partnerships; education fees. The administrative circulars, some of which are being revised following the ...

  20. Classifiers based on optimal decision rules

    KAUST Repository

    Amin, Talha

    2013-11-25

    Based on dynamic programming approach we design algorithms for sequential optimization of exact and approximate decision rules relative to the length and coverage [3, 4]. In this paper, we use optimal rules to construct classifiers, and study two questions: (i) which rules are better from the point of view of classification-exact or approximate; and (ii) which order of optimization gives better results of classifier work: length, length+coverage, coverage, or coverage+length. Experimental results show that, on average, classifiers based on exact rules are better than classifiers based on approximate rules, and sequential optimization (length+coverage or coverage+length) is better than the ordinary optimization (length or coverage).

  1. Classifiers based on optimal decision rules

    KAUST Repository

    Amin, Talha M.; Chikalov, Igor; Moshkov, Mikhail; Zielosko, Beata

    2013-01-01

    Based on dynamic programming approach we design algorithms for sequential optimization of exact and approximate decision rules relative to the length and coverage [3, 4]. In this paper, we use optimal rules to construct classifiers, and study two questions: (i) which rules are better from the point of view of classification-exact or approximate; and (ii) which order of optimization gives better results of classifier work: length, length+coverage, coverage, or coverage+length. Experimental results show that, on average, classifiers based on exact rules are better than classifiers based on approximate rules, and sequential optimization (length+coverage or coverage+length) is better than the ordinary optimization (length or coverage).

  2. The efficiency of the negligence rules

    OpenAIRE

    Nikolić, Ljubica; Mojašević, Aleksandar

    2012-01-01

    This study comparatively analizes economic effects of different negligence rules, contained in American law on the one hand, and Serbian law on the other. It is important to establish economic implications of the different negligence rules, based on the incentives for tortfeasor’s and victim’s precaution under the different negligence rules. Study of the efficiency of several different forms of negligence rules: simple negligence, negligence with a defense of contributory negligence, comparat...

  3. Logarithmic corrections in a quantization rule. The polaron spectrum

    International Nuclear Information System (INIS)

    Karasev, M.V.; Pereskokov, A.V.

    1994-01-01

    A nonlinear integrodifferential equation that arises in polaron theory is considered. The integral nonlinearity is given by a convolution with the Coulomb potential. Radially symmetric solutions are sought. In the semiclassical limit, an equation for the self-consistent potential is found and studied. The potential has a logarithmic singularity at the origin, and also a turning point at 1. The phase shifts at these points are determined. The quantization rule that takes into account the logarithmic corrections gives a simple asymptotic formula for the polaron spectrum. Global semiclassical solutions of the original nonlinear equation are constructed. 18 refs., 1 tab

  4. ConGEMs: Condensed Gene Co-Expression Module Discovery Through Rule-Based Clustering and Its Application to Carcinogenesis

    Directory of Open Access Journals (Sweden)

    Saurav Mallik

    2017-12-01

    Full Text Available For transcriptomic analysis, there are numerous microarray-based genomic data, especially those generated for cancer research. The typical analysis measures the difference between a cancer sample-group and a matched control group for each transcript or gene. Association rule mining is used to discover interesting item sets through rule-based methodology. Thus, it has advantages to find causal effect relationships between the transcripts. In this work, we introduce two new rule-based similarity measures—weighted rank-based Jaccard and Cosine measures—and then propose a novel computational framework to detect condensed gene co-expression modules ( C o n G E M s through the association rule-based learning system and the weighted similarity scores. In practice, the list of evolved condensed markers that consists of both singular and complex markers in nature depends on the corresponding condensed gene sets in either antecedent or consequent of the rules of the resultant modules. In our evaluation, these markers could be supported by literature evidence, KEGG (Kyoto Encyclopedia of Genes and Genomes pathway and Gene Ontology annotations. Specifically, we preliminarily identified differentially expressed genes using an empirical Bayes test. A recently developed algorithm—RANWAR—was then utilized to determine the association rules from these genes. Based on that, we computed the integrated similarity scores of these rule-based similarity measures between each rule-pair, and the resultant scores were used for clustering to identify the co-expressed rule-modules. We applied our method to a gene expression dataset for lung squamous cell carcinoma and a genome methylation dataset for uterine cervical carcinogenesis. Our proposed module discovery method produced better results than the traditional gene-module discovery measures. In summary, our proposed rule-based method is useful for exploring biomarker modules from transcriptomic data.

  5. ConGEMs: Condensed Gene Co-Expression Module Discovery Through Rule-Based Clustering and Its Application to Carcinogenesis.

    Science.gov (United States)

    Mallik, Saurav; Zhao, Zhongming

    2017-12-28

    For transcriptomic analysis, there are numerous microarray-based genomic data, especially those generated for cancer research. The typical analysis measures the difference between a cancer sample-group and a matched control group for each transcript or gene. Association rule mining is used to discover interesting item sets through rule-based methodology. Thus, it has advantages to find causal effect relationships between the transcripts. In this work, we introduce two new rule-based similarity measures-weighted rank-based Jaccard and Cosine measures-and then propose a novel computational framework to detect condensed gene co-expression modules ( C o n G E M s) through the association rule-based learning system and the weighted similarity scores. In practice, the list of evolved condensed markers that consists of both singular and complex markers in nature depends on the corresponding condensed gene sets in either antecedent or consequent of the rules of the resultant modules. In our evaluation, these markers could be supported by literature evidence, KEGG (Kyoto Encyclopedia of Genes and Genomes) pathway and Gene Ontology annotations. Specifically, we preliminarily identified differentially expressed genes using an empirical Bayes test. A recently developed algorithm-RANWAR-was then utilized to determine the association rules from these genes. Based on that, we computed the integrated similarity scores of these rule-based similarity measures between each rule-pair, and the resultant scores were used for clustering to identify the co-expressed rule-modules. We applied our method to a gene expression dataset for lung squamous cell carcinoma and a genome methylation dataset for uterine cervical carcinogenesis. Our proposed module discovery method produced better results than the traditional gene-module discovery measures. In summary, our proposed rule-based method is useful for exploring biomarker modules from transcriptomic data.

  6. Is judicial integrity a norm?
    An inquiry into the concept of judicial integrity in England and the Netherlands

    Directory of Open Access Journals (Sweden)

    Jonathan Soeharno

    2007-06-01

    Full Text Available Much effort is being made to safeguard judicial integrity – but what is it? In this article, two discourses on judicial integrity will be outlined: one in which judicial integrity is said to be at stake and one in which the emphasis lies on safeguarding judicial integrity. These discourses are by no means homogeneous. Not only are there considerable differences between the English and the Dutch discourses, there are also differences within each discourse regarding the use and meaning of integrity. In order to gain a better understanding of the concept, normative theory is consulted. From a rule of law perspective, integrity as the proper professional character of an official appears to be a presupposed norm. From the perspective of democracy, integrity appears as the norm that correlates with public trust. Expounding on these norms – integrity as professional character and integrity as external accountability – enables a better understanding of the discourses on judicial integrity.

  7. Integration of functions in logic database systems

    NARCIS (Netherlands)

    Lambrichts, E.; Nees, P.; Paredaens, J.; Peelman, P.; Tanca, L.

    1990-01-01

    We extend Datalog, a logic programming language for rule-based systems, by respectively integrating types, negation and functions. This extention of Datalog is called MilAnt. Furthermore, MilAnt consistency is defined as a stronger form of consistency for functions. It is known that consistency for

  8. An algorithm for rule-in and rule-out of acute myocardial infarction using a novel troponin I assay.

    Science.gov (United States)

    Lindahl, Bertil; Jernberg, Tomas; Badertscher, Patrick; Boeddinghaus, Jasper; Eggers, Kai M; Frick, Mats; Rubini Gimenez, Maria; Linder, Rickard; Ljung, Lina; Martinsson, Arne; Melki, Dina; Nestelberger, Thomas; Rentsch, Katharina; Reichlin, Tobias; Sabti, Zaid; Schubera, Marie; Svensson, Per; Twerenbold, Raphael; Wildi, Karin; Mueller, Christian

    2017-01-15

    To derive and validate a hybrid algorithm for rule-out and rule-in of acute myocardial infarction based on measurements at presentation and after 2 hours with a novel cardiac troponin I (cTnI) assay. The algorithm was derived and validated in two cohorts (605 and 592 patients) from multicentre studies enrolling chest pain patients presenting to the emergency department (ED) with onset of last episode within 12 hours. The index diagnosis and cardiovascular events up to 30 days were adjudicated by independent reviewers. In the validation cohort, 32.6% of the patients were ruled out on ED presentation, 6.1% were ruled in and 61.3% remained undetermined. A further 22% could be ruled out and 9.8% ruled in, after 2 hours. In total, 54.6% of the patients were ruled out with a negative predictive value (NPV) of 99.4% (95% CI 97.8% to 99.9%) and a sensitivity of 97.7% (95% CI 91.9% to 99.7%); 15.8% were ruled in with a positive predictive value (PPV) of 74.5% (95% CI 64.8% to 82.2%) and a specificity of 95.2% (95% CI 93.0% to 96.9%); and 29.6% remained undetermined after 2 hours. No patient in the rule-out group died during the 30-day follow-up in the two cohorts. This novel two-step algorithm based on cTnI measurements enabled just over a third of the patients with acute chest pain to be ruled in or ruled out already at presentation and an additional third after 2 hours. This strategy maximises the speed of rule-out and rule-in while maintaining a high NPV and PPV, respectively. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://www.bmj.com/company/products-services/rights-and-licensing/.

  9. A partition enhanced mining algorithm for distributed association rule mining systems

    Directory of Open Access Journals (Sweden)

    A.O. Ogunde

    2015-11-01

    Full Text Available The extraction of patterns and rules from large distributed databases through existing Distributed Association Rule Mining (DARM systems is still faced with enormous challenges such as high response times, high communication costs and inability to adapt to the constantly changing databases. In this work, a Partition Enhanced Mining Algorithm (PEMA is presented to address these problems. In PEMA, the Association Rule Mining Coordinating Agent receives a request and decides the appropriate data sites, partitioning strategy and mining agents to use. The mining process is divided into two stages. In the first stage, the data agents horizontally segment the databases with small average transaction length into relatively smaller partitions based on the number of available sites and the available memory. On the other hand, databases with relatively large average transaction length were vertically partitioned. After this, Mobile Agent-Based Association Rule Mining-Agents, which are the mining agents, carry out the discovery of the local frequent itemsets. At the second stage, the local frequent itemsets were incrementally integrated by the from one data site to another to get the global frequent itemsets. This reduced the response time and communication cost in the system. Results from experiments conducted on real datasets showed that the average response time of PEMA showed an improvement over existing algorithms. Similarly, PEMA incurred lower communication costs with average size of messages exchanged lower when compared with benchmark DARM systems. This result showed that PEMA could be efficiently deployed for efficient discovery of valuable knowledge in distributed databases.

  10. Atomic Energy (factories) rules: 1988

    International Nuclear Information System (INIS)

    1988-01-01

    These rules are made by the Central Government under the Factories Act, 1948 and extend to all factories engaged in carrying out the purposes of the Atomic Energy Act, 1962. The rules cover the requirements of inspecting staff, health aspects, personnel safety, personnel welfare, working hours, employment of young persons, special provisions in case of dangerous manufacturing processes or operations, supplemental rules for administrative aspects and special powers of competent authority. (M.G.B.)

  11. Evolving temporal association rules with genetic algorithms

    OpenAIRE

    Matthews, Stephen G.; Gongora, Mario A.; Hopgood, Adrian A.

    2010-01-01

    A novel framework for mining temporal association rules by discovering itemsets with a genetic algorithm is introduced. Metaheuristics have been applied to association rule mining, we show the efficacy of extending this to another variant - temporal association rule mining. Our framework is an enhancement to existing temporal association rule mining methods as it employs a genetic algorithm to simultaneously search the rule space and temporal space. A methodology for validating the ability of...

  12. Scalable printed electronics: an organic decoder addressing ferroelectric non-volatile memory

    Science.gov (United States)

    Ng, Tse Nga; Schwartz, David E.; Lavery, Leah L.; Whiting, Gregory L.; Russo, Beverly; Krusor, Brent; Veres, Janos; Bröms, Per; Herlogsson, Lars; Alam, Naveed; Hagel, Olle; Nilsson, Jakob; Karlsson, Christer

    2012-01-01

    Scalable circuits of organic logic and memory are realized using all-additive printing processes. A 3-bit organic complementary decoder is fabricated and used to read and write non-volatile, rewritable ferroelectric memory. The decoder-memory array is patterned by inkjet and gravure printing on flexible plastics. Simulation models for the organic transistors are developed, enabling circuit designs tolerant of the variations in printed devices. We explain the key design rules in fabrication of complex printed circuits and elucidate the performance requirements of materials and devices for reliable organic digital logic. PMID:22900143

  13. Goal Translation for a Hammer for Coq (Extended Abstract

    Directory of Open Access Journals (Sweden)

    Łukasz Czajka

    2016-06-01

    Full Text Available Hammers are tools that provide general purpose automation for formal proof assistants. Despite the gaining popularity of the more advanced versions of type theory, there are no hammers for such systems. We present an extension of the various hammer components to type theory: (i a translation of a significant part of the Coq logic into the format of automated proof systems; (ii a proof reconstruction mechanism based on a Ben-Yelles-type algorithm combined with limited rewriting, congruence closure and a first-order generalization of the left rules of Dyckhoff's system LJT.

  14. On combinatorial properties of elementary intramolecular operations

    Directory of Open Access Journals (Sweden)

    Vladimir Rogojin

    2014-11-01

    Full Text Available Here we tackle a problem from biology in terms of discrete mathematics. We are interested in a complex DNA manipulation process happening in eukaryotic organisms of a subclass of ciliate species called {\\it Stichotrichia} during so-called gene assembly. This process is in particular interesting since one can interpret gene assembly in ciliates as sorting of permutations. We survey here results related to studies on sorting permutations with some specific rewriting rules that formalize elementary intramolecular gene assembly operations. The research question is ``what permutation may be sorted with our operations?"

  15. Rules of thumb in life-cycle savings models

    OpenAIRE

    Rodepeter, Ralf; Winter, Joachim

    1999-01-01

    We analyze life-cycle savings decisions when households use simple heuristics, or rules of thumb, rather than solve the underlying intertemporal optimization problem. The decision rules we explore are a simple Keynesian rule where consumption follows income; a simple consumption rule where only a fraction of positive income shocks is saved; a rule that corresponds to the permanent income hypothesis; and two rules that have been found in experimental studies. Using these rules, we simulate lif...

  16. What is 'A Successful Integration'? Family Reunification and the Rights of Children in Denmark

    DEFF Research Database (Denmark)

    Adamo, Silvia

    2016-01-01

    of children dependent on the integration of the parents in Denmark. The article will address and analyse both the newest legislation and some administrative cases that show the application of the rules in practice. The investigation will illustrate how the latest legal amendments, although presented......This article explores Danish law on immigration and integration and the quest of third-country nationals for family reunification with their children. The legislation has developed so that age limitations and requirements on integration may entail a denial of a permit for family reunification...... as a relaxation of rules, have in fact not substantially altered the restraints put on family reunification rights in Denmark in the last decade. In particular, the legal effects of integration requirements for children will be analysed and evaluated from a critical perspective, advocating an ethical assessment...

  17. Analysis of public comments on the proposed rule on nuclear power plant license renewal

    International Nuclear Information System (INIS)

    1991-12-01

    This report provides a summary and analysis of public comments on the proposed license renewal rule for the nuclear power plants (10 CFR Part 54) published in the Federal Register on 17 July 1990. It also documents the NRC's resolution of the issues raised by the commenters. Comments from 121 organizations and 76 individuals were reviewed and analyzed to identify the issues, including those pertaining to the adequacy of the licensing basis, the performance of an integrated plant assessment, backfit considerations, and need for public hearings. The analysis included grouping of commenters' views according to the issues raised. The public comments analyzed in this report were taken into consideration in the development of the final rule and revisions to the supporting documents

  18. How Politics Shapes the Growth of Rules

    DEFF Research Database (Denmark)

    Jakobsen, Mads Leth Felsager; Mortensen, Peter Bjerre

    2015-01-01

    when, why, and how political factors shape changes in the stock of rules. Furthermore, we test these hypotheses on a unique, new data set based on all Danish primary legislation and administrative rules from 1989 to 2011 categorized into 20 different policy domains. The analysis shows......This article examines the impact of politics on governmental rule production. Traditionally, explanations of rule dynamics have focused on nonpolitical factors such as the self-evolvement of rules, environmental factors, and decision maker attributes. This article develops a set of hypotheses about...... that the traditional Weberian “rules breed rules” explanations must be supplemented with political explanations that take party ideology and changes in the political agenda into account. Moreover, the effect of political factors is indistinguishable across changes in primary laws and changes in administrative rules...

  19. Effects of Memorization of Rule Statements on Acquisition and Retention of Rule-Governed Behavior in a Computer-Based Learning Task.

    Science.gov (United States)

    Towle, Nelson J.

    One hundred and twenty-four high school students were randomly assigned to four groups: 33 subjects memorized the rule statement before, 29 subjects memorized the rule statement during, and 30 subjects memorized the rule statement after instruction in rule application skills. Thirty-two subjects were not required to memorize rule statements.…

  20. Safe reduction rules for weighted treewidth

    NARCIS (Netherlands)

    Eijkhof, F. van den; Bodlaender, H.L.; Koster, A.M.C.A.

    2002-01-01

    Several sets of reductions rules are known for preprocessing a graph when computing its treewidth. In this paper, we give reduction rules for a weighted variant of treewidth, motivated by the analysis of algorithms for probabilistic networks. We present two general reduction rules that are safe for

  1. Oxytocin modulates trait-based rule following

    NARCIS (Netherlands)

    Gross, J.; de Dreu, C.K.W.

    Rules, whether in the form of norms, taboos or laws, regulate and coordinate human life. Some rules, however, are arbitrary and adhering to them can be personally costly. Rigidly sticking to such rules can be considered maladaptive. Here, we test whether, at the neurobiological level, (mal)adaptive

  2. Sensitivity of a Clinical Decision Rule and Early Computed Tomography in Aneurysmal Subarachnoid Hemorrhage

    Directory of Open Access Journals (Sweden)

    Dustin G. Mark

    2015-10-01

    Full Text Available Introduction: Application of a clinical decision rule for subarachnoid hemorrhage, in combination with cranial computed tomography (CT performed within six hours of ictus (early cranial CT, may be able to reasonably exclude a diagnosis of aneurysmal subarachnoid hemorrhage (aSAH. This study’s objective was to examine the sensitivity of both early cranial CT and a previously validated clinical decision rule among emergency department (ED patients with aSAH and a normal mental status. Methods: Patients were evaluated in the 21 EDs of an integrated health delivery system between January 2007 and June 2013. We identified by chart review a retrospective cohort of patients diagnosed with aSAH in the setting of a normal mental status and performance of early cranial CT. Variables comprising the SAH clinical decision rule (age >40, presence of neck pain or stiffness, headache onset with exertion, loss of consciousness at headache onset were abstracted from the chart and assessed for inter-rater reliability. Results: One hundred fifty-five patients with aSAH met study inclusion criteria. The sensitivity of early cranial CT was 95.5% (95% CI [90.9-98.2]. The sensitivity of the SAH clinical decision rule was also 95.5% (95% CI [90.9-98.2]. Since all false negative cases for each diagnostic modality were mutually independent, the combined use of both early cranial CT and the clinical decision rule improved sensitivity to 100% (95% CI [97.6-100.0]. Conclusion: Neither early cranial CT nor the SAH clinical decision rule demonstrated ideal sensitivity for aSAH in this retrospective cohort. However, the combination of both strategies might optimize sensitivity for this life-threatening disease.

  3. KTA nuclear safety rules, or the love for service according to the rules

    International Nuclear Information System (INIS)

    Sauer, G.W.

    1993-01-01

    This paper presents some critical comments on the question as to what extent the KTA rules really support the safety-oriented and in this sense purposeful implementation of the Atomic Energy Act. The authors review some specific KTA rules for their expediency, not with holding disapproval in some cases. (HP) [de

  4. The Rule-Assessment Approach and Education.

    Science.gov (United States)

    Siegler, Robert S.

    1982-01-01

    This paper describes the rule-assessment approach to cognitive development. The basic question that motivated the rule-assessment approach is how people's existing knowledge influences their ability to learn. Research using the rule-assessment approach is summarized in terms of eight conclusions, each illustrated with empirical examples.…

  5. 76 FR 76815 - Business Opportunity Rule

    Science.gov (United States)

    2011-12-08

    ... Used Throughout This Statement of Basis and Purpose ``Amended Franchise Rule'' refers to the amended Franchise Rule published at 72 FR 15444 (Mar. 30, 2007) and codified at 16 CFR 436. ``ANPR'' refers to the.../bcp/workshops/bizopps/disclosure-form-report.pdf . ``Original Franchise Rule'' refers to the original...

  6. Australian Children's Understanding of Display Rules

    Science.gov (United States)

    Choy, Grace

    2009-01-01

    Cultural display rules govern the manifestation of emotional expressions. In compliance with display rules, the facial expressions displayed (i.e. apparent emotion) may be incongruent with the emotion experienced (i.e. real emotion). This study investigates Australian Caucasian children's understanding of display rules. A sample of 80 four year…

  7. Statistical Rules-of-Thumb.

    Science.gov (United States)

    Brewer, James K.

    1988-01-01

    Six best-selling introductory behavioral statistics textbooks that were published in 1982 and two well-known sampling theory textbooks were reviewed to determine the presence of rules-of-thumb--useful principles with wide application that are not intended to be strictly accurate. The relative frequency and type of rules are reported along with a…

  8. School children's reasoning about school rules

    OpenAIRE

    Thornberg, Robert

    2008-01-01

    School rules are usually associated with classroom management and school discipline. However, rules also define ways of thinking about oneself and the world. Rules are guidelines for actions and for the evaluation of actions in terms of good and bad, or right and wrong, and therefore a part of moral or values education in school. This study is a part of a larger ethnographic study on values education in the everyday life of school. Here the focus is on school rules and students' reasoning abo...

  9. Business rules formalisation for information systems

    Directory of Open Access Journals (Sweden)

    Ivana Rábová

    2010-01-01

    Full Text Available The article deals with relation business rules and business applications and describes a number of structures for support of information systems implementation and customization. Particular formats of structure are different according to different type of business rules. We arise from model of enterprise architecture that is a significant document of all what happens in business and serves for blueprint and facilitates of managers decisions. Most complicated part of enterprise architecture is business rule. When we gain its accurate formulation and when we achieve to formalize and to store business rule in special repository we can manage it actualize it and use it for many reasons. The article emphasizes formats of business rule formalization and its reference to business applications implementation.

  10. Enlarging the EU's internal energy market: Why would third countries accept EU rule export?

    International Nuclear Information System (INIS)

    Prange-Gstoehl, Heiko

    2009-01-01

    Why would countries without a membership perspective seek integration into the EU's internal energy market? One major element of the EU's external energy policy is the export of EU energy norms and regulations to neighbourhood countries and beyond. A core legal instrument the EU uses in this context is the Energy Community Treaty (ECT). The ECT goes both geographically and regarding its depth significantly beyond neighbourhood or association policies, addressing potentially also countries in the 'far neighbourhood' and aiming at the creation of a Single Market for energy with these countries. While, however, EU candidate countries are obliged to adopt the 'acquis' before accessing the EU and therefore comply to EU rules already before they enter the Club, I argue that countries with no or only a vague membership perspective - i.e. countries where the EU cannot apply the 'conditionality' - approach (e.g., ENP countries)-aim at deeper integration with the EU because they are either eager to demonstrate their capability and potential to become part of the Club, they seek greater independence from a regional hegemon or they envisage significant economic gains as common norms, rules and standards are likely to increase economic exchange with the EU.

  11. Methods for enhancing numerical integration

    International Nuclear Information System (INIS)

    Doncker, Elise de

    2003-01-01

    We give a survey of common strategies for numerical integration (adaptive, Monte-Carlo, Quasi-Monte Carlo), and attempt to delineate their realm of applicability. The inherent accuracy and error bounds for basic integration methods are given via such measures as the degree of precision of cubature rules, the index of a family of lattice rules, and the discrepancy of uniformly distributed point sets. Strategies incorporating these basic methods often use paradigms to reduce the error by, e.g., increasing the number of points in the domain or decreasing the mesh size, locally or uniformly. For these processes the order of convergence of the strategy is determined by the asymptotic behavior of the error, and may be too slow in practice for the type of problem at hand. For certain problem classes we may be able to improve the effectiveness of the method or strategy by such techniques as transformations, absorbing a difficult part of the integrand into a weight function, suitable partitioning of the domain, transformations and extrapolation or convergence acceleration. Situations warranting the use of these techniques (possibly in an 'automated' way) are described and illustrated by sample applications

  12. Method of mechanical quadratures for solving singular integral equations of various types

    Science.gov (United States)

    Sahakyan, A. V.; Amirjanyan, H. A.

    2018-04-01

    The method of mechanical quadratures is proposed as a common approach intended for solving the integral equations defined on finite intervals and containing Cauchy-type singular integrals. This method can be used to solve singular integral equations of the first and second kind, equations with generalized kernel, weakly singular equations, and integro-differential equations. The quadrature rules for several different integrals represented through the same coefficients are presented. This allows one to reduce the integral equations containing integrals of different types to a system of linear algebraic equations.

  13. Binary translation using peephole translation rules

    Science.gov (United States)

    Bansal, Sorav; Aiken, Alex

    2010-05-04

    An efficient binary translator uses peephole translation rules to directly translate executable code from one instruction set to another. In a preferred embodiment, the translation rules are generated using superoptimization techniques that enable the translator to automatically learn translation rules for translating code from the source to target instruction set architecture.

  14. 29 CFR 18.1 - Scope of rules.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Scope of rules. 18.1 Section 18.1 Labor Office of the Secretary of Labor RULES OF PRACTICE AND PROCEDURE FOR ADMINISTRATIVE HEARINGS BEFORE THE OFFICE OF ADMINISTRATIVE LAW JUDGES General § 18.1 Scope of rules. (a) General application. These rules of practice are...

  15. Can the meaning of multiple words be integrated unconsciously?

    NARCIS (Netherlands)

    van Gaal, S.; Naccache, L.; Meuwese, J.D.I.; van Loon, A.M.; Leighton, A.H.; Cohen, L.; Dehaene, S.

    2014-01-01

    What are the limits of unconscious language processing? Can language circuits process simple grammatical constructions unconsciously and integrate the meaning of several unseen words? Using behavioural priming and electroencephalography (EEG), we studied a specific rule-based linguistic operation

  16. Food rules in the Koran

    OpenAIRE

    Kocturk, Tahire O.

    2002-01-01

    Islam is now the second largest religion in Scandinavia and has a high representation among immigrant groups. Knowledge of food rules in Islam is a necessity for nutritionists in multicultural settings. Food rules as they appear in the Koran are contained within the concepts of halal and haram. Halal means lawful, permitted and recommended by the Islamic law. Haram is the opposite, meaning unlawful, prohibited. Food rules are meant to be observed by postpubertal people in good physical and me...

  17. Baikov-Lee representations of cut Feynman integrals

    International Nuclear Information System (INIS)

    Harley, Mark; Moriello, Francesco; Schabinger, Robert M.

    2017-01-01

    We develop a general framework for the evaluation of d-dimensional cut Feynman integrals based on the Baikov-Lee representation of purely-virtual Feynman integrals. We implement the generalized Cutkosky cutting rule using Cauchy’s residue theorem and identify a set of constraints which determine the integration domain. The method applies equally well to Feynman integrals with a unitarity cut in a single kinematic channel and to maximally-cut Feynman integrals. Our cut Baikov-Lee representation reproduces the expected relation between cuts and discontinuities in a given kinematic channel and furthermore makes the dependence on the kinematic variables manifest from the beginning. By combining the Baikov-Lee representation of maximally-cut Feynman integrals and the properties of periods of algebraic curves, we are able to obtain complete solution sets for the homogeneous differential equations satisfied by Feynman integrals which go beyond multiple polylogarithms. We apply our formalism to the direct evaluation of a number of interesting cut Feynman integrals.

  18. Cosmic Sum Rules

    DEFF Research Database (Denmark)

    T. Frandsen, Mads; Masina, Isabella; Sannino, Francesco

    2011-01-01

    We introduce new sum rules allowing to determine universal properties of the unknown component of the cosmic rays and show how it can be used to predict the positron fraction at energies not yet explored by current experiments and to constrain specific models.......We introduce new sum rules allowing to determine universal properties of the unknown component of the cosmic rays and show how it can be used to predict the positron fraction at energies not yet explored by current experiments and to constrain specific models....

  19. Revisiting the debate on the relationship between display rules and performance: considering the explicitness of display rules.

    Science.gov (United States)

    Christoforou, Paraskevi S; Ashforth, Blake E

    2015-01-01

    We argue that the strength with which the organization communicates expectations regarding the appropriate emotional expression toward customers (i.e., explicitness of display rules) has an inverted U-shaped relationship with service delivery behaviors, customer satisfaction, and sales performance. Further, we argue that service organizations need a particular blend of explicitness of display rules and role discretion for the purpose of optimizing sales performance. As hypothesized, findings from 2 samples of salespeople suggest that either high or low explicitness of display rules impedes service delivery behaviors and sales performance, which peaks at moderate explicitness of display rules and high role discretion. The findings also suggest that the explicitness of display rules has a positive relationship with customer satisfaction. (c) 2015 APA, all rights reserved.

  20. Reliable electricity. The effects of system integration and cooperative measures to make it work

    Energy Technology Data Exchange (ETDEWEB)

    Hagspiel, Simeon [Koeln Univ. (Germany). Energiewirtschaftliches Inst.; Koeln Univ. (Germany). Dept. of Economics

    2017-12-15

    We investigate the effects of system integration for reliability of supply in regional electricity systems along with cooperative measures to support it. Specifically, we set up a model to contrast the benefits from integration through statistical balancing (i.e., a positive externality) with the risk of cascading outages (a negative externality). The model is calibrated with a comprehensive dataset comprising 28 European countries on a high spatial and temporal resolution. We find that positive externalities from system integration prevail, and that cooperation is key to meet reliability targets efficiently. To enable efficient solutions in a non-marketed environment, we formulate the problem as a cooperative game and study different rules to allocate the positive and negative effects to individual countries. Strikingly, we find that without a mechanism, the integrated solution is unstable. In contrast, proper transfer payments can be found to make all countries better off in full integration, and the Nucleolus is identified as a particularly promising candidate. The rule could be used as a basis for compensation payments to support the successful integration and cooperation of electricity systems.

  1. Reliable electricity. The effects of system integration and cooperative measures to make it work

    International Nuclear Information System (INIS)

    Hagspiel, Simeon; Koeln Univ.

    2017-01-01

    We investigate the effects of system integration for reliability of supply in regional electricity systems along with cooperative measures to support it. Specifically, we set up a model to contrast the benefits from integration through statistical balancing (i.e., a positive externality) with the risk of cascading outages (a negative externality). The model is calibrated with a comprehensive dataset comprising 28 European countries on a high spatial and temporal resolution. We find that positive externalities from system integration prevail, and that cooperation is key to meet reliability targets efficiently. To enable efficient solutions in a non-marketed environment, we formulate the problem as a cooperative game and study different rules to allocate the positive and negative effects to individual countries. Strikingly, we find that without a mechanism, the integrated solution is unstable. In contrast, proper transfer payments can be found to make all countries better off in full integration, and the Nucleolus is identified as a particularly promising candidate. The rule could be used as a basis for compensation payments to support the successful integration and cooperation of electricity systems.

  2. Implementation of maintenance rule for structures

    International Nuclear Information System (INIS)

    Ashar, H.; Bagchi, G.

    1999-01-01

    The maintenance rule, 10 CFR 50.65, 'Requirements for Monitoring the Effectiveness of Maintenance at Nuclear Power Plants', was published by the Nuclear Regulatory Commission (NRC) in the Federal Register (56 FR 31324) on July 10, 1991. The rule became effective on July 10, 1996, giving nuclear power plant licensees 5 years to implement it. During 1994-1995, NRC staff visited nine nuclear power plant sites to observe licensees' preparations for implementation of the rule. The teams found that most of the licensees had not established goals, or performance criteria for monitoring structures at their sites. The licensees contended that the structures were inherently reliable and required no monitoring under the maintenance rule. On the basis of earlier site visits performed by NRC staff to assess the condition of structures, the NRC staff could not accept this contention, and clarified its position in Revision 1 of Regulatory Guide 1.160, 'Monitoring the Effectiveness of Maintenance at Nuclear Power Plants'. This paper discusses the applicability of the maintenance rule criteria for structures and its usefulness in ensuring that the structures, systems, and components within the scope of the maintenance rule are capable of fulfilling their intended functions. Also discussed are the aspects of maintenance rule efforts that could be useful for license renewal applications. (orig.)

  3. Retrospective comparison of the Low Risk Ankle Rules and the Ottawa Ankle Rules in a pediatric population.

    Science.gov (United States)

    Ellenbogen, Amy L; Rice, Amy L; Vyas, Pranav

    2017-09-01

    A recent multicenter prospective Canadian study presented prospective evidence supporting the Low Risk Ankle Rules (LRAR) as a means of reducing the number of ankle radiographs ordered for children presenting with an ankle injury while maintaining nearly 100% sensitivity. This is in contrast to a previous prospective study which showed that this rule yielded only 87% sensitivity. It is important to further investigate the LRAR and compare them with the already validated Ottawa Ankle Rules (OAR) to potentially curb healthcare costs and decrease unnecessary radiation exposure without compromising diagnostic accuracy. We conducted a retrospective chart review of 980 qualifying patients ages 12months to 18years presenting with ankle injury to a commonly staffed 310 bed children's hospital and auxiliary site pediatric emergency department. There were 28 high-risk fractures identified. The Ottawa Ankle Rules had a sensitivity of 100% (95% CI 87.7-100), specificity of 33.1% (95% CI 30.1-36.2), and would have reduced the number of ankle radiographs ordered by 32.1%. The Low Risk Ankle Rules had a sensitivity of 85.7% (95% CI 85.7-96), specificity of 64.9% (95% CI 61.8-68), and would have reduced the number of ankle radiographs ordered by 63.1%. The latter rule missed 4 high-risk fractures. The Low Risk Ankle Rules may not be sensitive enough for use in Pediatric Emergency Departments, while the Ottawa Ankle Rules again demonstrated 100% sensitivity. Further research on ways to implement the Ottawa Ankle Rules and maximize its ability to decrease wait times, healthcare costs, and improve patient satisfaction are needed. Copyright © 2017 Elsevier Inc. All rights reserved.

  4. Cellular Automata Rules and Linear Numbers

    OpenAIRE

    Nayak, Birendra Kumar; Sahoo, Sudhakar; Biswal, Sagarika

    2012-01-01

    In this paper, linear Cellular Automta (CA) rules are recursively generated using a binary tree rooted at "0". Some mathematical results on linear as well as non-linear CA rules are derived. Integers associated with linear CA rules are defined as linear numbers and the properties of these linear numbers are studied.

  5. Having Linguistic Rules and Knowing Linguistic Facts

    Directory of Open Access Journals (Sweden)

    Peter Ludlow

    2010-11-01

    Full Text Available

    'Knowledge' doesn't correctly describe our relation to linguistic rules. It is too thick a notion (for example, we don't believe linguistic rules. On the other hand, 'cognize', without further elaboration, is too thin a notion, which is to say that it is too thin to play a role in a competence theory. One advantage of the term 'knowledge'-and presumably Chomsky's original motivation for using it-is that knowledge would play the right kind of role in a competence theory: Our competence would consist in a body of knowledge which we have and which we may or may not act upon-our performance need not conform to the linguistic rules that we know.

    Is there a way out of the dilemma? I'm going to make the case that the best way to talk about grammatical rules is simply to say that we have them. That doesn't sound very deep, I know, but saying that we have individual rules leaves room for individual norm guidance in a way that 'cognize' does not. Saying we have a rule like subjacency is also thicker than merely saying we cognize it. Saying I have such a rule invites the interpretation that it is a rule for me-that I am normatively guided by it. The competence theory thus becomes a theory of the rules that we have. Whether we follow those rules is another matter entirely.

  6. Potential Implications of Approaches to Climate Change on the Clean Water Rule Definition of "Waters of the United States".

    Science.gov (United States)

    Faust, Derek R; Moore, Matthew T; Emison, Gerald Andrews; Rush, Scott A

    2016-05-01

    The 1972 Clean Water Act was passed to protect chemical, physical, and biological integrity of United States' waters. The U.S. Environmental Protection Agency and U.S. Army Corps of Engineers codified a new "waters of the United States" rule on June 29, 2015, because several Supreme Court case decisions caused confusion with the existing rule. Climate change could affect this rule through connectivity between groundwater and surface waters; floodplain waters and the 100-year floodplain; changes in jurisdictional status; and sea level rise on coastal ecosystems. Four approaches are discussed for handling these implications: (1) "Wait and see"; (2) changes to the rule; (3) use guidance documents; (4) Congress statutorily defining "waters of the United States." The approach chosen should be legally defensible and achieved in a timely fashion to provide protection to "waters of the United States" in proactive consideration of scientifically documented effects of climate change on aquatic ecosystems.

  7. A reply to behavior analysts writing about rules and rule-governed behavior.

    Science.gov (United States)

    Schlinger, H D

    1990-01-01

    Verbal stimuli called "rules" or "instructions" continue to be interpreted as discriminative stimuli despite recent arguments against this practice. Instead, it might more fruitful for behavior analysts to focus on "contingency-specifying stimuli" which are function-altering. Moreover, rather than having a special term, "rule," for verbal stimuli whose only function is discriminative, perhaps behavior analysts should reserve the term, if at all, only for these function-altering contingency-specifying stimuli.

  8. Representation of the deduction with tetravalent logic: realisation of fast inference motors

    International Nuclear Information System (INIS)

    Terrier, F.

    1987-05-01

    Building automats for surveillance, control or diagnosis, can be done by artificial intelligence. They function according to the formalism of O ordre propositional logic. Deduction modes can then easily be represented in a trivalent logic with both efficiency and concision. One can obtain workable codes with low storage of high speed (env. 5000 rules per second). This leads us to develop and entry langage with extremely simple statement rules which can be learnt by experts in practically no time. Finally in order to generalize this principle and draw rules with multi-choice conclusions, (if... then the motor stops or the pressure goes down), rewriting these processes enable to return to an equivalent system without multi-choice conclusions, providing the same amount of informations with the possibility of deciding. This study has been used on 2 different cases: first it served as a tool to analyse reliability, (OLAF), second to help diagnosis breakdown of pressurized water-reactors [fr

  9. Feynman rules for the Standard Model Effective Field Theory in R ξ -gauges

    Science.gov (United States)

    Dedes, A.; Materkowska, W.; Paraskevas, M.; Rosiek, J.; Suxho, K.

    2017-06-01

    We assume that New Physics effects are parametrized within the Standard Model Effective Field Theory (SMEFT) written in a complete basis of gauge invariant operators up to dimension 6, commonly referred to as "Warsaw basis". We discuss all steps necessary to obtain a consistent transition to the spontaneously broken theory and several other important aspects, including the BRST-invariance of the SMEFT action for linear R ξ -gauges. The final theory is expressed in a basis characterized by SM-like propagators for all physical and unphysical fields. The effect of the non-renormalizable operators appears explicitly in triple or higher multiplicity vertices. In this mass basis we derive the complete set of Feynman rules, without resorting to any simplifying assumptions such as baryon-, lepton-number or CP conservation. As it turns out, for most SMEFT vertices the expressions are reasonably short, with a noticeable exception of those involving 4, 5 and 6 gluons. We have also supplemented our set of Feynman rules, given in an appendix here, with a publicly available Mathematica code working with the FeynRules package and producing output which can be integrated with other symbolic algebra or numerical codes for automatic SMEFT amplitude calculations.

  10. Moral empiricism and the bias for act-based rules.

    Science.gov (United States)

    Ayars, Alisabeth; Nichols, Shaun

    2017-10-01

    Previous studies on rule learning show a bias in favor of act-based rules, which prohibit intentionally producing an outcome but not merely allowing the outcome. Nichols, Kumar, Lopez, Ayars, and Chan (2016) found that exposure to a single sample violation in which an agent intentionally causes the outcome was sufficient for participants to infer that the rule was act-based. One explanation is that people have an innate bias to think rules are act-based. We suggest an alternative empiricist account: since most rules that people learn are act-based, people form an overhypothesis (Goodman, 1955) that rules are typically act-based. We report three studies that indicate that people can use information about violations to form overhypotheses about rules. In study 1, participants learned either three "consequence-based" rules that prohibited allowing an outcome or three "act-based" rules that prohibiting producing the outcome; in a subsequent learning task, we found that participants who had learned three consequence-based rules were more likely to think that the new rule prohibited allowing an outcome. In study 2, we presented participants with either 1 consequence-based rule or 3 consequence-based rules, and we found that those exposed to 3 such rules were more likely to think that a new rule was also consequence based. Thus, in both studies, it seems that learning 3 consequence-based rules generates an overhypothesis to expect new rules to be consequence-based. In a final study, we used a more subtle manipulation. We exposed participants to examples act-based or accident-based (strict liability) laws and then had them learn a novel rule. We found that participants who were exposed to the accident-based laws were more likely to think a new rule was accident-based. The fact that participants' bias for act-based rules can be shaped by evidence from other rules supports the idea that the bias for act-based rules might be acquired as an overhypothesis from the

  11. Religionsfrihed i Kina & The Rule of Law

    DEFF Research Database (Denmark)

    Christoffersen, Lisbet

    2011-01-01

    Artiklen redegør for aktuel kinesisk religionsret, sammenstiller den med internationale religionsretlige grundbegreber og anvender dette empiriske materiale til en reflektion over begreberne Rule of Law vs Rule by Law......Artiklen redegør for aktuel kinesisk religionsret, sammenstiller den med internationale religionsretlige grundbegreber og anvender dette empiriske materiale til en reflektion over begreberne Rule of Law vs Rule by Law...

  12. Rule Induction-Based Knowledge Discovery for Energy Efficiency

    OpenAIRE

    Chen, Qipeng; Fan, Zhong; Kaleshi, Dritan; Armour, Simon M D

    2015-01-01

    Rule induction is a practical approach to knowledge discovery. Provided that a problem is developed, rule induction is able to return the knowledge that addresses the goal of this problem as if-then rules. The primary goals of knowledge discovery are for prediction and description. The rule format knowledge representation is easily understandable so as to enable users to make decisions. This paper presents the potential of rule induction for energy efficiency. In particular, three rule induct...

  13. 14 CFR 91.139 - Emergency air traffic rules.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 2 2010-01-01 2010-01-01 false Emergency air traffic rules. 91.139 Section 91.139 Aeronautics and Space FEDERAL AVIATION ADMINISTRATION, DEPARTMENT OF TRANSPORTATION (CONTINUED) AIR TRAFFIC AND GENERAL OPERATING RULES GENERAL OPERATING AND FLIGHT RULES Flight Rules General § 91.139 Emergency air traffic rules. (a) This...

  14. Momentum sum rules for fragmentation functions

    International Nuclear Information System (INIS)

    Meissner, S.; Metz, A.; Pitonyak, D.

    2010-01-01

    Momentum sum rules for fragmentation functions are considered. In particular, we give a general proof of the Schaefer-Teryaev sum rule for the transverse momentum dependent Collins function. We also argue that corresponding sum rules for related fragmentation functions do not exist. Our model-independent analysis is supplemented by calculations in a simple field-theoretical model.

  15. Guide to the collision avoidance rules

    CERN Document Server

    Cockcroft, A N

    2004-01-01

    A Guide to the Collision Avoidance Rules is the essential reference to the safe operation of all vessels at sea. Published continuously since 1965, this respected and expert guide is the classic text for all who need to, practically and legally, understand and comply with the Rules. This sixth edition incorporates all of the amendments to the International Regulations for Preventing Collisions at Sea which came into force in November 2003.The books sets out all of the Rules with clear explanation of their meaning, and gives detailed examples of how the rules have been used in practice

  16. Optimization of conventional rule curves coupled with hedging rules for reservoir operation

    DEFF Research Database (Denmark)

    Taghian, Mehrdad; Rosbjerg, Dan; Haghighi, Ali

    2014-01-01

    As a common approach to reservoir operating policies, water levels at the end of each time interval should be kept at or above the rule curve. In this study, the policy is captured using rationing of the target yield to reduce the intensity of severe water shortages. For this purpose, a hybrid...... to achieve the optimal water allocation and the target storage levels for reservoirs. As a case study, a multipurpose, multireservoir system in southern Iran is selected. The results show that the model has good performance in extracting the optimum policy for reservoir operation under both normal...... model is developed to optimize simultaneously both the conventional rule curve and the hedging rule. In the compound model, a simple genetic algorithm is coupled with a simulation program, including an inner linear programming algorithm. In this way, operational policies are imposed by priority concepts...

  17. 39 CFR 230.26 - Do these rules affect the service of process requirements of the Federal Rules of Civil Procedure...

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Do these rules affect the service of process....26 Do these rules affect the service of process requirements of the Federal Rules of Civil Procedure... Rules of Civil Procedure regarding service of process. ...

  18. Choice Rules and Accumulator Networks

    Science.gov (United States)

    2015-01-01

    This article presents a preference accumulation model that can be used to implement a number of different multi-attribute heuristic choice rules, including the lexicographic rule, the majority of confirming dimensions (tallying) rule and the equal weights rule. The proposed model differs from existing accumulators in terms of attribute representation: Leakage and competition, typically applied only to preference accumulation, are also assumed to be involved in processing attribute values. This allows the model to perform a range of sophisticated attribute-wise comparisons, including comparisons that compute relative rank. The ability of a preference accumulation model composed of leaky competitive networks to mimic symbolic models of heuristic choice suggests that these 2 approaches are not incompatible, and that a unitary cognitive model of preferential choice, based on insights from both these approaches, may be feasible. PMID:28670592

  19. Multifocus Image Fusion in Q-Shift DTCWT Domain Using Various Fusion Rules

    Directory of Open Access Journals (Sweden)

    Yingzhong Tian

    2016-01-01

    Full Text Available Multifocus image fusion is a process that integrates partially focused image sequence into a fused image which is focused everywhere, with multiple methods proposed in the past decades. The Dual Tree Complex Wavelet Transform (DTCWT is one of the most precise ones eliminating two main defects caused by the Discrete Wavelet Transform (DWT. Q-shift DTCWT was proposed afterwards to simplify the construction of filters in DTCWT, producing better fusion effects. A different image fusion strategy based on Q-shift DTCWT is presented in this work. According to the strategy, firstly, each image is decomposed into low and high frequency coefficients, which are, respectively, fused by using different rules, and then various fusion rules are innovatively combined in Q-shift DTCWT, such as the Neighborhood Variant Maximum Selectivity (NVMS and the Sum Modified Laplacian (SML. Finally, the fused coefficients could be well extracted from the source images and reconstructed to produce one fully focused image. This strategy is verified visually and quantitatively with several existing fusion methods based on a plenty of experiments and yields good results both on standard images and on microscopic images. Hence, we can draw the conclusion that the rule of NVMS is better than others after Q-shift DTCWT.

  20. Current algebra sum rules for Reggeons

    CERN Document Server

    Carlitz, R

    1972-01-01

    The interplay between the constraints of chiral SU/sub 2/*SU/sub 2/ symmetry and Regge asymptotic behaviour is investigated. The author reviews the derivation of various current algebra sum rules in a study of the reaction pi + alpha to pi + beta . These sum rules imply that all particles may be classified in multiplets of SU/sub 2/*SU/sub 2/ and that each of these multiplets may contain linear combinations of an infinite number of physical states. Extending his study to the reaction pi + alpha to pi + pi + beta , he derives new sum rules involving commutators of the axial charge with the reggeon coupling matrices of the rho and f Regge trajectories. Some applications of these new sum rules are noted, and the general utility of these and related sum rules is discussed. (17 refs).

  1. Discovering Sentinel Rules for Business Intelligence

    Science.gov (United States)

    Middelfart, Morten; Pedersen, Torben Bach

    This paper proposes the concept of sentinel rules for multi-dimensional data that warns users when measure data concerning the external environment changes. For instance, a surge in negative blogging about a company could trigger a sentinel rule warning that revenue will decrease within two months, so a new course of action can be taken. Hereby, we expand the window of opportunity for organizations and facilitate successful navigation even though the world behaves chaotically. Since sentinel rules are at the schema level as opposed to the data level, and operate on data changes as opposed to absolute data values, we are able to discover strong and useful sentinel rules that would otherwise be hidden when using sequential pattern mining or correlation techniques. We present a method for sentinel rule discovery and an implementation of this method that scales linearly on large data volumes.

  2. IMPrECISE: Good-is-good-enough Data Integration

    NARCIS (Netherlands)

    Unknown, [Unknown; Koch, C.; König-Ries, B.; Markl, V.; van Keulen, Maurice

    The IMPrECISE system is a probabilistic XML database system which supports near-automatic integration of XML documents. What is required of the user is to configure the system with a few simple knowledge rules allowing the system to sufficiently eliminate nonsense possibilities. We demonstrate the

  3. Drivers of Changes in Product Development Rules

    DEFF Research Database (Denmark)

    Christiansen, John K.; Varnes, Claus J.

    2015-01-01

    regimes. However, the analysis here indicates that there are different drivers, both internal and external, that cause companies to adopt new rules or modify their existing ones, such as changes in organizational structures, organizational conflicts, and changes in ownership or strategy. In addition......Purpose: - The purpose of this research is to investigate the drivers that induce companies to change their rules for managing product development. Most companies use a form of rule-based management approach, but surprisingly little is known about what makes companies change these rules...... 10 years based on three rounds of interviews with 40 managers. Findings: - Previous research has assumed that the dynamics of product development rules are based on internal learning processes, and that increasingly competent management will stimulate the implementation of newer and more complex rule...

  4. A rule-based software test data generator

    Science.gov (United States)

    Deason, William H.; Brown, David B.; Chang, Kai-Hsiung; Cross, James H., II

    1991-01-01

    Rule-based software test data generation is proposed as an alternative to either path/predicate analysis or random data generation. A prototype rule-based test data generator for Ada programs is constructed and compared to a random test data generator. Four Ada procedures are used in the comparison. Approximately 2000 rule-based test cases and 100,000 randomly generated test cases are automatically generated and executed. The success of the two methods is compared using standard coverage metrics. Simple statistical tests showing that even the primitive rule-based test data generation prototype is significantly better than random data generation are performed. This result demonstrates that rule-based test data generation is feasible and shows great promise in assisting test engineers, especially when the rule base is developed further.

  5. 16 CFR 312.8 - Confidentiality, security, and integrity of personal information collected from children.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Confidentiality, security, and integrity of... COMMISSION REGULATIONS UNDER SPECIFIC ACTS OF CONGRESS CHILDREN'S ONLINE PRIVACY PROTECTION RULE § 312.8 Confidentiality, security, and integrity of personal information collected from children. The operator must...

  6. Fuzzylot: a novel self-organising fuzzy-neural rule-based pilot system for automated vehicles.

    Science.gov (United States)

    Pasquier, M; Quek, C; Toh, M

    2001-10-01

    This paper presents part of our research work concerned with the realisation of an Intelligent Vehicle and the technologies required for its routing, navigation, and control. An automated driver prototype has been developed using a self-organising fuzzy rule-based system (POPFNN-CRI(S)) to model and subsequently emulate human driving expertise. The ability of fuzzy logic to represent vague information using linguistic variables makes it a powerful tool to develop rule-based control systems when an exact working model is not available, as is the case of any vehicle-driving task. Designing a fuzzy system, however, is a complex endeavour, due to the need to define the variables and their associated fuzzy sets, and determine a suitable rule base. Many efforts have thus been devoted to automating this process, yielding the development of learning and optimisation techniques. One of them is the family of POP-FNNs, or Pseudo-Outer Product Fuzzy Neural Networks (TVR, AARS(S), AARS(NS), CRI, Yager). These generic self-organising neural networks developed at the Intelligent Systems Laboratory (ISL/NTU) are based on formal fuzzy mathematical theory and are able to objectively extract a fuzzy rule base from training data. In this application, a driving simulator has been developed, that integrates a detailed model of the car dynamics, complete with engine characteristics and environmental parameters, and an OpenGL-based 3D-simulation interface coupled with driving wheel and accelerator/ brake pedals. The simulator has been used on various road scenarios to record from a human pilot driving data consisting of steering and speed control actions associated to road features. Specifically, the POPFNN-CRI(S) system is used to cluster the data and extract a fuzzy rule base modelling the human driving behaviour. Finally, the effectiveness of the generated rule base has been validated using the simulator in autopilot mode.

  7. Master equations and the theory of stochastic path integrals

    Science.gov (United States)

    Weber, Markus F.; Frey, Erwin

    2017-04-01

    them. Upon expanding the forward and the backward path integrals around stationary paths, we then discuss and extend a recent method for the computation of rare event probabilities. Besides, we also derive path integral representations for processes with continuous state spaces whose forward and backward master equations admit Kramers-Moyal expansions. A truncation of the backward expansion at the level of a diffusion approximation recovers a classic path integral representation of the (backward) Fokker-Planck equation. One can rewrite this path integral in terms of an Onsager-Machlup function and, for purely diffusive Brownian motion, it simplifies to the path integral of Wiener. To make this review accessible to a broad community, we have used the language of probability theory rather than quantum (field) theory and do not assume any knowledge of the latter. The probabilistic structures underpinning various technical concepts, such as coherent states, the Doi-shift, and normal-ordered observables, are thereby made explicit.

  8. Master equations and the theory of stochastic path integrals.

    Science.gov (United States)

    Weber, Markus F; Frey, Erwin

    2017-04-01

    expanding the forward and the backward path integrals around stationary paths, we then discuss and extend a recent method for the computation of rare event probabilities. Besides, we also derive path integral representations for processes with continuous state spaces whose forward and backward master equations admit Kramers-Moyal expansions. A truncation of the backward expansion at the level of a diffusion approximation recovers a classic path integral representation of the (backward) Fokker-Planck equation. One can rewrite this path integral in terms of an Onsager-Machlup function and, for purely diffusive Brownian motion, it simplifies to the path integral of Wiener. To make this review accessible to a broad community, we have used the language of probability theory rather than quantum (field) theory and do not assume any knowledge of the latter. The probabilistic structures underpinning various technical concepts, such as coherent states, the Doi-shift, and normal-ordered observables, are thereby made explicit.

  9. Depression-Biased Reverse Plasticity Rule Is Required for Stable Learning at Top-Down Connections

    Science.gov (United States)

    Burbank, Kendra S.; Kreiman, Gabriel

    2012-01-01

    Top-down synapses are ubiquitous throughout neocortex and play a central role in cognition, yet little is known about their development and specificity. During sensory experience, lower neocortical areas are activated before higher ones, causing top-down synapses to experience a preponderance of post-synaptic activity preceding pre-synaptic activity. This timing pattern is the opposite of that experienced by bottom-up synapses, which suggests that different versions of spike-timing dependent synaptic plasticity (STDP) rules may be required at top-down synapses. We consider a two-layer neural network model and investigate which STDP rules can lead to a distribution of top-down synaptic weights that is stable, diverse and avoids strong loops. We introduce a temporally reversed rule (rSTDP) where top-down synapses are potentiated if post-synaptic activity precedes pre-synaptic activity. Combining analytical work and integrate-and-fire simulations, we show that only depression-biased rSTDP (and not classical STDP) produces stable and diverse top-down weights. The conclusions did not change upon addition of homeostatic mechanisms, multiplicative STDP rules or weak external input to the top neurons. Our prediction for rSTDP at top-down synapses, which are distally located, is supported by recent neurophysiological evidence showing the existence of temporally reversed STDP in synapses that are distal to the post-synaptic cell body. PMID:22396630

  10. Depression-biased reverse plasticity rule is required for stable learning at top-down connections.

    Directory of Open Access Journals (Sweden)

    Kendra S Burbank

    Full Text Available Top-down synapses are ubiquitous throughout neocortex and play a central role in cognition, yet little is known about their development and specificity. During sensory experience, lower neocortical areas are activated before higher ones, causing top-down synapses to experience a preponderance of post-synaptic activity preceding pre-synaptic activity. This timing pattern is the opposite of that experienced by bottom-up synapses, which suggests that different versions of spike-timing dependent synaptic plasticity (STDP rules may be required at top-down synapses. We consider a two-layer neural network model and investigate which STDP rules can lead to a distribution of top-down synaptic weights that is stable, diverse and avoids strong loops. We introduce a temporally reversed rule (rSTDP where top-down synapses are potentiated if post-synaptic activity precedes pre-synaptic activity. Combining analytical work and integrate-and-fire simulations, we show that only depression-biased rSTDP (and not classical STDP produces stable and diverse top-down weights. The conclusions did not change upon addition of homeostatic mechanisms, multiplicative STDP rules or weak external input to the top neurons. Our prediction for rSTDP at top-down synapses, which are distally located, is supported by recent neurophysiological evidence showing the existence of temporally reversed STDP in synapses that are distal to the post-synaptic cell body.

  11. An Association Rule Based Method to Integrate Metro-Public Bicycle Smart Card Data for Trip Chain Analysis

    Directory of Open Access Journals (Sweden)

    De Zhao

    2018-01-01

    Full Text Available Smart card data provide valuable insights and massive samples for enhancing the understanding of transfer behavior between metro and public bicycle. However, smart cards for metro and public bicycle are often issued and managed by independent companies and this results in the same commuter having different identity tags in the metro and public bicycle smart card systems. The primary objective of this study is to develop a data fusion methodology for matching metro and public bicycle smart cards for the same commuter using historical smart card data. A novel method with association rules to match the data derived from the two systems is proposed and validation was performed. The results showed that our proposed method successfully matched 573 pairs of smart cards with an accuracy of 100%. We also validated the association rules method through visualization of individual metro and public bicycle trips. Based on the matched cards, interesting findings of metro-bicycle transfer have been derived, including the spatial pattern of the public bicycle as first/last mile solution as well as the duration of a metro trip chain.

  12. Proving termination of graph transformation systems using weighted type graphs over semirings

    NARCIS (Netherlands)

    Bruggink, H.J.S.; König, B.; Nolte, D.; Zantema, H.; Parisi-Presicce, F.; Westfechtel, B.

    2015-01-01

    We introduce techniques for proving uniform termination of graph transformation systems, based on matrix interpretations for string rewriting. We generalize this technique by adapting it to graph rewriting instead of string rewriting and by generalizing to ordered semirings. In this way we obtain a

  13. Robert's rules of order

    CERN Document Server

    Robert, Henry M; Balch, Thomas J; Seabold, Daniel E; Gerber, Shmuel

    2011-01-01

    The only authorized edition of the classic work on parliamentary procedure, with new and enhanced features, including how to conduct electronic meetings. Robert's Rules of Order is the book on parliamentary procedure for parliamentarians and anyone involved in an organization, association, club, or group and the authoritative guide to smooth, orderly, and fairly conducted meetings and assemblies. This newly revised edition is the only book on parliamentary procedure to have been updated since 1876 under the continuing program of review established by General Henry M. Robert himself, in cooperation with the official publisher of Robert's Rules. The eleventh edition has been thoroughly revised to address common inquiries and incorporate new rules, interpretations, and procedures made necessary by the evolution of parliamentary procedure, including new material relating to electronic communication and "electronic meetings."

  14. The rule of law

    Directory of Open Access Journals (Sweden)

    Besnik Murati

    2015-07-01

    Full Text Available The state as an international entity and its impact on the individual’s right has been and still continues to be a crucial factor in the relationship between private and public persons. States vary in terms of their political system, however, democratic states are based on the separation of powers and human rights within the state. Rule of law is the product of many actors in a state, including laws, individuals, society, political system, separation of powers, human rights, the establishment of civil society, the relationship between law and the individual, as well as, individual-state relations. Purpose and focus of this study is the importance of a functioning state based on law, characteristics of the rule of law, separation of powers and the basic concepts of the rule of law.

  15. The research on business rules classification and specification methods

    OpenAIRE

    Baltrušaitis, Egidijus

    2005-01-01

    The work is based on the research of business rules classification and specification methods. The basics of business rules approach are discussed. The most common business rules classification and modeling methods are analyzed. Business rules modeling techniques and tools for supporting them in the information systems are presented. Basing on the analysis results business rules classification method is proposed. Templates for every business rule type are presented. Business rules structuring ...

  16. 76 FR 64803 - Rules of Adjudication and Enforcement

    Science.gov (United States)

    2011-10-19

    ... INTERNATIONAL TRADE COMMISSION 19 CFR Part 210 [Docket No. MISC-032] Rules of Adjudication and Enforcement AGENCY: International Trade Commission ACTION: Final rule. SUMMARY: The United States International Trade Commission (``Commission'') amends its Rules of Practice and Procedure concerning rules of...

  17. Class Association Rule Pada Metode Associative Classification

    Directory of Open Access Journals (Sweden)

    Eka Karyawati

    2011-11-01

    Full Text Available Frequent patterns (itemsets discovery is an important problem in associative classification rule mining.  Differents approaches have been proposed such as the Apriori-like, Frequent Pattern (FP-growth, and Transaction Data Location (Tid-list Intersection algorithm. This paper focuses on surveying and comparing the state of the art associative classification techniques with regards to the rule generation phase of associative classification algorithms.  This phase includes frequent itemsets discovery and rules mining/extracting methods to generate the set of class association rules (CARs.  There are some techniques proposed to improve the rule generation method.  A technique by utilizing the concepts of discriminative power of itemsets can reduce the size of frequent itemset.  It can prune the useless frequent itemsets. The closed frequent itemset concept can be utilized to compress the rules to be compact rules.  This technique may reduce the size of generated rules.  Other technique is in determining the support threshold value of the itemset. Specifying not single but multiple support threshold values with regard to the class label frequencies can give more appropriate support threshold value.  This technique may generate more accurate rules. Alternative technique to generate rule is utilizing the vertical layout to represent dataset.  This method is very effective because it only needs one scan over dataset, compare with other techniques that need multiple scan over dataset.   However, one problem with these approaches is that the initial set of tid-lists may be too large to fit into main memory. It requires more sophisticated techniques to compress the tid-lists.

  18. Decision Mining Revisited – Discovering Overlapping Rules

    NARCIS (Netherlands)

    Mannhardt, F.; de Leoni, M.; Reijers, H.A.; van der Aalst, W.M.P.

    2016-01-01

    Decision mining enriches process models with rules underlying decisions in processes using historical process execution data. Choices between multiple activities are specified through rules defined over process data. Existing decision mining methods focus on discovering mutually-exclusive rules,

  19. QCD Sum Rules, a Modern Perspective

    CERN Document Server

    Colangelo, Pietro; Colangelo, Pietro; Khodjamirian, Alexander

    2001-01-01

    An introduction to the method of QCD sum rules is given for those who want to learn how to use this method. Furthermore, we discuss various applications of sum rules, from the determination of quark masses to the calculation of hadronic form factors and structure functions. Finally, we explain the idea of the light-cone sum rules and outline the recent development of this approach.

  20. “Invading Your Hearts and Minds”: Call of Duty®and the (ReWriting of Militarism in U.S. Digital Games and Popular Culture

    Directory of Open Access Journals (Sweden)

    Frédérick Gagnon 1

    2010-11-01

    Full Text Available The goal of this article is to discuss how digital war games such as the Call of Duty series elicit consent for the U.S. military, militarism and the wars waged by the U.S. and its allies abroad. Building bridges between the humanities approach to Game Studies, American Studies, International Relations and Critical Geopolitics, we start from the assumption that digital games are more than “kid’s games”; they are sophisticated vehicles inhabiting and disseminating specific ideologies (Leonard 2004. Accordingly, our goal is to conduct a content analysis (Sisler 2008 of Call of Duty 4: Modern Warfare and Call of Duty: Modern Warfare 2 to show how these games contain images and narratives that (1 resonate with and reinforce a tabloid imaginary of post-9/11 geopolitics (Debrix 2008; (2 glorify military power and elicit consent for the idea that state violence and wars are inevitable; and (3 encourage our myopia by depicting a sanitized vision of war and downplaying the negative consequences of state violence (Stahl 2006. The conclusion invites players to think about ways to criticize the way games like Call of Duty employ and deploy values that (rewrite the militarist mindset that has often pervaded the post-9/11 U.S. national security debate.