WorldWideScience

Sample records for projective embedding proof

  1. Embedded Linux projects using Yocto project cookbook

    CERN Document Server

    González, Alex

    2015-01-01

    If you are an embedded developer learning about embedded Linux with some experience with the Yocto project, this book is the ideal way to become proficient and broaden your knowledge with examples that are immediately applicable to your embedded developments. Experienced embedded Yocto developers will find new insight into working methodologies and ARM specific development competence.

  2. The embedded operating system project

    Science.gov (United States)

    Campbell, R. H.

    1984-01-01

    This progress report describes research towards the design and construction of embedded operating systems for real-time advanced aerospace applications. The applications concerned require reliable operating system support that must accommodate networks of computers. The report addresses the problems of constructing such operating systems, the communications media, reconfiguration, consistency and recovery in a distributed system, and the issues of realtime processing. A discussion is included on suitable theoretical foundations for the use of atomic actions to support fault tolerance and data consistency in real-time object-based systems. In particular, this report addresses: atomic actions, fault tolerance, operating system structure, program development, reliability and availability, and networking issues. This document reports the status of various experiments designed and conducted to investigate embedded operating system design issues.

  3. The embedded operating system project

    Science.gov (United States)

    Campbell, R. H.

    1985-01-01

    The design and construction of embedded operating systems for real-time advanced aerospace applications was investigated. The applications require reliable operating system support that must accommodate computer networks. Problems that arise in the construction of such operating systems, reconfiguration, consistency and recovery in a distributed system, and the issues of real-time processing are reported. A thesis that provides theoretical foundations for the use of atomic actions to support fault tolerance and data consistency in real-time object-based system is included. The following items are addressed: (1) atomic actions and fault-tolerance issues; (2) operating system structure; (3) program development; (4) a reliable compiler for path Pascal; and (5) mediators, a mechanism for scheduling distributed system processes.

  4. A direct proof of Sobolev embeddings for Triebel-Lizorkin spaces, including mixed norms and quasi-homogeneity

    DEFF Research Database (Denmark)

    Johnsen, Jon

    The article deals with a simplified proof of the Sobolev embedding theorem for Triebel-Lizorkin spaces (that contain the $L_p$-Sobolev spaces $H^s_p$ as special cases). The method extends to a proof of the corresponding fact for general Triebel–Lizorkin spaces based on mixed $L_p$-norms...

  5. Proof-of-concept experimental study of damage detection of concrete piles using embedded piezoceramic transducers

    International Nuclear Information System (INIS)

    Wang, R L; Gu, H; Song, G; Mo, Y L

    2013-01-01

    This paper presents a proof-of-concept experimental study of an innovative active-sensing approach for damage detection of concrete piles by using embedded piezoceramic transducers. In the proposed active-sensing approach, one piezoceramic transducer is used as an actuator to generate a stress wave to propagate through the concrete pile and the other distributed piezoceramic transducers are used as sensors to detect the wave response. Cracks or damage inside the concrete structure act as stress relief in the wave propagation path. The amplitude of the wave and the transmission energy will decrease due to the existence of cracks or damage. Experiments were performed on two bored piles instrumented with embedded piezoceramic transducers. The experimental results demonstrate the effectiveness of the proposed approach for pile damage detection. (fast track communication)

  6. Projective embeddings of homogeneous spaces with small boundary

    International Nuclear Information System (INIS)

    Arzhantsev, Ivan V

    2009-01-01

    We study open equivariant projective embeddings of homogeneous spaces such that the complement of the open orbit has codimension at least 2. We establish a criterion for the existence of such an embedding, prove that the set of isomorphism classes of such embeddings is finite, and give a construction of the embeddings in terms of Geometric Invariant Theory. A generalization of Cox's construction and the theory of bunched rings enable us to describe in combinatorial terms the basic geometric properties of embeddings with small boundary

  7. Stack monitor for the Proof-of-Breeding Project

    International Nuclear Information System (INIS)

    Fergus, R.W.

    1985-01-01

    This stack monitor system is a coordinated arrangement of hardware and software to monitor four hot cells (8 stacks) during the fuel dissection for the Proof-of-Breeding Project. The cell monitors, which are located in fan lofts, contain a microprocessor, radiation detectors, air flow sensors, and air flow control equipment. Design criteria included maximizing microprocessor control while minimizing the hardware complexity. The monitors have been programmed to produce concentration and total activity release data based on several detector measurements and flow rates. Although each monitor can function independently, a microcomputer can also be used to control each cell monitor including reprogramming if necessary. All programming is software, as opposed to firmware, with machine language for compactness in the cell monitors and Basic language for adaptability in the microcomputer controller

  8. Evaluation of predator-proof fenced biodiversity projects

    OpenAIRE

    Doelle, Sebastian

    2012-01-01

    There has been recent debate over the role of predator-proof fences in the management of New Zealand’s biodiversity. The debate has arisen due to concern that investments in fenced sanctuaries are less productive than are alternative ways to manage biodiversity. Predator-proof fences are costly and budget constraints limit the area of habitat that can be fenced. The area of habitat enclosed within fences, and number of individuals of species supported, determines project’s ability to contribu...

  9. Proof of Concept: Iraqi Enrollment via Voice Authentication Project

    National Research Council Canada - National Science Library

    Lee, Samuel K

    2005-01-01

    ...). The IEVAP is an Office of the Secretary of Defense sponsored research project commissioned to study the feasibility of speaker verification technology in support of the Global War on Terrorism security requirements...

  10. Pre-service proof pressure and leak rate tests for the Qinshan CANDU project reactor buildings

    International Nuclear Information System (INIS)

    Petrunik, K.J.; Khan, A.; Ricciuti, R.; Ivanov, A.; Chen, S.

    2003-01-01

    The Qinshan CANDU Project Reactor Buildings (Units 1 and 2) have been successfully tested for the Pre-Service Proof Pressure and Integrated Leak Rate Tests. The Unit 1 tests took place from May 3 to May 9, 2002 and from May 22 to May 25, 2002, and the Unit 2 tests took place from January 21 to January 27, 2003. This paper discusses the significant steps taken at minimum cost on the Qinshan CANDU Project, which has resulted in a) very good leak rate (0.21%) for Unit 1 and excellent leak rate (0.130%) for Unit 2; b) continuous monitoring of the structural behaviour during the Proof Pressure Test, thus eliminating any repeat of the structural test due to lack of data; and c) significant schedule reduction achieved for these tests in Unit 2. (author)

  11. A Project-Based Laboratory for Learning Embedded System Design with Industry Support

    Science.gov (United States)

    Lee, Chyi-Shyong; Su, Juing-Huei; Lin, Kuo-En; Chang, Jia-Hao; Lin, Gu-Hong

    2010-01-01

    A project-based laboratory for learning embedded system design with support from industry is presented in this paper. The aim of this laboratory is to motivate students to learn the building blocks of embedded systems and practical control algorithms by constructing a line-following robot using the quadratic interpolation technique to predict the…

  12. GIS embedded hydrological modeling: the SID&GRID project

    Science.gov (United States)

    Borsi, I.; Rossetto, R.; Schifani, C.

    2012-04-01

    The SID&GRID research project, started April 2010 and funded by Regione Toscana (Italy) under the POR FSE 2007-2013, aims to develop a Decision Support System (DSS) for water resource management and planning based on open source and public domain solutions. In order to quantitatively assess water availability in space and time and to support the planning decision processes, the SID&GRID solution consists of hydrological models (coupling 3D existing and newly developed surface- and ground-water and unsaturated zone modeling codes) embedded in a GIS interface, applications and library, where all the input and output data are managed by means of DataBase Management System (DBMS). A graphical user interface (GUI) to manage, analyze and run the SID&GRID hydrological models based on open source gvSIG GIS framework (Asociación gvSIG, 2011) and a Spatial Data Infrastructure to share and interoperate with distributed geographical data is being developed. Such a GUI is thought as a "master control panel" able to guide the user from pre-processing spatial and temporal data, running the hydrological models, and analyzing the outputs. To achieve the above-mentioned goals, the following codes have been selected and are being integrated: 1. Postgresql/PostGIS (PostGIS, 2011) for the Geo Data base Management System; 2. gvSIG with Sextante (Olaya, 2011) geo-algorithm library capabilities and Grass tools (GRASS Development Team, 2011) for the desktop GIS; 3. Geoserver and Geonetwork to share and discover spatial data on the web according to Open Geospatial Consortium; 4. new tools based on the Sextante GeoAlgorithm framework; 5. MODFLOW-2005 (Harbaugh, 2005) groundwater modeling code; 6. MODFLOW-LGR (Mehl and Hill 2005) for local grid refinement; 7. VSF (Thoms et al., 2006) for the variable saturated flow component; 8. new developed routines for overland flow; 9. new algorithms in Jython integrated in gvSIG to compute the net rainfall rate reaching the soil surface, as input for

  13. Project-Based Learning to Enhance Teaching Embedded Systems

    Science.gov (United States)

    Sababha, Belal H.; Alqudah, Yazan A.; Abualbasal, Abdelraheem; AlQaralleh, Esam A.

    2016-01-01

    Exposing engineering students during their education to real-world problems and giving them the chance to apply what they learn in the classroom is a vital element of engineering education. The Embedded Systems course at Princess Sumaya University for Technology (PSUT) is one of the main courses that bridge the gap between theoretical electrical…

  14. Evaluation of Embedded System Component Utilized in Delivery Integrated Design Project Course

    Science.gov (United States)

    Junid, Syed Abdul Mutalib Al; Hussaini, Yusnira; Nazmie Osman, Fairul; Razak, Abdul Hadi Abdul; Idros, Mohd Faizul Md; Karimi Halim, Abdul

    2018-03-01

    This paper reports the evaluation of the embedded system component utilized in delivering the integrated electronic engineering design project course. The evaluation is conducted based on the report project submitted as to fulfil the assessment criteria for the integrated electronic engineering design project course named; engineering system design. Six projects were assessed in this evaluation. The evaluation covers the type of controller, programming language and the number of embedded component utilization as well. From the evaluation, the C-programming based language is the best solution preferred by the students which provide them flexibility in the programming. Moreover, the Analog to Digital converter is intensively used in the projects which include sensors in their proposed design. As a conclusion, in delivering the integrated design project course, the knowledge over the embedded system solution is very important since the high density of the knowledge acquired in accomplishing the project assigned.

  15. Final report SmartProofS. Results of projects of the SmartProofS program; Eindrapport SmartProofS. Projectresultaten van het SmartProofS programma

    Energy Technology Data Exchange (ETDEWEB)

    Van Hoorik, P.; Westerga, R. [Energy Valley, Groningen (Netherlands)

    2011-05-15

    The SmartProofs program aims to develop tools which must show that the principle of a Smart Power System (SPS) works and how. An SPS can ensure that the supply and demand of electricity in the grid is balanced, even in case more decentralized energy techniques will be put into use. This final report summarizes the main results and conclusions of the SmartProofs program. As part of the SPS program attention is paid to the impacts on the girds, the effects of centralized and decentralized management, disaster resilience, pricing models, potential benefits of control and new business models [Dutch] Het SmartProofs programma heeft tot doel om een concept van een Smart Power System (SPS) te ontwikkelen waarmee kan worden aangetoond dat het principe van een SPS werkt en op welke manier. Een SPS kan zorgen dat het aanbod van elektriciteit op het net op elk moment van de dag overeenkomt met de vraag, ook als er straks veel meer decentrale energietechnieken gebruikt worden waarmee zowel de vraag als het aanbod van elektriciteit onvoorspelbaar wordt. Dit eindrapport geeft een overzicht van de belangrijkste resultaten en conclusies van het SmartProofs programma. Het programma heeft in de werkpakketten deelvraagstukken rondom SmartProofS onderzocht rondom de effecten op onze energienetten, de effecten van zowel centrale- als decentrale aansturing, disaster resilience, prijsmodellen, mogelijke baten van aansturing en nieuwe business modellen.

  16. Transforming Roles: Canadian Academic Librarians Embedded in Faculty Research Projects

    Science.gov (United States)

    Bedi, Shailoo; Waldie, Christine

    2017-01-01

    Academic librarians have always played an important role in providing research services and research-skills development to faculty in higher education. But that role is evolving to include the academic librarian as a unique and necessary research partner, practitioner, and participant in collaborative, grant-funded research projects. This article…

  17. The approximate Loebl-Komlós-Sós Conjecture IV: Embedding techniques and the proof of the main result

    Czech Academy of Sciences Publication Activity Database

    Hladký, Jan; Komlós, J.; Piguet, Diana; Simonovits, M.; Stein, M.; Szemerédi, E.

    2017-01-01

    Roč. 31, č. 2 (2017), s. 1072-1148 ISSN 0895-4801 R&D Projects: GA MŠk(CZ) 1M0545 EU Projects: European Commission(XE) 628974 - PAECIDM Institutional support: RVO:67985840 ; RVO:67985807 Keywords : extremal graph theory * Loebl–Komlós–Sós conjecture * regularity lemma Subject RIV: BA - General Mathematics; BA - General Mathematics (UIVT-O) OBOR OECD: Pure mathematics; Pure mathematics (UIVT-O) Impact factor: 0.755, year: 2016 http://epubs.siam.org/doi/10.1137/140982878

  18. The approximate Loebl-Komlós-Sós Conjecture IV: Embedding techniques and the proof of the main result

    Czech Academy of Sciences Publication Activity Database

    Hladký, Jan; Komlós, J.; Piguet, Diana; Simonovits, M.; Stein, M.; Szemerédi, E.

    2017-01-01

    Roč. 31, č. 2 (2017), s. 1072-1148 ISSN 0895-4801 R&D Projects: GA MŠk(CZ) 1M0545 EU Projects: European Commission(XE) 628974 - PAECIDM Institutional support: RVO:67985840 ; RVO:67985807 Keywords : extremal graph theory * Loebl–Komlós–Sós conjecture * regularity lemma Subject RIV: BA - General Mathematics ; BA - General Mathematics (UIVT-O) OBOR OECD: Pure mathematics ; Pure mathematics (UIVT-O) Impact factor: 0.755, year: 2016 http://epubs.siam.org/doi/10.1137/140982878

  19. Implicit proofs

    Czech Academy of Sciences Publication Activity Database

    Krajíček, Jan

    2004-01-01

    Roč. 69, č. 2 (2004), s. 387-397 ISSN 0022-4812 R&D Projects: GA AV ČR IAA1019901; GA MŠk LN00A056 Institutional research plan: CEZ:AV0Z1019905 Keywords : propositional proof system s * circuits * polynomial simulation Subject RIV: BA - General Mathematics Impact factor: 0.331, year: 2004

  20. Can openEHR archetypes be used in a national context? The Danish archetype proof-of-concept project.

    Science.gov (United States)

    Bernstein, Knut; Tvede, Ida; Petersen, Jan; Bredegaard, Kirsten

    2009-01-01

    Semantic interoperability and secondary use of data are important informatics challenges in modern healthcare. Connected Digital Health Denmark is investigating if the openEHR reference model, archetypes and templates could be used for representing and exchanging clinical content specification and could become a candidate for a national logical infrastructure for semantic interoperability. The Danish archetype proof-of-concept project has tried out some elements of the openEHR methodology in cooperation with regions and vendors. The project has pointed out benefits and challenges using archetypes, and has identified barriers that need to be addressed in the next steps.

  1. Craft-Joule Project: Stagnation proof transparently insulated flat plate solar collector (static)

    Energy Technology Data Exchange (ETDEWEB)

    Oliva, A; Cadafalch, J; Perez-Segarra, C.D. [Universitat Politecnica de Catalunya, Barcelona (Spain)] (and others)

    2000-07-01

    The STATIC (STAgnation proof Transparently Insulated flat plate Solar Collector) project is a Craft-Joule Project within the framework of the Non Nuclear Energy Programme Joule III coordinated by the Centre Technologic de Transferencia de Calor (CTTC). The core group of SMEs involved in the project has its main economical activity in the field of solar thermal systems at low temperature level (domestic hot water, solar heating, etc.). Beyond this, a large application potential exists for solar heating at medium temperature level (from 80 to 160 Celsius degrees) : industrial process heat, solar cooling and air conditioning, solar drying , distillation and desalination. Three of the four SME proposers are located in Southern Europe and in the Caribean, where a continuos increase of the demand for air conditioning and cooling has been demonstrated in the last years. The recent development of flat plate solar collectors with honeycomb-type transparent insulation cover has shown that this type of collectors can become a low cost alternative to evacuated tube and high concentrating CPC collectors in the medium temperature range from 80 to 160 Celsius degrees. With the expected reduction of collector cost, that forms 30%-50% of total system cost, a decisive break-through of solar thermal systems using heat in the medium temperature range can be achieved. The feasibility and good performance of these solar collectors has been proved in several prototypes. Nevertheless, up to now no commercial products are available. In order to reach this, the following developments of new concepts are necessary and are being carried out within this project: solution of the problem of overheating: development of collector versions for different working temperatures: optimization of the design with the support of high level numerical simulation. Several prototypes of the new solar collectors are being tested. System tests will also be carried or for two test arrays of optimized collector

  2. A Domain Specific Embedded Language in C++ for Automatic Differentiation, Projection, Integration and Variational Formulations

    Directory of Open Access Journals (Sweden)

    Christophe Prud'homme

    2006-01-01

    Full Text Available In this article, we present a domain specific embedded language in C++ that can be used in various contexts such as numerical projection onto a functional space, numerical integration, variational formulations and automatic differentiation. Albeit these tools operate in different ways, the language overcomes this difficulty by decoupling expression constructions from evaluation. The language is implemented using expression templates and meta-programming techniques and uses various Boost libraries. The language is exercised on a number of non-trivial examples and a benchmark presents the performance behavior on a few test problems.

  3. Timing Sunsets with Smartphones: Proof of Concept for a Citizen Science Project that Quantifies the Atmosphere and Supports Astronomical Observations

    Science.gov (United States)

    Wilson, Teresa; Kantamneni, A.; Bartlett, J. L.; Nemiroff, R. J.

    2014-01-01

    Current models that predict the times of sunrise and sunset are only accurate, typically, to a few minutes. Variations in atmospheric refraction contribute to the differences between computed and observed times. At high latitudes, slight changes in refraction can cause the Sun to remain continuously above the horizon instead of appearing to set. A substantial collection of observations would help constrain atmospheric models, which should, in turn, complement astronomical observations through improved understanding of air stability, refraction, and transparency. We report on a small project recording data from a few smartphones as a proof of concept for a possible larger scale citizen science effort.

  4. Valuation of investment projects by an international oil company: a new proof of a straightforward, rigorous method

    International Nuclear Information System (INIS)

    Pierru, A.; Babusiaux, D.

    2009-02-01

    The problem studied is that of valuing investment projects of an international oil company subject to tax schemes that vary from one country to another. The existing disparities in the tax treatment of interest paid can lead the firm to seek an optimal allocation of its debt capacity among the various projects. In this context, the generalized ATWACC (After-Tax Weighted Average Cost of Capital) method presents numerous advantages over standard methods and is particularly well suited to the valuation of oil-field development projects where debt financing differs from the amount that would correspond to the debt ratio targeted by the firm at the corporate scale. In this paper, we discuss adapting the generalized ATWACC method to the specificities of the oil industry and offer new proof of its validity, based on a model that maximizes, under constraints, the firm's equity value. (authors)

  5. Report for slot cutter proof-of-principle test, Buried Waste Containment System project. Revision 1

    International Nuclear Information System (INIS)

    1998-01-01

    Several million cubic feet of hazardous and radioactive waste was buried in shallow pits and trenches within many US Department of Energy (US DOE) sites. The pits and trenches were constructed similarly to municipal landfills with both stacked and random dump waste forms such as barrels and boxes. Many of the hazardous materials in these waste sites are migrating into groundwater systems through plumes and leaching. On-site containment is one of the options being considered for prevention of waste migration. This report describes the results of a proof-of-principle test conducted to demonstrate technology for containing waste. This proof-of-principle test, conducted at the RAHCO International, Inc., facility in the summer of 1997, evaluated equipment techniques for cutting a horizontal slot beneath an existing waste site. The slot would theoretically be used by complementary equipment designed to place a cement barrier under the waste. The technology evaluated consisted of a slot cutting mechanism, muck handling system, thrust system, and instrumentation. Data were gathered and analyzed to evaluate the performance parameters

  6. Report for slot cutter proof-of-principle test, Buried Waste Containment System project. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-05-21

    Several million cubic feet of hazardous and radioactive waste was buried in shallow pits and trenches within many US Department of Energy (US DOE) sites. The pits and trenches were constructed similarly to municipal landfills with both stacked and random dump waste forms such as barrels and boxes. Many of the hazardous materials in these waste sites are migrating into groundwater systems through plumes and leaching. On-site containment is one of the options being considered for prevention of waste migration. This report describes the results of a proof-of-principle test conducted to demonstrate technology for containing waste. This proof-of-principle test, conducted at the RAHCO International, Inc., facility in the summer of 1997, evaluated equipment techniques for cutting a horizontal slot beneath an existing waste site. The slot would theoretically be used by complementary equipment designed to place a cement barrier under the waste. The technology evaluated consisted of a slot cutting mechanism, muck handling system, thrust system, and instrumentation. Data were gathered and analyzed to evaluate the performance parameters.

  7. Climatescan.nl: the development of a web-based map application to encourage knowledge-sharing of climate-proofing and urban resilient projects

    NARCIS (Netherlands)

    Tipping, Jonathan; Boogaard, Floris; Jaeger, R.; Duffy, A.; Klomp, T.; Manenschijn, M.

    2015-01-01

    Over recent years, there has been an explosion in the number and diversity of projects undertaken to address urban resilience and climate proofing. Sharing the knowledge gained from these projects demands increasingly innovative and accessible methods. This paper details the outcomes of one such

  8. Final report for the Light Water Breeder Reactor proof-of-breeding analytical support project

    Energy Technology Data Exchange (ETDEWEB)

    Graczyk, D.G.; Hoh, J.C.; Martino, F.J.; Nelson, R.E.; Osudar, J.; Levitz, N.M.

    1987-05-01

    The technology of breeding /sup 233/U from /sup 232/Th in a light water reactor is being developed and evaluated by the Westinghouse Bettis Atomic Power Laboratory (BAPL) through operation and examination of the Shippingport Light Water Breeder Reactor (LWBR). Bettis is determining the end-of-life (EOL) inventory of fissile uranium in the LWBR core by nondestructive assay of a statistical sample comprising approximately 500 EOL fuel rods. This determination is being made with an irradiated-fuel assay gauge based on neutron interrogation and detection of delayed neutrons from each rod. The EOL fissile inventory will be compared with the beginning-of-life fissile loading of the LWBR to determine the extent of breeding. In support of the BAPL proof-of-breeding (POB) effort, Argonne National Laboratory (ANL) carried out destructive physical, chemical, and radiometric analyses on 17 EOL LWBR fuel rods that were previously assayed with the nondestructive gauge. The ANL work included measurements on the intact rods; shearing of the rods into pre-designated contiguous segments; separate dissolution of each of the more than 150 segments; and analysis of the dissolver solutions to determine each segment's uranium content, uranium isotopic composition, and loading of selected fission products. This report describes the facilities in which this work was carried out, details operations involved in processing each rod, and presents a comprehensive discussion of uncertainties associated with each result of the ANL measurements. Most operations were carried out remotely in shielded cells. Automated equipment and procedures, controlled by a computer system, provided error-free data acquisition and processing, as well as full replication of operations with each rod. Despite difficulties that arose during processing of a few rod segments, the ANL destructive-assay results satisfied the demanding needs of the parent LWBR-POB program.

  9. Final report for the Light Water Breeder Reactor proof-of-breeding analytical support project

    International Nuclear Information System (INIS)

    Graczyk, D.G.; Hoh, J.C.; Martino, F.J.; Nelson, R.E.; Osudar, J.; Levitz, N.M.

    1987-05-01

    The technology of breeding 233 U from 232 Th in a light water reactor is being developed and evaluated by the Westinghouse Bettis Atomic Power Laboratory (BAPL) through operation and examination of the Shippingport Light Water Breeder Reactor (LWBR). Bettis is determining the end-of-life (EOL) inventory of fissile uranium in the LWBR core by nondestructive assay of a statistical sample comprising approximately 500 EOL fuel rods. This determination is being made with an irradiated-fuel assay gauge based on neutron interrogation and detection of delayed neutrons from each rod. The EOL fissile inventory will be compared with the beginning-of-life fissile loading of the LWBR to determine the extent of breeding. In support of the BAPL proof-of-breeding (POB) effort, Argonne National Laboratory (ANL) carried out destructive physical, chemical, and radiometric analyses on 17 EOL LWBR fuel rods that were previously assayed with the nondestructive gauge. The ANL work included measurements on the intact rods; shearing of the rods into pre-designated contiguous segments; separate dissolution of each of the more than 150 segments; and analysis of the dissolver solutions to determine each segment's uranium content, uranium isotopic composition, and loading of selected fission products. This report describes the facilities in which this work was carried out, details operations involved in processing each rod, and presents a comprehensive discussion of uncertainties associated with each result of the ANL measurements. Most operations were carried out remotely in shielded cells. Automated equipment and procedures, controlled by a computer system, provided error-free data acquisition and processing, as well as full replication of operations with each rod. Despite difficulties that arose during processing of a few rod segments, the ANL destructive-assay results satisfied the demanding needs of the parent LWBR-POB program

  10. EOS: A project to investigate the design and construction of real-time distributed Embedded Operating Systems

    Science.gov (United States)

    Campbell, R. H.; Essick, Ray B.; Johnston, Gary; Kenny, Kevin; Russo, Vince

    1987-01-01

    Project EOS is studying the problems of building adaptable real-time embedded operating systems for the scientific missions of NASA. Choices (A Class Hierarchical Open Interface for Custom Embedded Systems) is an operating system designed and built by Project EOS to address the following specific issues: the software architecture for adaptable embedded parallel operating systems, the achievement of high-performance and real-time operation, the simplification of interprocess communications, the isolation of operating system mechanisms from one another, and the separation of mechanisms from policy decisions. Choices is written in C++ and runs on a ten processor Encore Multimax. The system is intended for use in constructing specialized computer applications and research on advanced operating system features including fault tolerance and parallelism.

  11. Innovation in POPBL teaching and learning methods by embedding individual activities as an integrated part of project work

    DEFF Research Database (Denmark)

    Moesby, Egon; W., Hans Henrik; Kørnøv, Lone

    2005-01-01

    activity embedded as an integrated part of the project work. Students work in the solution phase of the project on an individual activity that is separately assessed. The results of these individual activities form the platform for students’ final work with the project as a team. They have to evaluate......In this paper, the authors describe a way to increase student learning through social constructed teamwork by adding an individual activity to the project work. This can be achieved not just by adding an individual activity outside or parallel to the project work, but by having the individual...... the individual solutions and find the one solution to work on in the final phases of the project. On top of that, it helps train students’ abilities to make evaluations among various solutions of which one is their own, thereby learning how to evaluate their personal solutions against another person’s solutions...

  12. Pacific CRYSTAL Project: Explicit Literacy Instruction Embedded in Middle School Science Classrooms

    Science.gov (United States)

    Anthony, Robert J.; Tippett, Christine D.; Yore, Larry D.

    2010-01-01

    Science literacy leading to fuller and informed participation in the public debate about science, technology, society, and environmental (STSE) issues that produce justified decisions and sustainable actions is the shared and central goal of the Pacific CRYSTAL Project. There is broad agreement by science education researchers that learners need to be able to construct and interpret specific scientific discourses and texts to be literate in science. We view these capabilities as components in the fundamental sense of science literacy and as interactive and synergetic to the derived sense of science literacy, which refers to having general knowledge about concepts, principles, and methods of science. This article reports on preliminary findings from Years 1, 2, and 3 of the 5-year Pacific CRYSTAL project that aims to identify, develop, and embed explicit literacy instruction in science programs to achieve both senses of science literacy. A community-based, opportunistic, engineering research and development approach has been utilized to identify problems and concerns and to design instructional solutions for teaching middle school (Grades 6, 7, and 8) science. Initial data indicate (a) opportunities in programs for embedding literacy instruction and tasks; (b) difficulties generalist teachers have with new science curricula; (c) difficulties specialist science teachers have with literacy activities, strategies, genre, and writing-to-learn science tasks; and (d) potential literacy activities (vocabulary, reading comprehension, visual literacy, genre, and writing tasks) for middle school science. Preinstruction student assessments indicate a range of challenges in achieving effective learning in science and the need for extensive teacher support to achieve the project’s goals. Postinstructional assessments indicate positive changes in students’ ability to perform target reading and writing tasks. Qualitative data indicate teachers’ desire for external direction

  13. Feasibility of using tissue microarray cores of paraffin-embedded breast cancer tissue for measurement of gene expression: a proof-of-concept study.

    Science.gov (United States)

    Drury, Suzanne; Salter, Janine; Baehner, Frederick L; Shak, Steven; Dowsett, Mitch

    2010-06-01

    To determine whether 0.6 mm cores of formalin-fixed paraffin-embedded (FFPE) tissue, as commonly used to construct immunohistochemical tissue microarrays, may be a valid alternative to tissue sections as source material for quantitative real-time PCR-based transcriptional profiling of breast cancer. Four matched 0.6 mm cores of invasive breast tumour and two 10 microm whole sections were taken from eight FFPE blocks. RNA was extracted and reverse transcribed, and TaqMan assays were performed on the 21 genes of the Oncotype DX Breast Cancer assay. Expression of the 16 recurrence-related genes was normalised to the set of five reference genes, and the recurrence score (RS) was calculated. RNA yield was lower from 0.6 mm cores than from 10 microm whole sections, but was still more than sufficient to perform the assay. RS and single gene data from cores were highly comparable with those from whole sections (RS p=0.005). Greater variability was seen between cores than between sections. FFPE sections are preferable to 0.6 mm cores for RNA profiling in order to maximise RNA yield and to allow for standard histopathological assessment. However, 0.6 mm cores are sufficient and would be appropriate to use for large cohort studies.

  14. Combinatorial Proofs and Algebraic Proofs

    Indian Academy of Sciences (India)

    Permanent link: https://www.ias.ac.in/article/fulltext/reso/018/07/0630-0645. Keywords. Combinatorial proof; algebraic proof; binomial identity; recurrence relation; composition; Fibonacci number; Fibonacci identity; Pascal triangle. Author Affiliations. Shailesh A Shirali1. Sahyadri School Tiwai Hill, Rajgurunagar Pune 410 ...

  15. Proof Auditing Formalised Mathematics

    Directory of Open Access Journals (Sweden)

    Mark Miles Adams

    2016-01-01

    Full Text Available The first three formalisations of major mathematical proofs have heralded a new age in formalised mathematics, establishing that informal proofs at the limits of what can be understood by humans can be checked by machine. However, formalisation itself can be subject to error, and yet there is currently no accepted process in checking, or even much concern that such checks have not been performed. In this paper, we motivate why we should be concerned about correctness, and argue the need for proof auditing, to rigorously and independently check a formalisation. We discuss the issues involved in performing an audit, and propose an effective and efficient auditing process. Throughout we use the Flyspeck Project, that formalises the Kepler Conjecture proof, to illustrate our point.

  16. Algebraic proofs over noncommutative formulas

    Czech Academy of Sciences Publication Activity Database

    Tzameret, Iddo

    2011-01-01

    Roč. 209, č. 10 (2011), s. 1269-1292 ISSN 0890-5401 R&D Projects: GA MŠk LC505 Institutional research plan: CEZ:AV0Z10190503 Keywords : proof complexity * algebraic proof system s * frege proofs Subject RIV: BA - General Mathematics Impact factor: 0.560, year: 2011 http://www.sciencedirect.com/science/article/pii/S089054011100109X

  17. Flood-proof motors

    Energy Technology Data Exchange (ETDEWEB)

    Schmitt, Marcus [AREVA NP GmbH, Erlangen (Germany)

    2013-07-01

    Even before the Fukushima event occurred some German nuclear power plants (NPP) have considered flooding scenarios. As a result of one of these studies, AREVA performed an upgrade project in NPP Isar 1 with flood-proof motors as a replacement of existing air-cooled low-voltage and high-voltage motors of the emergency cooling chain. After the Fukushima event, in which the cooling chains failed, the topic flood-proof equipment gets more and more into focus. This compact will introduce different kinds of flood-proof electrical motors which are currently installed or planned for installation into NPPs over the world. Moreover the process of qualification, as it was performed during the project in NPP Isar 1, will be shown. (orig.)

  18. Flood-proof motors

    International Nuclear Information System (INIS)

    Schmitt, Marcus

    2013-01-01

    Even before the Fukushima event occurred some German nuclear power plants (NPP) have considered flooding scenarios. As a result of one of these studies, AREVA performed an upgrade project in NPP Isar 1 with flood-proof motors as a replacement of existing air-cooled low-voltage and high-voltage motors of the emergency cooling chain. After the Fukushima event, in which the cooling chains failed, the topic flood-proof equipment gets more and more into focus. This compact will introduce different kinds of flood-proof electrical motors which are currently installed or planned for installation into NPPs over the world. Moreover the process of qualification, as it was performed during the project in NPP Isar 1, will be shown. (orig.)

  19. Proof patterns

    CERN Document Server

    Joshi, Mark

    2015-01-01

    This innovative textbook introduces a new pattern-based approach to learning proof methods in the mathematical sciences. Readers will discover techniques that will enable them to learn new proofs across different areas of pure mathematics with ease. The patterns in proofs from diverse fields such as algebra, analysis, topology and number theory are explored. Specific topics examined include game theory, combinatorics, and Euclidean geometry, enabling a broad familiarity. The author, an experienced lecturer and researcher renowned for his innovative view and intuitive style, illuminates a wide range of techniques and examples from duplicating the cube to triangulating polygons to the infinitude of primes to the fundamental theorem of algebra. Intended as a companion for undergraduate students, this text is an essential addition to every aspiring mathematician’s toolkit.

  20. Validation, Proof-of-Concept, and Postaudit of the Groundwater Flow and Transport Model of the Project Shoal Area

    International Nuclear Information System (INIS)

    Ahmed Hassan

    2004-01-01

    The groundwater flow and radionuclide transport model characterizing the Shoal underground nuclear test has been accepted by the State of Nevada Division of Environmental Protection. According to the Federal Facility Agreement and Consent Order (FFACO) between DOE and the State of Nevada, the next steps in the closure process for the site are then model validation (or postaudit), the proof-of-concept, and the long-term monitoring stage. This report addresses the development of the validation strategy for the Shoal model, needed for preparing the subsurface Corrective Action Decision Document-Corrective Action Plan and the development of the proof-of-concept tools needed during the five-year monitoring/validation period. The approach builds on a previous model, but is adapted and modified to the site-specific conditions and challenges of the Shoal site

  1. Validation, Proof-of-Concept, and Postaudit of the Groundwater Flow and Transport Model of the Project Shoal Area

    Energy Technology Data Exchange (ETDEWEB)

    Ahmed Hassan

    2004-09-01

    The groundwater flow and radionuclide transport model characterizing the Shoal underground nuclear test has been accepted by the State of Nevada Division of Environmental Protection. According to the Federal Facility Agreement and Consent Order (FFACO) between DOE and the State of Nevada, the next steps in the closure process for the site are then model validation (or postaudit), the proof-of-concept, and the long-term monitoring stage. This report addresses the development of the validation strategy for the Shoal model, needed for preparing the subsurface Corrective Action Decision Document-Corrective Action Plan and the development of the proof-of-concept tools needed during the five-year monitoring/validation period. The approach builds on a previous model, but is adapted and modified to the site-specific conditions and challenges of the Shoal site.

  2. Proof Mapping

    Science.gov (United States)

    Linares, Leanne A.; Smith, Phil R.

    2009-01-01

    A geometry textbook or mathematics journal that prints all the work that mathematicians use as they generate proofs of mathematical results would be rare indeed. The false starts, the tentative conjectures, and the arguments that led nowhere--these are conveniently omitted; only the final successful product is presented to the world. To students…

  3. How should grid operators govern smart grid innovation projects? An embedded case study approach

    International Nuclear Information System (INIS)

    Reuver, Mark de; Lei, Telli van der; Lukszo, Zofia

    2016-01-01

    Grid operators increasingly have to collaborate with other actors in order to realize smart grid innovations. For routine maintenance, grid operators typically acquire technologies in one-off transactions, but the innovative nature of smart grid projects may require more collaborate relationships. This paper studies how a transactional versus relational approach to governing smart grid innovation projects affects incentives for other actors to collaborate. We analyse 34 cases of smart grid innovation projects based on extensive archival data as well as interviews. We find that projects relying on relational governance are more likely to provide incentives for collaboration. Especially non-financial incentives such as reputational benefits and shared intellectual property rights are more likely to be found in projects relying on relational governance. Policy makers that wish to stimulate smart grid innovation projects should consider stimulating long-term relationships between grid operators and third parties, because such relationships are more likely to produce incentives for collaboration. - Highlights: • Smart grids require collaboration between grid operators and other actors. • We contrast transactional and relational governance of smart grid projects. • Long-term relations produce more incentives for smart grid collaboration. • Non-financial incentives are more important in long-term relations. • Policy makers should stimulate long-term relations to stimulate smart grids.

  4. Prediction of breast cancer risk using a machine learning approach embedded with a locality preserving projection algorithm

    Science.gov (United States)

    Heidari, Morteza; Zargari Khuzani, Abolfazl; Hollingsworth, Alan B.; Danala, Gopichandh; Mirniaharikandehei, Seyedehnafiseh; Qiu, Yuchen; Liu, Hong; Zheng, Bin

    2018-02-01

    In order to automatically identify a set of effective mammographic image features and build an optimal breast cancer risk stratification model, this study aims to investigate advantages of applying a machine learning approach embedded with a locally preserving projection (LPP) based feature combination and regeneration algorithm to predict short-term breast cancer risk. A dataset involving negative mammograms acquired from 500 women was assembled. This dataset was divided into two age-matched classes of 250 high risk cases in which cancer was detected in the next subsequent mammography screening and 250 low risk cases, which remained negative. First, a computer-aided image processing scheme was applied to segment fibro-glandular tissue depicted on mammograms and initially compute 44 features related to the bilateral asymmetry of mammographic tissue density distribution between left and right breasts. Next, a multi-feature fusion based machine learning classifier was built to predict the risk of cancer detection in the next mammography screening. A leave-one-case-out (LOCO) cross-validation method was applied to train and test the machine learning classifier embedded with a LLP algorithm, which generated a new operational vector with 4 features using a maximal variance approach in each LOCO process. Results showed a 9.7% increase in risk prediction accuracy when using this LPP-embedded machine learning approach. An increased trend of adjusted odds ratios was also detected in which odds ratios increased from 1.0 to 11.2. This study demonstrated that applying the LPP algorithm effectively reduced feature dimensionality, and yielded higher and potentially more robust performance in predicting short-term breast cancer risk.

  5. High School Students' Reasons for Their Science Dispositions: Community-Based Innovative Technology-Embedded Environmental Research Projects

    Science.gov (United States)

    Ebenezer, Jazlin; Kaya, Osman Nafiz; Kasab, Dimma

    2018-05-01

    The purpose of this investigation was to qualitatively describe high school students' reasons for their science dispositions (attitude, perception, and self-confidence) based on their long-term experience with innovative technology-embedded environmental research projects. Students in small groups conducted research projects in and out of school with the help of their teachers and community experts (scientists and engineers). During the 3-year period of this nationally funded project, a total of 135 students from five schools in a mid-west State participated in research activities. Of the 135 students, 53 students were individually interviewed to explore reasons for their science dispositions. Students' reasons for each disposition were grouped into categories, and corresponding frequency was converted to a percentage. The categories of reasons were not only attributed to the use of innovative technologies in environmental research but also the contexts and events that surrounded it. The reasons that influenced students' science dispositions positively were because engaging in environmental research projects with technology contributed to easing fear and difficulty, building a research team, disseminating findings, communicating with the community, researching with scientists, training by teachers, and acknowledging teachers' knowledge. These results advanced how and why students develop science dispositions in the positive direction, which are as follows: building science teacher capacity, developing a community of inquirers, and committing to improve pedagogical practices.

  6. A Collaborative Action Research Project towards Embedding ESD within the Higher Education Curriculum

    Science.gov (United States)

    Cebrián, Gisela

    2017-01-01

    Purpose: This paper aims to present a collaborative action research project conducted at the University of Southampton with the aim to promote curriculum and professional development in education for sustainable development (ESD) and learn from everyday practices of academics. Design/methodology/approach: An action research approach guided by…

  7. Proofs with monotone cuts

    Czech Academy of Sciences Publication Activity Database

    Jeřábek, Emil

    2012-01-01

    Roč. 58, č. 3 (2012), s. 177-187 ISSN 0942-5616 R&D Projects: GA AV ČR IAA100190902; GA MŠk(CZ) 1M0545 Institutional support: RVO:67985840 Keywords : proof complexity * monotone sequent calculus Subject RIV: BA - General Mathematics Impact factor: 0.376, year: 2012 http://onlinelibrary.wiley.com/doi/10.1002/malq.201020071/full

  8. Design and implementation of real-time wireless projection system based on ARM embedded system

    Science.gov (United States)

    Long, Zhaohua; Tang, Hao; Huang, Junhua

    2018-04-01

    Aiming at the shortage of existing real-time screen sharing system, a real-time wireless projection system is proposed in this paper. Based on the proposed system, a weight-based frame deletion strategy combined sampling time period and data variation is proposed. By implementing the system on the hardware platform, the results show that the system can achieve good results. The weight-based strategy can improve the service quality, reduce the delay and optimize the real-time customer service system [1].

  9. Understanding mathematical proof

    CERN Document Server

    Taylor, John

    2014-01-01

    Introduction The need for proof The language of mathematics Reasoning Deductive reasoning and truth Example proofs Logic and ReasoningIntroduction Propositions, connectives, and truth tables Logical equivalence and logical implication Predicates and quantification Logical reasoning Sets and Functions Introduction Sets and membership Operations on setsThe Cartesian product Functions and composite functions Properties of functions The Structure of Mathematical ProofsIntroduction Some proofs dissected An informal framework for proofs Direct proof A more formal framework Finding Proofs Direct proo

  10. Embedded Systems

    Indian Academy of Sciences (India)

    Embedded system, micro-con- troller ... Embedded systems differ from general purpose computers in many ... Low cost: As embedded systems are extensively used in con- .... operating systems for the desktop computers where scheduling.

  11. Embedded engineering education

    CERN Document Server

    Kaštelan, Ivan; Temerinac, Miodrag; Barak, Moshe; Sruk, Vlado

    2016-01-01

    This book focuses on the outcome of the European research project “FP7-ICT-2011-8 / 317882: Embedded Engineering Learning Platform” E2LP. Additionally, some experiences and researches outside this project have been included. This book provides information about the achieved results of the E2LP project as well as some broader views about the embedded engineering education. It captures project results and applications, methodologies, and evaluations. It leads to the history of computer architectures, brings a touch of the future in education tools and provides a valuable resource for anyone interested in embedded engineering education concepts, experiences and material. The book contents 12 original contributions and will open a broader discussion about the necessary knowledge and appropriate learning methods for the new profile of embedded engineers. As a result, the proposed Embedded Computer Engineering Learning Platform will help to educate a sufficient number of future engineers in Europe, capable of d...

  12. Embedded Leverage

    DEFF Research Database (Denmark)

    Frazzini, Andrea; Heje Pedersen, Lasse

    find that asset classes with embedded leverage offer low risk-adjusted returns and, in the cross-section, higher embedded leverage is associated with lower returns. A portfolio which is long low-embedded-leverage securities and short high-embedded-leverage securities earns large abnormal returns...

  13. Promoting the inclusion of Afghan women and men in research: reflections from research and community partners involved in implementing a 'proof of concept' project.

    Science.gov (United States)

    Riggs, Elisha; Yelland, Jane; Szwarc, Josef; Casey, Sue; Chesters, Donna; Duell-Piening, Philippa; Wahidi, Sayed; Fouladi, Fatema; Brown, Stephanie

    2015-01-31

    With mounting evidence that poor maternal and child health outcomes are related to the social determinants of health, researchers need to engage with vulnerable and isolated communities to gather the evidence that is essential to determine appropriate solutions. Conventional research methods may not ensure the degree and quality of participation that is necessary for meaningful study findings. Participatory methods provide reciprocal opportunities for often excluded communities to both take part in, and guide the conduct of research. The Having a baby in a new country research project was undertaken to provide evidence about how women and men of refugee background experience health services at the time of having a baby. This two year, multifaceted proof of concept study comprised: 1) an organisational partnership to oversee the project; 2) a community engagement framework including: female and male Afghan community researchers, community and sector stakeholder advisory groups and community consultation and engagement. Inclusive research strategies that address power imbalances in research, and diversity of and within communities, are necessary to obtain the evidence required to address health inequalities in vulnerable populations. Such an approach involves mindfully adapting research processes to ensure that studies have regard for the advice of community members about the issues that affect them. Researchers have much to gain by committing time and resources to engaging communities in reciprocal ways in research processes.

  14. A comparison of some anthropometric parameters between an Italian and a UK population: 'proof of principle' of a European project using MammoGrid

    International Nuclear Information System (INIS)

    Warren, R.; Thompson, D.; Del Frate, C.; Cordell, M.; Highnam, R.; Tromans, C.; Warsi, I.; Ding, J.; Sala, E.; Estrella, F.; Solomonides, A.E.; Odeh, M.; McClatchey, R.; Bazzocchi, M.; Amendolia, S.R.; Brady, M.

    2007-01-01

    Aim: To demonstrate the use of grid technology to produce a database of mammograms and supporting patient data, specifically using breast density as a biomarker of risk for breast cancer, for epidemiological purposes. Method: The cohort comprised 1737 women from the UK and Italy, aged 28-87 years, mean 54.7 years, who underwent mammography after giving consent to the use of their data in the project. Information regarding height, weight, and exposure data (mAs and kV) was recorded. The computer program Generate-SMF was applied to all films in the database to measure breast volume, dense breast volume, and thereby percentage density. Visual readings of density using a six-category classification system were also available for 596 women. Results: The UK and Italian participants were similar in height, but the UK women were significantly heavier with a slightly higher body mass index (BMI), despite being younger. Both absolute and percentage breast density were significantly higher in the Udine cohort. Images from the medio-lateral projection (MLO) give a significantly lower percentage density than cranio-caudal (CC) images (p < 0.0001). Total breast volume is negatively associated with percentage density, as are BMI and age (p < 0.0001 for all), although 80% of the variability in percentage density remains unexplained. Conclusion: The study offers proof of principle that confederated databases generated using Grid technology provide a useful and adaptable environment for large quantities of image, numerical, and qualitative data suitable for epidemiological research using the example of mammographic density as a biomarker of risk for breast cancer

  15. Proof Mining in L1-Approximation

    DEFF Research Database (Denmark)

    Oliva, Paulo Borges; Kohlenbach, Ulrich

    2001-01-01

    In this paper, we present another case study in the general project of proof mining which means the logical analysis of prima facie non-effective proofs with the aim of extracting new computationally relevant data. We use techniques based on monotone functional interpretation developed...

  16. Proof Mining in L1-Approximation

    DEFF Research Database (Denmark)

    Kohlenbach, Ulrich; Oliva, Paulo Borges

    2003-01-01

    n this paper, we present another case study in the general project of proof mining which means the logical analysis of prima facie non-effective proofs with the aim of extracting new computationally relevant data. We use techniques based on monotone functional interpretation developed in Kohlenbach...

  17. Cone beam CT imaging with limited angle of projections and prior knowledge for volumetric verification of non-coplanar beam radiation therapy: a proof of concept study

    Science.gov (United States)

    Meng, Bowen; Xing, Lei; Han, Bin; Koong, Albert; Chang, Daniel; Cheng, Jason; Li, Ruijiang

    2013-11-01

    registration significantly improved the reconstructed image quality, with a reduction of mostly 2-3 folds (up to 100) in root mean square image error. The proposed algorithm provides a remedy for solving the problem of non-coplanar CBCT reconstruction from limited angle of projections by combining the PICCS technique and rigid image registration in an iterative framework. In this proof of concept study, non-coplanar beams with couch rotations of 45° can be effectively verified with the CBCT technique.

  18. Writing proofs in analysis

    CERN Document Server

    Kane, Jonathan M

    2016-01-01

    This is a textbook on proof writing in the area of analysis, balancing a survey of the core concepts of mathematical proof with a tight, rigorous examination of the specific tools needed for an understanding of analysis. Instead of the standard "transition" approach to teaching proofs, wherein students are taught fundamentals of logic, given some common proof strategies such as mathematical induction, and presented with a series of well-written proofs to mimic, this textbook teaches what a student needs to be thinking about when trying to construct a proof. Covering the fundamentals of analysis sufficient for a typical beginning Real Analysis course, it never loses sight of the fact that its primary focus is about proof writing skills. This book aims to give the student precise training in the writing of proofs by explaining exactly what elements make up a correct proof, how one goes about constructing an acceptable proof, and, by learning to recognize a correct proof, how to avoid writing incorrect proofs. T...

  19. PROOF on Demand

    International Nuclear Information System (INIS)

    Malzacher, Peter; Manafov, Anar

    2010-01-01

    PROOF on Demand (PoD) is a set of utilities, which allows starting a PROOF cluster at user request, on any resource management system. It provides a plug-in based system, which allows to use different job submission frontends, such as LSF or gLite WMS. Main components of PoD are the PROOFAgent and the PAConsole. PROOFAgent provides the communication layer between the PROOF master on the local machine and the PROOF workers on the remote resources, possibly behind a firewall. PAConsole provides a user-friendly GUI, which is used to setup, manage, and shutdown the dynamic PROOF cluster. Installation is simple and doesn't require administrator privileges, and all the processes run in user space. PoD gives users, who don't have a centrally-administrated static PROOF cluster at their institute, the possibility to enjoy the full power of interactive analysis with PROOF.

  20. Embedding Systems Thinking into EWB Project Planning and Development: Assessing the Utility of a Group Model Building Approach

    Directory of Open Access Journals (Sweden)

    Kimberly Pugel

    2017-11-01

    Full Text Available Amongst growing sociotechnical efforts, engineering students and professionals both in the international development sector and industry are challenged to approach projects more holistically to achieve project goals.  Engineering service learning organizations must similarly adapt their technological projects to consider varying cultural and economic structures, ensuring more resilient social progress within development efforts.  In practice, systems thinking approaches can be utilized to model the social, economic, political, and technological implications that influence the sustainability of an engineering project. This research assesses the utility of integrating systems thinking into Engineers Without Borders (EWB project planning and development, thereby improving project impact and more effectively engaging members.  At a workshop held at an EWB-USA 2016 Regional Conference, the authors presented a planning and evaluation framework that applies group model building with system dynamics to foster systems thinking through factor diagramming and analysis. To assess the added value of the framework for EWB project planning and development, extensive participant feedback was gathered and evaluated during the workshop and through an optional post-workshop survey.  Supported by thoughtful observations and feedback provided by the EWB members, the model building workshop appeared to help participants reveal and consider project complexities by both visually and quantitatively identifying key non-technical and technical factors that influence project sustainability.  Therefore, system dynamics applied in a group model building workshop offers a powerful supplement to traditional EWB project planning and assessment activities, providing a systems-based tool for EWB teams and partner communities to build capacity and create lasting change.

  1. The Institutional Embedding of Interactive Policy Making. Insights from a comparative research based on eight interactive projects in the Netherlands

    NARCIS (Netherlands)

    Edelenbos, J.; Klok, P.J.; Tatenhove, van J.P.M.

    2009-01-01

    In this article, the authors address citizen involvement at the central government level in the Netherlands. Through comparative research in which they systematically analyze eight interactive projects in three governmental departments, the authors especially pay attention to the relation between

  2. The Institutional Embedding of Interactive Policy Making Insights From a Comparative Research Based on Eight Interactive Projects in the Netherlands

    NARCIS (Netherlands)

    Edelenbos, Jurian; Klok, Pieter J.; van Tatenhove, Jan

    2009-01-01

    In this article, the authors address citizen involvement at the central government level in the Netherlands. Through comparative research in which they systematically analyze eight interactive projects in three governmental departments, the authors especially pay attention to the relation between

  3. A PROOF Analysis Framework

    International Nuclear Information System (INIS)

    González Caballero, I; Cuesta Noriega, A; Rodríguez Marrero, A; Fernández del Castillo, E

    2012-01-01

    The analysis of the complex LHC data usually follows a standard path that aims at minimizing not only the amount of data but also the number of observables used. After a number of steps of slimming and skimming the data, the remaining few terabytes of ROOT files hold a selection of the events and a flat structure for the variables needed that can be more easily inspected and traversed in the final stages of the analysis. PROOF arises at this point as an efficient mechanism to distribute the analysis load by taking advantage of all the cores in modern CPUs through PROOF Lite, or by using PROOF Cluster or PROOF on Demand tools to build dynamic PROOF cluster on computing facilities with spare CPUs. However using PROOF at the level required for a serious analysis introduces some difficulties that may scare new adopters. We have developed the PROOF Analysis Framework (PAF) to facilitate the development of new analysis by uniformly exposing the PROOF related configurations across technologies and by taking care of the routine tasks as much as possible. We describe the details of the PAF implementation as well as how we succeeded in engaging a group of CMS physicists to use PAF as their daily analysis framework.

  4. Future-proofing nursing education.

    Science.gov (United States)

    Keighley, Tom

    2014-12-01

    The origin of future-proofing seems lost in the mists of recent history. Dictionaries date its use from about 1991, referring to the prevention of obsolescence in information technology manufacturing and occasionally in organizational systems. However, closer analysis in healthcare demonstrates it can be traced back to the Rand Corporation and the studies commissioned there in the 1960s. These aimed at identifying the predictive factors in planning healthcare, including development of the workforce. It is a managerial concept that helps to project a vision of change that is not simply reactive or short-term. It permits a focus on leadership and the maximising of learning opportunities and includes analysis of the policy horizon. It held within it an assumption about the importance of establishing the cognitive frameworks that would influence long-term behaviours and not focus simply on short-term gains. This paper utilises this approach to explore options for future-proofing of nurse education.

  5. On the geometry of some special projective varieties

    CERN Document Server

    Russo, Francesco

    2016-01-01

    Providing an introduction to both classical and modern techniques in projective algebraic geometry, this monograph treats the geometrical properties of varieties embedded in projective spaces, their secant and tangent lines, the behavior of tangent linear spaces, the algebro-geometric and topological obstructions to their embedding into smaller projective spaces, and the classification of extremal cases. It also provides a solution of Hartshorne’s Conjecture on Complete Intersections for the class of quadratic manifolds and new short proofs of previously known results, using the modern tools of Mori Theory and of rationally connected manifolds. The new approach to some of the problems considered can be resumed in the principle that, instead of studying a special embedded manifold uniruled by lines, one passes to analyze the original geometrical property on the manifold of lines passing through a general point and contained in the manifold. Once this embedded manifold, usually of lower codimension, is classi...

  6. Embedded defects

    International Nuclear Information System (INIS)

    Barriola, M.; Vachaspati, T.; Bucher, M.

    1994-01-01

    We give a prescription for embedding classical solutions and, in particular, topological defects in field theories which are invariant under symmetry groups that are not necessarily simple. After providing examples of embedded defects in field theories based on simple groups, we consider the electroweak model and show that it contains the Z string and a one-parameter family of strings called the W(α) string. It is argued that although the members of this family are gauge equivalent when considered in isolation, each member becomes physically distinct when multistring configurations are considered. We then turn to the issue of stability of embedded defects and demonstrate the instability of a large class of such solutions in the absence of bound states or condensates. The Z string is shown to be unstable for all values of the Higgs boson mass when θ W =π/4. W strings are also shown to be unstable for a large range of parameters. Embedded monopoles suffer from the Brandt-Neri-Coleman instability. Finally, we connect the electroweak string solutions to the sphaleron

  7. Stork Color Proofing Technology

    Science.gov (United States)

    Ekman, C. Frederick

    1989-04-01

    For the past few years, Stork Colorproofing B.V. has been marketing an analog color proofing system in Europe based on electrophoto-graphic technology it pioneered for the purpose of high resolution, high fidelity color imaging in the field of the Graphic Arts. Based in part on this technology, it will make available on a commercial basis a digital color proofing system in 1989. Proofs from both machines will provide an exact reference for the user and will look, feel, and behave in a reproduction sense like the printed press sheet.

  8. Proofs, Upside Down

    DEFF Research Database (Denmark)

    Puech, Matthias

    2013-01-01

    this correspondence by applying a series of off-the-shelf program transformations à la Danvy et al. on a type checker for the bidirectional λ-calculus, and get a type checker for the λ¯ -calculus, the proof term assignment of LJT. This functional correspondence revisits the relationship between natural deduction......It is well known in proof theory that sequent-calculus proofs differ from natural deduction proofs by “reversing” elimination rules upside down into left introduction rules. It is also well known that to each recursive, functional program corresponds an equivalent iterative, accumulator......-passing program, where the accumulator stores the continuation of the iteration, in “reversed” order. Here, we compose these remarks and show that a restriction of the intuitionistic sequent calculus, LJT, is exactly an accumulator-passing version of intuitionistic natural deduction NJ. More precisely, we obtain...

  9. Advances in proof theory

    CERN Document Server

    Strahm, Thomas; Studer, Thomas

    2016-01-01

    The aim of this volume is to collect original contributions by the best specialists from the area of proof theory, constructivity, and computation and discuss recent trends and results in these areas. Some emphasis will be put on ordinal analysis, reductive proof theory, explicit mathematics and type-theoretic formalisms, and abstract computations. The volume is dedicated to the 60th birthday of Professor Gerhard Jäger, who has been instrumental in shaping and promoting logic in Switzerland for the last 25 years. It comprises contributions from the symposium “Advances in Proof Theory”, which was held in Bern in December 2013. Proof theory came into being in the twenties of the last century, when it was inaugurated by David Hilbert in order to secure the foundations of mathematics. It was substantially influenced by Gödel's famous incompleteness theorems of 1930 and Gentzen's new consistency proof for the axiom system of first order number theory in 1936. Today, proof theory is a well-established branch ...

  10. Proof Nets for Lambek Calculus

    NARCIS (Netherlands)

    Roorda, Dirk

    1992-01-01

    The proof nets of linear logic are adapted to the non-commutative Lambek calculus. A different criterion for soundness of proof nets is given, which gives rise to new algorithms for proof search. The order sensitiveness of the Lambek calculus is reflected by the planarity condition on proof nets;

  11. Embedded Hardware

    CERN Document Server

    Ganssle, Jack G; Eady, Fred; Edwards, Lewin; Katz, David J; Gentile, Rick

    2007-01-01

    The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!. Circuit design using microcontrollers is both a science and an art. This book covers it all. It details all of the essential theory and facts to help an engineer design a robust embedded system. Processors, memory, and the hot topic of interconnects (I/O) are completely covered. Our authors bring a wealth of experience and ideas; thi

  12. Coqoon - An IDE for Interactive Proof Development in Coq

    OpenAIRE

    Faithfull, Alexander; Bengtson, Jesper; Tassi, Enrico

    2016-01-01

    User interfaces for interactive proof assistants have always lagged behind those for mainstream programming languages. Whereas integrated development environments—IDEs—have support for features like project management, version control, dependency analysis and incremental project compilation, “IDE”s for proof assistants typically only operate on files in isolation, relying on external tools to integrate those files into larger projects. In this paper we present Coqoon, an IDE for Coq developme...

  13. Gödel, Truth and Proof

    Czech Academy of Sciences Publication Activity Database

    Peregrin, Jaroslav

    -, č. 82 (2007), s. 1-10 E-ISSN 1742-6596 R&D Projects: GA ČR(CZ) GA401/04/0117 Institutional research plan: CEZ:AV0Z90090514 Keywords : Gödel * incompleteness of arithmetic * proof vs. truth Subject RIV: AA - Philosophy ; Religion http://www.iop.org/EJ/ toc /1742-6596/82/1

  14. A Short Proof of Klee's Theorem

    OpenAIRE

    Zanazzi, John J.

    2013-01-01

    In 1959, Klee proved that a convex body $K$ is a polyhedron if and only if all of its projections are polygons. In this paper, a new proof of this theorem is given for convex bodies in $\\mathbb{R}^3$.

  15. Proof complexity of intuitionistic implicational formulas

    Czech Academy of Sciences Publication Activity Database

    Jeřábek, Emil

    2017-01-01

    Roč. 168, č. 1 (2017), s. 150-190 ISSN 0168-0072 EU Projects: European Commission(XE) 339691 - FEALORA Institutional support: RVO:67985840 Keywords : proof complexity * intuitionistic logic * implicational fragment Subject RIV: BA - General Mathematics OBOR OECD: Pure mathematics Impact factor: 0.647, year: 2016 http://www.sciencedirect.com/science/article/pii/S0168007216301154

  16. Short proofs for the determinant identities

    Czech Academy of Sciences Publication Activity Database

    Hrubeš, Pavel; Tzameret, I.

    2015-01-01

    Roč. 44, č. 2 (2015), s. 340-383 ISSN 0097-5397 EU Projects: European Commission(XE) 339691 - FEALORA Program:FP7 Institutional support: RVO:67985840 Keywords : proof complexity * arithmetic circuits Subject RIV: BA - General Mathematics Impact factor: 0.841, year: 2015 http://epubs.siam.org/doi/abs/10.1137/130917788

  17. A New Small Emendation of Gödel's Ontological Proof

    Czech Academy of Sciences Publication Activity Database

    Hájek, Petr

    2002-01-01

    Roč. 71, č. 2 (2002), s. 149-164 ISSN 0039-3215 R&D Projects: GA MŠk LN00A056 Keywords : ontological proof * Gödel proof * modal logic * comprehension * positive properties Subject RIV: BA - General Mathematics

  18. Binary moving-blocker-based scatter correction in cone-beam computed tomography with width-truncated projections: proof of concept

    Science.gov (United States)

    Lee, Ho; Fahimian, Benjamin P.; Xing, Lei

    2017-03-01

    This paper proposes a binary moving-blocker (BMB)-based technique for scatter correction in cone-beam computed tomography (CBCT). In concept, a beam blocker consisting of lead strips, mounted in front of the x-ray tube, moves rapidly in and out of the beam during a single gantry rotation. The projections are acquired in alternating phases of blocked and unblocked cone beams, where the blocked phase results in a stripe pattern in the width direction. To derive the scatter map from the blocked projections, 1D B-Spline interpolation/extrapolation is applied by using the detected information in the shaded regions. The scatter map of the unblocked projections is corrected by averaging two scatter maps that correspond to their adjacent blocked projections. The scatter-corrected projections are obtained by subtracting the corresponding scatter maps from the projection data and are utilized to generate the CBCT image by a compressed-sensing (CS)-based iterative reconstruction algorithm. Catphan504 and pelvis phantoms were used to evaluate the method’s performance. The proposed BMB-based technique provided an effective method to enhance the image quality by suppressing scatter-induced artifacts, such as ring artifacts around the bowtie area. Compared to CBCT without a blocker, the spatial nonuniformity was reduced from 9.1% to 3.1%. The root-mean-square error of the CT numbers in the regions of interest (ROIs) was reduced from 30.2 HU to 3.8 HU. In addition to high resolution, comparable to that of the benchmark image, the CS-based reconstruction also led to a better contrast-to-noise ratio in seven ROIs. The proposed technique enables complete scatter-corrected CBCT imaging with width-truncated projections and allows reducing the acquisition time to approximately half. This work may have significant implications for image-guided or adaptive radiation therapy, where CBCT is often used.

  19. Gödel's Proof

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 12; Issue 5. Gödel's Proof - Incompleteness Theorems. S M Srivastava. General Article Volume 12 Issue 5 May 2007 pp 71-84. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/012/05/0071-0084. Keywords.

  20. Visualizing Probabilistic Proof

    OpenAIRE

    Guerra-Pujol, Enrique

    2015-01-01

    The author revisits the Blue Bus Problem, a famous thought-experiment in law involving probabilistic proof, and presents simple Bayesian solutions to different versions of the blue bus hypothetical. In addition, the author expresses his solutions in standard and visual formats, i.e. in terms of probabilities and natural frequencies.

  1. Proofs that Develop Insight

    Science.gov (United States)

    Weber, Keith

    2010-01-01

    Many mathematics educators have noted that mathematicians do not only read proofs to gain conviction but also to obtain insight. The goal of this article is to discuss what this insight is from mathematicians' perspective. Based on interviews with nine research-active mathematicians, two sources of insight are discussed. The first is reading a…

  2. Proof in geometry with "mistakes in geometric proofs"

    CERN Document Server

    Fetisov, A I

    2006-01-01

    This single-volume compilation of 2 books explores the construction of geometric proofs. It offers useful criteria for determining correctness and presents examples of faulty proofs that illustrate common errors. 1963 editions.

  3. Proofs without Words: A Visual Application of Reasoning and Proof

    Science.gov (United States)

    Bell, Carol J.

    2011-01-01

    Reasoning and Proof is one of the Process Standards set forth in National Council of Teachers of Mathematics' (NCTM) "Principles and Standards for School Mathematics." Thus, it is important to give students opportunities to build their reasoning skills and aid their understanding of the proof process. Teaching students how to do proofs is a…

  4. Isometric embeddings of 2-spheres by embedding flow for applications in numerical relativity

    International Nuclear Information System (INIS)

    Jasiulek, Michael; Korzyński, Mikołaj

    2012-01-01

    We present a numerical method for solving Weyl's embedding problem which consists in finding a global isometric embedding of a positively curved and positive-definite spherical 2-metric into the Euclidean 3-space. The method is based on a construction introduced by Weingarten and was used in Nirenberg's proof of Weyl's conjecture. The target embedding results as the endpoint of an embedding flow in R 3 beginning at the unit sphere's embedding. We employ spectral methods to handle functions on the surface and to solve various (non)linear elliptic PDEs. The code requires no additional input or steering from the operator and its convergence is guaranteed by the Nirenberg arguments. Possible applications in 3 + 1 numerical relativity range from quasi-local mass and momentum measures to coarse-graining in inhomogeneous cosmological models. (paper)

  5. A Simple Proof of Cauchy's Surface Area Formula

    OpenAIRE

    Tsukerman, Emmanuel; Veomett, Ellen

    2016-01-01

    We give a short and simple proof of Cauchy's surface area formula, which states that the average area of a projection of a convex body is equal to its surface area up to a multiplicative constant in the dimension.

  6. Goedel, truth and proof

    International Nuclear Information System (INIS)

    Peregrin, Jaroslav

    2007-01-01

    The usual way of interpreting Goedel's (1931) incompleteness result is as showing that there is a gap between truth and provability, i.e. that we can never prove everything that is true. Moreover, this result is supposed to show that there are unprovable truths which we can know to be true. This, so the story goes, shows that we are more than machines that are restricted to acting as proof systems. Hence our minds are 'not mechanical'

  7. Embedded Processor Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Embedded Processor Laboratory provides the means to design, develop, fabricate, and test embedded computers for missile guidance electronics systems in support...

  8. The random projection method

    CERN Document Server

    Vempala, Santosh S

    2005-01-01

    Random projection is a simple geometric technique for reducing the dimensionality of a set of points in Euclidean space while preserving pairwise distances approximately. The technique plays a key role in several breakthrough developments in the field of algorithms. In other cases, it provides elegant alternative proofs. The book begins with an elementary description of the technique and its basic properties. Then it develops the method in the context of applications, which are divided into three groups. The first group consists of combinatorial optimization problems such as maxcut, graph coloring, minimum multicut, graph bandwidth and VLSI layout. Presented in this context is the theory of Euclidean embeddings of graphs. The next group is machine learning problems, specifically, learning intersections of halfspaces and learning large margin hypotheses. The projection method is further refined for the latter application. The last set consists of problems inspired by information retrieval, namely, nearest neig...

  9. Analogy, explanation, and proof

    Science.gov (United States)

    Hummel, John E.; Licato, John; Bringsjord, Selmer

    2014-01-01

    People are habitual explanation generators. At its most mundane, our propensity to explain allows us to infer that we should not drink milk that smells sour; at the other extreme, it allows us to establish facts (e.g., theorems in mathematical logic) whose truth was not even known prior to the existence of the explanation (proof). What do the cognitive operations underlying the inference that the milk is sour have in common with the proof that, say, the square root of two is irrational? Our ability to generate explanations bears striking similarities to our ability to make analogies. Both reflect a capacity to generate inferences and generalizations that go beyond the featural similarities between a novel problem and familiar problems in terms of which the novel problem may be understood. However, a notable difference between analogy-making and explanation-generation is that the former is a process in which a single source situation is used to reason about a single target, whereas the latter often requires the reasoner to integrate multiple sources of knowledge. This seemingly small difference poses a challenge to the task of marshaling our understanding of analogical reasoning to understanding explanation. We describe a model of explanation, derived from a model of analogy, adapted to permit systematic violations of this one-to-one mapping constraint. Simulation results demonstrate that the resulting model can generate explanations for novel explananda and that, like the explanations generated by human reasoners, these explanations vary in their coherence. PMID:25414655

  10. Proofs from THE BOOK

    CERN Document Server

    Aigner, Martin

    2014-01-01

    This revised and enlarged fifth edition features four new chapters, which contain highly original and delightful proofs for classics such as the spectral theorem from linear algebra, some more recent jewels like the non-existence of the Borromean rings and other surprises. From the Reviews "... Inside PFTB (Proofs from The Book) is indeed a glimpse of mathematical heaven, where clever insights and beautiful ideas combine in astonishing and glorious ways. There is vast wealth within its pages, one gem after another. ... Aigner and Ziegler... write: "... all we offer is the examples that we have selected, hoping that our readers will share our enthusiasm about brilliant ideas, clever insights and wonderful observations." I do. ... " Notices of the AMS, August 1999 "... This book is a pleasure to hold and to look at: ample margins, nice photos, instructive pictures, and beautiful drawings ... It is a pleasure to read as well: the style is clear and entertaining, the level is close to elementary, the necessary b...

  11. Conceptualizing Embedded Configuration

    DEFF Research Database (Denmark)

    Oddsson, Gudmundur Valur; Hvam, Lars; Lysgaard, Ole

    2006-01-01

    and services. The general idea can be named embedded configuration. In this article we intend to conceptualize embedded configuration, what it is and is not. The difference between embedded configuration, sales configuration and embedded software is explained. We will look at what is needed to make embedded...... configuration systems. That will include requirements to product modelling techniques. An example with consumer electronics will illuminate the elements of embedded configuration in settings that most can relate to. The question of where embedded configuration would be relevant is discussed, and the current...

  12. PROOF on a Batch System

    International Nuclear Information System (INIS)

    Behrenhoff, W; Ehrenfeld, W; Samson, J; Stadie, H

    2011-01-01

    The 'parallel ROOT facility' (PROOF) from the ROOT framework provides a mechanism to distribute the load of interactive and non-interactive ROOT sessions on a set of worker nodes optimising the overall execution time. While PROOF is designed to work on a dedicated PROOF cluster, the benefits of PROOF can also be used on top of another batch scheduling system with the help of temporary per user PROOF clusters. We will present a lightweight tool which starts a temporary PROOF cluster on a SGE based batch cluster or, via a plugin mechanism, e.g. on a set of bare desktops via ssh. Further, we will present the result of benchmarks which compare the data throughput for different data storage back ends available at the German National Analysis Facility (NAF) at DESY.

  13. Embedding methods for phi4-interaction

    International Nuclear Information System (INIS)

    Hanckowiak, J.

    1985-01-01

    The idea of embedding a given theory in a class of similar theories is applied to quantum field theory in the case of phi 4 -interaction to derive different equations for the generating functional. The number of possible embeddings has been restricted by demanding that for the defined projections of the generating functional a closed system of equations be obtained

  14. Tamper proofing of safeguards monitors

    International Nuclear Information System (INIS)

    Riley, R.J.

    1982-11-01

    The tamper proofing of safeguards monitors is essential if the data they produce is, and can be seen to be, reliable. This report discusses the problem of tamper proofing and gives guidance on when and how to apply tamper proofing techniques. The report is split into two parts. The first concerns the fundamental problem of how much tamper proofing to apply and the second describes methods of tamper proofing and discusses their usefulness. Both sections are applicable to all safeguards monitors although particular reference will be made to doorway monitors in some cases. The phrase 'tamper proofing' is somewhat misleading as it is impossible to completely tamper proof any device. Given enough time and resources, even the most elaborate tamper proofing can be overcome. In safeguards applications we are more interested in making the device tamper resistant and tamper indicating. That is, it should be able to resist a certain amount of tampering, and if tampering proves successful, that fact should be immediately obvious. Techniques of making a device tamper indicating and tamper resistant will be described below. The phrase tamper proofing will be used throughout this report as a generic term, including both tamper resistance and tamper indicating. (author)

  15. Certifiable Java for Embedded Systems

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Dalsgaard, Andreas Engelbredt; Hansen, Rene Rydhof

    2014-01-01

    The Certifiable Java for Embedded Systems (CJ4ES) project aimed to develop a prototype development environment and platform for safety-critical software for embedded applications. There are three core constituents: A profile of the Java programming language that is tailored for safety......-critical applications, a predictable Java processor built with FPGA technology, and an Eclipse based application development environment that binds the profile and the platform together and provides analyses that help to provide evidence that can be used as part of a safety case. This paper summarizes key contributions...

  16. Homogeneous Spaces and Equivariant Embeddings

    CERN Document Server

    Timashev, DA

    2011-01-01

    Homogeneous spaces of linear algebraic groups lie at the crossroads of algebraic geometry, theory of algebraic groups, classical projective and enumerative geometry, harmonic analysis, and representation theory. By standard reasons of algebraic geometry, in order to solve various problems on a homogeneous space it is natural and helpful to compactify it keeping track of the group action, i.e. to consider equivariant completions or, more generally, open embeddings of a given homogeneous space. Such equivariant embeddings are the subject of this book. We focus on classification of equivariant em

  17. Analogy, Explanation, and Proof

    Directory of Open Access Journals (Sweden)

    John eHummel

    2014-11-01

    Full Text Available People are habitual explanation generators. At its most mundane, our propensity to explain allows us to infer that we should not drink milk that smells sour; at the other extreme, it allows us to establish facts (e.g., theorems in mathematical logic whose truth was not even known prior to the existence of the explanation (proof. What do the cognitive operations underlying the (inductive inference that the milk is sour have in common with the (deductive proof that, say, the square root of two is irrational? Our ability to generate explanations bears striking similarities to our ability to make analogies. Both reflect a capacity to generate inferences and generalizations that go beyond the featural similarities between a novel problem and familiar problems in terms of which the novel problem may be understood. However, a notable difference between analogy-making and explanation-generation is that the former is a process in which a single source situation is used to reason about a single target, whereas the latter often requires the reasoner to integrate multiple sources of knowledge. This small-seeming difference poses a challenge to the task of marshaling our understanding of analogical reasoning in the service of understanding explanation. We describe a model of explanation, derived from a model of analogy, adapted to permit systematic violations of this one-to-one mapping constraint. Simulation results demonstrate that the resulting model can generate explanations for novel explananda and that, like the explanations generated by human reasoners, these explanations vary in their coherence.

  18. Short proofs of strong normalization

    OpenAIRE

    Wojdyga, Aleksander

    2008-01-01

    This paper presents simple, syntactic strong normalization proofs for the simply-typed lambda-calculus and the polymorphic lambda-calculus (system F) with the full set of logical connectives, and all the permutative reductions. The normalization proofs use translations of terms and types to systems, for which strong normalization property is known.

  19. From Inductive Reasoning to Proof

    Science.gov (United States)

    Yopp, David A.

    2009-01-01

    Mathematical proof is an expression of deductive reasoning (drawing conclusions from previous assertions). However, it is often inductive reasoning (conclusions drawn on the basis of examples) that helps learners form their deductive arguments, or proof. In addition, not all inductive arguments generate more formal arguments. This article draws a…

  20. Applying Gödel's Dialectica Interpretation to Obtain a Constructive Proof of Higman's Lemma

    Directory of Open Access Journals (Sweden)

    Thomas Powell

    2012-10-01

    Full Text Available We use Gödel's Dialectica interpretation to analyse Nash-Williams' elegant but non-constructive "minimal bad sequence" proof of Higman's Lemma. The result is a concise constructive proof of the lemma (for arbitrary decidable well-quasi-orders in which Nash-Williams' combinatorial idea is clearly present, along with an explicit program for finding an embedded pair in sequences of words.

  1. Coqoon - An IDE for Interactive Proof Development in Coq

    DEFF Research Database (Denmark)

    Faithfull, Alexander; Bengtson, Jesper; Tassi, Enrico

    2016-01-01

    User interfaces for interactive proof assistants have always lagged behind those for mainstream programming languages. Whereas integrated development environments—IDEs—have support for features like project management, version control, dependency analysis and incremental project compilation, “IDE...... these projects using the Eclipse common build system. Coqoon takes advantage of the latest features of Coq, including asynchronous and parallel processing of proofs, and—when used together with a third-party OCaml extension for Eclipse—can even be used to work on large developments containing Coq plugins....

  2. Embedding the Finite Sampling Process at a Rate

    OpenAIRE

    Shorack, Galen R.

    1991-01-01

    A huge body of if and only if theorems can be obtained based on certain strong embedding theorems for the partial sum process $\\mathbb{S}_n$ and the uniform empirical and quantile processes $\\mathbb{U}_n$ and $\\mathbb{V}_n$. This embedding was accomplished in 1986 by M. Csorgo, S. Csorgo, L. Horvath and D. Mason. Their embedding is beautifully formulated so that many necessary and sufficient type results can be established using it. It is worthwhile to have an accessible proof. Indeed, these ...

  3. Proof tests on reliability

    International Nuclear Information System (INIS)

    Mishima, Yoshitsugu

    1983-01-01

    In order to obtain public understanding on nuclear power plants, tests should be carried out to prove the reliability and safety of present LWR plants. For example, the aseismicity of nuclear power plants must be verified by using a large scale earthquake simulator. Reliability test began in fiscal 1975, and the proof tests on steam generators and on PWR support and flexure pins against stress corrosion cracking have already been completed, and the results have been internationally highly appreciated. The capacity factor of the nuclear power plant operation in Japan rose to 80% in the summer of 1983, and considering the period of regular inspection, it means the operation of almost full capacity. Japanese LWR technology has now risen to the top place in the world after having overcome the defects. The significance of the reliability test is to secure the functioning till the age limit is reached, to confirm the correct forecast of deteriorating process, to confirm the effectiveness of the remedy to defects and to confirm the accuracy of predicting the behavior of facilities. The reliability of nuclear valves, fuel assemblies, the heat affected zones in welding, reactor cooling pumps and electric instruments has been tested or is being tested. (Kako, I.)

  4. Polymorphic Embedding of DSLs

    DEFF Research Database (Denmark)

    Hofer, Christian; Ostermann, Klaus; Rendel, Tillmann

    2008-01-01

    propose polymorphic embedding of DSLs, where many different interpretations of a DSL can be provided as reusable components, and show how polymorphic embedding can be realized in the programming language Scala. With polymorphic embedding, the static type-safety, modularity, composability and rapid...

  5. Proof assistants: History, ideas and future

    Indian Academy of Sciences (India)

    application is and will be in computer supported modelling and verification of sys- tems. But there is still ... Introduction ... compute with them, but their main focus is on doing proofs. ..... Proof development in a type theory based proof assistant.

  6. Burdens of Proof, Presumptions and Standards of Proof in Criminal ...

    African Journals Online (AJOL)

    Worku_Y

    evidential and persuasive burdens of proof as between the state and the ..... scholars have observed that the evidential burden is a function of the burden of ..... required to convince judges by creating such an intensity of belief in their minds.

  7. Proust: A Nano Proof Assistant

    Directory of Open Access Journals (Sweden)

    Prabhakar Ragde

    2016-11-01

    Full Text Available Proust is a small Racket program offering rudimentary interactive assistance in the development of verified proofs for propositional and predicate logic. It is constructed in stages, some of which are done by students before using it to complete proof exercises, and in parallel with the study of its theoretical underpinnings, including elements of Martin-Lof type theory. The goal is twofold: to demystify some of the machinery behind full-featured proof assistants such as Coq and Agda, and to better integrate the study of formal logic with other core elements of an undergraduate computer science curriculum.

  8. Methodology and Supporting Toolset Advancing Embedded Systems Quality

    DEFF Research Database (Denmark)

    Berger, Michael Stübert; Soler, José; Brewka, Lukasz Jerzy

    2013-01-01

    Software quality is of primary importance in the development of embedded systems that are often used in safety-critical applications. Moreover, as the life cycle of embedded products becomes increasingly tighter, productivity and quality are simultaneously required and closely interrelated towards...... delivering competitive products. In this context, the MODUS (Methodology and supporting toolset advancing embedded systems quality) project aims to provide a pragmatic and viable solution that will allow SMEs to substantially improve their positioning in the embedded-systems development market. This paper...... will describe the MODUS project with focus on the technical methodologies that will be developed advancing embedded system quality....

  9. Complex proofs of real theorems

    CERN Document Server

    Lax, Peter D

    2011-01-01

    Complex Proofs of Real Theorems is an extended meditation on Hadamard's famous dictum, "The shortest and best way between two truths of the real domain often passes through the imaginary one." Directed at an audience acquainted with analysis at the first year graduate level, it aims at illustrating how complex variables can be used to provide quick and efficient proofs of a wide variety of important results in such areas of analysis as approximation theory, operator theory, harmonic analysis, and complex dynamics. Topics discussed include weighted approximation on the line, Müntz's theorem, Toeplitz operators, Beurling's theorem on the invariant spaces of the shift operator, prediction theory, the Riesz convexity theorem, the Paley-Wiener theorem, the Titchmarsh convolution theorem, the Gleason-Kahane-Żelazko theorem, and the Fatou-Julia-Baker theorem. The discussion begins with the world's shortest proof of the fundamental theorem of algebra and concludes with Newman's almost effortless proof of the prime ...

  10. ATAC Process Proof of Concept Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston; Sarah Freeman

    2014-03-01

    Researchers at INL with funding from the Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) evaluated a novel approach for near real-time consumption of threat intelligence. Demonstration testing in an industry environment supported the development of this new process to assist the electric sector in securing their critical networks. This report provides the reader with an understanding of the methods used during this proof of concept project. The processes and templates were further advanced with an industry partner during an onsite assessment. This report concludes with lessons learned and a roadmap for final development of these materials for use by industry.

  11. Embedding beyond electrostatics

    DEFF Research Database (Denmark)

    Nåbo, Lina J.; Olsen, Jógvan Magnus Haugaard; Holmgaard List, Nanna

    2016-01-01

    We study excited states of cholesterol in solution and show that, in this specific case, solute wave-function confinement is the main effect of the solvent. This is rationalized on the basis of the polarizable density embedding scheme, which in addition to polarizable embedding includes non-electrostatic...... repulsion that effectively confines the solute wave function to its cavity. We illustrate how the inclusion of non-electrostatic repulsion results in a successful identification of the intense π → π∗ transition, which was not possible using an embedding method that only includes electrostatics....... This underlines the importance of non-electrostatic repulsion in quantum-mechanical embedding-based methods....

  12. Embedded systems handbook

    CERN Document Server

    Zurawski, Richard

    2005-01-01

    Embedded systems are nearly ubiquitous, and books on individual topics or components of embedded systems are equally abundant. Unfortunately, for those designers who thirst for knowledge of the big picture of embedded systems there is not a drop to drink. Until now. The Embedded Systems Handbook is an oasis of information, offering a mix of basic and advanced topics, new solutions and technologies arising from the most recent research efforts, and emerging trends to help you stay current in this ever-changing field.With preeminent contributors from leading industrial and academic institutions

  13. Web Server Embedded System

    Directory of Open Access Journals (Sweden)

    Adharul Muttaqin

    2014-07-01

    Full Text Available Abstrak Embedded sistem saat ini menjadi perhatian khusus pada teknologi komputer, beberapa sistem operasi linux dan web server yang beraneka ragam juga sudah dipersiapkan untuk mendukung sistem embedded, salah satu aplikasi yang dapat digunakan dalam operasi pada sistem embedded adalah web server. Pemilihan web server pada lingkungan embedded saat ini masih jarang dilakukan, oleh karena itu penelitian ini dilakukan dengan menitik beratkan pada dua buah aplikasi web server yang tergolong memiliki fitur utama yang menawarkan “keringanan” pada konsumsi CPU maupun memori seperti Light HTTPD dan Tiny HTTPD. Dengan menggunakan parameter thread (users, ramp-up periods, dan loop count pada stress test embedded system, penelitian ini menawarkan solusi web server manakah diantara Light HTTPD dan Tiny HTTPD yang memiliki kecocokan fitur dalam penggunaan embedded sistem menggunakan beagleboard ditinjau dari konsumsi CPU dan memori. Hasil penelitian menunjukkan bahwa dalam hal konsumsi CPU pada beagleboard embedded system lebih disarankan penggunaan Light HTTPD dibandingkan dengan tiny HTTPD dikarenakan terdapat perbedaan CPU load yang sangat signifikan antar kedua layanan web tersebut Kata kunci: embedded system, web server Abstract Embedded systems are currently of particular concern in computer technology, some of the linux operating system and web server variegated also prepared to support the embedded system, one of the applications that can be used in embedded systems are operating on the web server. Selection of embedded web server on the environment is still rarely done, therefore this study was conducted with a focus on two web application servers belonging to the main features that offer a "lightness" to the CPU and memory consumption as Light HTTPD and Tiny HTTPD. By using the parameters of the thread (users, ramp-up periods, and loop count on a stress test embedded systems, this study offers a solution of web server which between the Light

  14. Proof Pad: A New Development Environment for ACL2

    Directory of Open Access Journals (Sweden)

    Caleb Eggensperger

    2013-04-01

    Full Text Available Most software development projects rely on Integrated Development Environments (IDEs based on the desktop paradigm, with an interactive, mouse-driven user interface. The standard installation of ACL2, on the other hand, is designed to work closely with Emacs. ACL2 experts, on the whole, like this mode of operation, but students and other new programmers who have learned to program with desktop IDEs often react negatively to the process of adapting to an unfamiliar form of interaction. This paper discusses Proof Pad, a new IDE for ACL2. Proof Pad is not the only attempt to provide ACL2 IDEs catering to students and beginning programmers. The ACL2 Sedan and DrACuLa systems arose from similar motivations. Proof Pad builds on the work of those systems, while also taking into account the unique workflow of the ACL2 theorem proving system. The design of Proof Pad incorporated user feedback from the outset, and that process continued through all stages of development. Feedback took the form of direct observation of users interacting with the IDE as well as questionnaires completed by users of Proof Pad and other ACL2 IDEs. The result is a streamlined interface and fast, responsive system that supports using ACL2 as a programming language and a theorem proving system. Proof Pad also provides a property-based testing environment with random data generation and automated interpretation of properties as ACL2 theorem definitions.

  15. Embedded systems handbook networked embedded systems

    CERN Document Server

    Zurawski, Richard

    2009-01-01

    Considered a standard industry resource, the Embedded Systems Handbook provided researchers and technicians with the authoritative information needed to launch a wealth of diverse applications, including those in automotive electronics, industrial automated systems, and building automation and control. Now a new resource is required to report on current developments and provide a technical reference for those looking to move the field forward yet again. Divided into two volumes to accommodate this growth, the Embedded Systems Handbook, Second Edition presents a comprehensive view on this area

  16. A RFID grouping proof protocol for medication safety of inpatient.

    Science.gov (United States)

    Huang, Hsieh-Hong; Ku, Cheng-Yuan

    2009-12-01

    In order to provide enhanced medication safety for inpatients, the medical mechanism which adopts the modified grouping proof protocol is proposed in this paper. By using the grouping proof protocol, the medical staffs could confirm the authentication and integrity of a group of Radio-Frequency Identification (RFID) tags which are embedded on inpatient bracelets and the containers of drugs. This mechanism is designed to be compatible with EPCglobal Class-1 Generation-2 standard which is the most popular specification of RFID tags. Due to the light-weight computational capacity of passive tags, only the pseudo-random number generator (PRNG) and cyclic redundancy code (CRC) are allowed to be used in the communication protocol. Furthermore, a practical scenario of using this proposed mechanism in hospital to examine the medication safety is also presented.

  17. The data embedding method

    Energy Technology Data Exchange (ETDEWEB)

    Sandford, M.T. II; Bradley, J.N.; Handel, T.G.

    1996-06-01

    Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in Microsoft{reg_sign} bitmap (.BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits, is termed {open_quote}steganography.{close_quote} Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or {open_quote}lossy{close_quote} compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is in data an analysis algorithm.

  18. Perturbation Theory of Embedded Eigenvalues

    DEFF Research Database (Denmark)

    Engelmann, Matthias

    project gives a general and systematic approach to analytic perturbation theory of embedded eigenvalues. The spectral deformation technique originally developed in the theory of dilation analytic potentials in the context of Schrödinger operators is systematized by the use of Mourre theory. The group...... of dilations is thereby replaced by the unitary group generated y the conjugate operator. This then allows to treat the perturbation problem with the usual Kato theory.......We study problems connected to perturbation theory of embedded eigenvalues in two different setups. The first part deals with second order perturbation theory of mass shells in massive translation invariant Nelson type models. To this end an expansion of the eigenvalues w.r.t. fiber parameter up...

  19. Smart Multicore Embedded Systems

    DEFF Research Database (Denmark)

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where ve...

  20. Normal Forms for Fuzzy Logics: A Proof-Theoretic Approach

    Czech Academy of Sciences Publication Activity Database

    Cintula, Petr; Metcalfe, G.

    2007-01-01

    Roč. 46, č. 5-6 (2007), s. 347-363 ISSN 1432-0665 R&D Projects: GA MŠk(CZ) 1M0545 Institutional research plan: CEZ:AV0Z10300504 Keywords : fuzzy logic * normal form * proof theory * hypersequents Subject RIV: BA - General Mathematics Impact factor: 0.620, year: 2007

  1. Ontological Proofs of Existence and Non-Existence

    Czech Academy of Sciences Publication Activity Database

    Hájek, Petr

    2008-01-01

    Roč. 90, č. 2 (2008), s. 257-262 ISSN 0039-3215 R&D Projects: GA AV ČR IAA100300503 Institutional research plan: CEZ:AV0Z10300504 Keywords : ontological proofs * existence * non-existence * Gödel * Caramuel Subject RIV: BA - General Mathematics

  2. Independent Study Workbooks for Proofs in Group Theory

    Science.gov (United States)

    Alcock, Lara; Brown, Gavin; Dunning, Clare

    2015-01-01

    This paper describes a small-scale research project based on workbooks designed to support independent study of proofs in a first course on abstract algebra. We discuss the lecturers' aims in designing the workbooks, and set these against a background of research on students' learning of group theory and on epistemological beliefs and study habits…

  3. Embedded Linux in het onderwijs

    NARCIS (Netherlands)

    Dr Ruud Ermers

    2008-01-01

    Embedded Linux wordt bij steeds meer grote bedrijven ingevoerd als embedded operating system. Binnen de opleiding Technische Informatica van Fontys Hogeschool ICT is Embedded Linux geïntroduceerd in samenwerking met het lectoraat Architectuur van Embedded Systemen. Embedded Linux is als vakgebied

  4. Proof Rules for Recursive Procedures

    NARCIS (Netherlands)

    Hesselink, Wim H.

    1993-01-01

    Four proof rules for recursive procedures in a Pascal-like language are presented. The main rule deals with total correctness and is based on results of Gries and Martin. The rule is easier to apply than Martin's. It is introduced as an extension of a specification format for Pascal-procedures, with

  5. Strategy-proof social choice

    OpenAIRE

    Barberà, Salvador, 1946-

    2010-01-01

    This paper surveys the literature on strategy-proofness from a historical perspective. While I discuss the connections with other works on incentives in mechanism design, the main emphasis is on social choice models. This article has been prepared for the Handbook of Social Choice and Welfare, Volume 2, Edited by K. Arrow, A. Sen and K. Suzumura

  6. Computerized Proof Techniques for Undergraduates

    Science.gov (United States)

    Smith, Christopher J.; Tefera, Akalu; Zeleke, Aklilu

    2012-01-01

    The use of computer algebra systems such as Maple and Mathematica is becoming increasingly important and widespread in mathematics learning, teaching and research. In this article, we present computerized proof techniques of Gosper, Wilf-Zeilberger and Zeilberger that can be used for enhancing the teaching and learning of topics in discrete…

  7. IFA proof of principle experiments

    International Nuclear Information System (INIS)

    Olson, C.L.

    1979-01-01

    IFA proof of principle experiments is discussed. Controlled beam front motion experiments are reported, which demonstrate that accurate IFA programming of the motion of the potential well at the head of an IREB has been achieved. The status of IFA ion experiments is also discussed

  8. Embeddings of model subspaces of the Hardy space: compactness and Schatten-von Neumann ideals

    International Nuclear Information System (INIS)

    Baranov, Anton D

    2009-01-01

    We study properties of the embedding operators of model subspaces K p Θ (defined by inner functions) in the Hardy space H p (coinvariant subspaces of the shift operator). We find a criterion for the embedding of K p Θ in L p (μ) to be compact similar to the Volberg-Treil theorem on bounded embeddings, and give a positive answer to a question of Cima and Matheson. The proof is based on Bernstein-type inequalities for functions in K p Θ . We investigate measures μ such that the embedding operator belongs to some Schatten-von Neumann ideal.

  9. Costs and benefits of embedded generation

    International Nuclear Information System (INIS)

    1999-11-01

    This project sought to evaluate the costs and benefits of embedded generation in the light of the UK government's consultation paper on the future of green generation, the government's aim to increase the levels of generation from renewable energy sources and cogeneration, the current Review of the Electricity Trading Arrangements, and the form of the Distribution Price Control. Definitions are given for embedded, centrally dispatched, and pooled generation, and licensed suppliers, and commercial and economic values. The commercial and economic value of embedded generation is examined in terms of generation prices, costs to electrical suppliers, losses (electrical, transmission, distribution), and effects on the national grid and distribution network. Diagrams showing the cost elements of trading through the Pool and the elements that are avoided by non-Pool embedded generator trading are presented

  10. Brauer type embedding problems

    CERN Document Server

    Ledet, Arne

    2005-01-01

    This monograph is concerned with Galois theoretical embedding problems of so-called Brauer type with a focus on 2-groups and on finding explicit criteria for solvability and explicit constructions of the solutions. The advantage of considering Brauer type embedding problems is their comparatively simple condition for solvability in the form of an obstruction in the Brauer group of the ground field. This book presupposes knowledge of classical Galois theory and the attendant algebra. Before considering questions of reducing the embedding problems and reformulating the solvability criteria, the

  11. Time-dependent embedding

    OpenAIRE

    Inglesfield, J. E.

    2007-01-01

    A method of solving the time-dependent Schr\\"odinger equation is presented, in which a finite region of space is treated explicitly, with the boundary conditions for matching the wave-functions on to the rest of the system replaced by an embedding term added on to the Hamiltonian. This time-dependent embedding term is derived from the Fourier transform of the energy-dependent embedding potential, which embeds the time-independent Schr\\"odinger equation. Results are presented for a one-dimensi...

  12. Simulation and Embedded Smart Control

    DEFF Research Database (Denmark)

    Conrad, Finn; Fan, Zhun; Sørensen, Torben

    2006-01-01

    The paper presents results obtained from a Danish mechatronic research program focusing on intelligent motion control, simulation and embedded smart controllers for hydraulic actuators and robots as well as results from the EU projects. A mechatronic test facility with digital controllers...... for a hydraulic robot was implemented. The controllers apply digital signal processors (DSPs), and Field Programmable Gate Array, short named as FPGA, respectively. The DSP controller utilizes the dSPACE System that is suitable for real-time experimentation, evaluation and validation of control laws...... and algorithms. Furthermore, a developed IT-tool concept for controller and system design utilizing the ISO 10303 STEP Standard is proposed....

  13. Completing the proof of “Generic quantum nonlocality”

    Energy Technology Data Exchange (ETDEWEB)

    Gachechiladze, Mariami; Gühne, Otfried, E-mail: otfried.guehne@uni-siegen.de

    2017-04-18

    In a paper by Popescu and Rohrlich a proof has been presented showing that any pure entangled multiparticle quantum state violates some Bell inequality. We point out a gap in this proof, but we also give a construction to close this gap. It turns out that with some extra effort all the results from the aforementioned publication can be proven. Our construction shows how two-particle entanglement can be generated via performing local projections on a multiparticle state. - Highlights: • A proof is completed, showing that any pure entangled multiparticle quantum state violates some Bell inequality. • The results demonstrate how an multi-qubit state can be transformed by local measurements to a two-qubit entangled state. • The extension to higher dimensions is discussed.

  14. US NDC Modernization: Service Oriented Architecture Proof of Concept

    Energy Technology Data Exchange (ETDEWEB)

    Hamlet, Benjamin R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Encarnacao, Andre Villanova [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jackson, Keilan R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hays, Ian A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Barron, Nathan E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Simon, Luke B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Harris, James M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Young, Christopher J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-12-01

    This report is a progress update on the US NDC Modernization Service Oriented Architecture (SOA) study describing results from a proof of concept project completed from May through September 2013. Goals for this proof of concept are 1) gain experience configuring, using, and running an Enterprise Service Bus (ESB), 2) understand the implications of wrapping existing software in standardized interfaces for use as web services, and 3) gather performance metrics for a notional seismic event monitoring pipeline implemented using services with various data access and communication patterns. The proof of concept is a follow on to a previous SOA performance study. Work was performed by four undergraduate summer student interns under the guidance of Sandia staff.

  15. Completing the proof of “Generic quantum nonlocality”

    International Nuclear Information System (INIS)

    Gachechiladze, Mariami; Gühne, Otfried

    2017-01-01

    In a paper by Popescu and Rohrlich a proof has been presented showing that any pure entangled multiparticle quantum state violates some Bell inequality. We point out a gap in this proof, but we also give a construction to close this gap. It turns out that with some extra effort all the results from the aforementioned publication can be proven. Our construction shows how two-particle entanglement can be generated via performing local projections on a multiparticle state. - Highlights: • A proof is completed, showing that any pure entangled multiparticle quantum state violates some Bell inequality. • The results demonstrate how an multi-qubit state can be transformed by local measurements to a two-qubit entangled state. • The extension to higher dimensions is discussed.

  16. Electronics for embedded systems

    CERN Document Server

    Bindal, Ahmet

    2017-01-01

    This book provides semester-length coverage of electronics for embedded systems, covering most common analog and digital circuit-related issues encountered while designing embedded system hardware. It is written for students and young professionals who have basic circuit theory background and want to learn more about passive circuits, diode and bipolar transistor circuits, the state-of-the-art CMOS logic family and its interface with older logic families such as TTL, sensors and sensor physics, operational amplifier circuits to condition sensor signals, data converters and various circuits used in electro-mechanical device control in embedded systems. The book also provides numerous hardware design examples by integrating the topics learned in earlier chapters. The last chapter extensively reviews the combinational and sequential logic design principles to be able to design the digital part of embedded system hardware.

  17. Embedded Fragments Registry (EFR)

    Data.gov (United States)

    Department of Veterans Affairs — In 2009, the Department of Defense estimated that approximately 40,000 service members who served in OEF/OIF may have embedded fragment wounds as the result of small...

  18. Smart Multicore Embedded Systems

    DEFF Research Database (Denmark)

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where very...... specificities of various embedded systems from different industries. Parallel programming tool-chains are described that take as input parameters both the application and the platform model, then determine relevant transformations and mapping decisions on the concrete platform, minimizing user intervention...... and hiding the difficulties related to the correct and efficient use of memory hierarchy and low level code generation. Describes tools and programming models for multicore embedded systems Emphasizes throughout performance per watt scalability Discusses realistic limits of software parallelization Enables...

  19. An Architecture for Proof Planning Systems

    OpenAIRE

    Dennis, Louise Abigail

    2005-01-01

    This paper presents a generic architecture for proof planning systems in terms of an interaction between a customisable proof module and search module. These refer to both global and local information contained in reasoning states.

  20. Design of an elliptic spot illumination system in LED-based color filter-liquid-crystal-on-silicon pico projectors for mobile embedded projection.

    Science.gov (United States)

    Chen, Enguo; Yu, Feihong

    2012-06-01

    We present an elliptic spot illumination system for a color filter-liquid-crystal-on-silicon (CF-LCoS) pico projector employing a specifically designed free-form lens and a cylindrical lens to improve on previous designs in terms of optical efficiency while yielding an ultracompact and low-cost optical architecture. The detailed design description of the optical system is thoroughly investigated. Simulation results coincide well with the theoretical calculation. The single 1  mm×1  mm LED chip-powered optical engine, which employs a CF-LCoS panel with a diagonal of 0.28 in and an aspect ratio of 4:3, has an estimated output efficiency over 9.8% (11.8 lm@1 W) and an ANSI 9-point uniformity over 88.5%, with the ultrasmall volume 24  mm×19  mm×7  mm. Compared to the circular spot-illuminated projection system, a total increment of about 23% of system efficiency is available with this improved optical engine. It is believed that there would be a huge market potential to commercialize our design.

  1. Focused labeled proof systems for modal logic

    OpenAIRE

    Miller , Dale; Volpe , Marco

    2015-01-01

    International audience; Focused proofs are sequent calculus proofs that group inference rules into alternating positive and negative phases. These phases can then be used to define macro-level inference rules from Gentzen's original and tiny introduction and structural rules. We show here that the inference rules of labeled proof systems for modal logics can similarly be described as pairs of such phases within the LKF focused proof system for first-order classical logic. We consider the syst...

  2. Burden of Proof in Bioethics.

    Science.gov (United States)

    Koplin, Julian J; Selgelid, Michael J

    2015-11-01

    A common strategy in bioethics is to posit a prima facie case in favour of one policy, and to then claim that the burden of proof (that this policy should be rejected) falls on those with opposing views. If the burden of proof is not met, it is claimed, then the policy in question should be accepted. This article illustrates, and critically evaluates, examples of this strategy in debates about the sale of organs by living donors, human enhancement, and the precautionary principle. We highlight general problems with this style of argument, and particular problems with its use in specific cases. We conclude that the burden ultimately falls on decision-makers (i.e. policy-makers) to choose the policy supported by the best reasons. © 2015 John Wiley & Sons Ltd.

  3. Student Teachers’ Proof Schemes on Proof Tasks Involving Inequality: Deductive or Inductive?

    Science.gov (United States)

    Rosyidi, A. H.; Kohar, A. W.

    2018-01-01

    Exploring student teachers’ proof ability is crucial as it is important for improving the quality of their learning process and help their future students learn how to construct a proof. Hence, this study aims at exploring at the proof schemes of student teachers in the beginning of their studies. Data were collected from 130 proofs resulted by 65 Indonesian student teachers on two proof tasks involving algebraic inequality. To analyse, the proofs were classified into the refined proof schemes level proposed by Lee (2016) ranging from inductive, which only provides irrelevant inferences, to deductive proofs, which consider addressing formal representation. Findings present several examples of each of Lee’s level on the student teachers’ proofs spanning from irrelevant inferences, novice use of examples or logical reasoning, strategic use examples for reasoning, deductive inferences with major and minor logical coherence, and deductive proof with informal and formal representation. Besides, it was also found that more than half of the students’ proofs coded as inductive schemes, which does not meet the requirement for doing the proof for the proof tasks examined in this study. This study suggests teacher educators in teacher colleges to reform the curriculum regarding proof learning which can accommodate the improvement of student teachers’ proving ability from inductive to deductive proof as well from informal to formal proof.

  4. Integrated Design Tools for Embedded Control Systems

    NARCIS (Netherlands)

    Jovanovic, D.S.; Hilderink, G.H.; Broenink, Johannes F.; Karelse, F.

    2001-01-01

    Currently, computer-based control systems are still being implemented using the same techniques as 10 years ago. The purpose of this project is the development of a design framework, consisting of tools and libraries, which allows the designer to build high reliable heterogeneous real-time embedded

  5. A device for heat-proofing the closing slab of a fast neutron nuclear reactor

    International Nuclear Information System (INIS)

    Lemercier, Guy.

    1973-01-01

    A device proofing the closing-slab comprising a metal-shoe against which is applied said device, the latter being constituted by a plurality of panels, each of which is formed by a padding of superimposed metal-cloths arranged in parallel relationship to the slab to be heat-proofed. Said device is characterized in that each panel is contained in a casing applied against the slab, constituted by two metal half-boxes of parallelepipedic shape embedded into each other. This can be applied to high-power reactors for protecting the slab against the aerosols of the coolant liquid-metal [fr

  6. Using Software Architectures for Designing Distributed Embedded Systems

    DEFF Research Database (Denmark)

    Christensen, Henrik Bærbak

    In this paper, we outline an on-going project of designing distributed embedded systems for closed-loop process control. The project is a joint effort between software architecture researchers and developers from two companies that produce commercial embedded process control systems. The project...... has a strong emphasis on software architectural issues and terminology in order to envision, design and analyze design alternatives. We present two results. First, we outline how focusing on software architecture, architectural issues and qualities are beneficial in designing distributed, embedded......, systems. Second, we present two different architectures for closed-loop process control and discuss benefits and reliabilities....

  7. Embedded Systems Design: Optimization Challenges

    DEFF Research Database (Denmark)

    Pop, Paul

    2005-01-01

    Summary form only given. Embedded systems are everywhere: from alarm clocks to PDAs, from mobile phones to cars, almost all the devices we use are controlled by embedded systems. Over 99% of the microprocessors produced today are used in embedded systems, and recently the number of embedded systems...

  8. Smart multicore embedded systems

    CERN Document Server

    Bertels, Koen; Karlsson, Sven; Pacull, François

    2014-01-01

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where very often they are forced to rewrite sequential programs into parallel software, taking into account all the low level features and peculiarities of the underlying platforms. Readers will benefit from these authors’ approach, which takes into account both the application requirements and the platform specificities of various embedded systems from different industries. Parallel programming tool-chains are described that take as input parameters both the application and the platform model, then determine relevant transformations and mapping decisions on the concrete platform, minimizing user intervention and hiding the difficulties related to the correct and efficient use of memory hierarchy and low level code generati...

  9. Polarizable Density Embedding

    DEFF Research Database (Denmark)

    Olsen, Jógvan Magnus Haugaard; Steinmann, Casper; Ruud, Kenneth

    2015-01-01

    We present a new QM/QM/MM-based model for calculating molecular properties and excited states of solute-solvent systems. We denote this new approach the polarizable density embedding (PDE) model and it represents an extension of our previously developed polarizable embedding (PE) strategy. The PDE...... model is a focused computational approach in which a core region of the system studied is represented by a quantum-chemical method, whereas the environment is divided into two other regions: an inner and an outer region. Molecules belonging to the inner region are described by their exact densities...

  10. A proof of Bertrand's postulate

    Directory of Open Access Journals (Sweden)

    Andrea Asperti

    2012-01-01

    Full Text Available We discuss the formalization, in the Matita Interactive Theorem Prover, of some results by Chebyshev concerning the distribution of prime numbers, subsuming, as a corollary, Bertrand's postulate.Even if Chebyshev's result has been later superseded by the stronger prime number theorem, his machinery, and in particular the two functions psi and theta still play a central role in the modern development of number theory. The proof makes use of most part of the machinery of elementary arithmetics, and in particular of properties of prime numbers, gcd, products and summations, providing a natural benchmark for assessing the actual development of the arithmetical knowledge base.

  11. Lakatos and Hersh on Mathematical Proof

    Directory of Open Access Journals (Sweden)

    Hossein Bayat

    2015-12-01

    Full Text Available The concept of Mathematical Proof has been controversial for the past few decades. Different philosophers have offered different theories about the nature of Mathematical Proof, among which theories presented by Lakatos and Hersh have had significant similarities and differences with each other. It seems that a comparison and critical review of these two theories will lead to a better understanding of the concept of mathematical proof and will be a big step towards solving many related problems. Lakatos and Hersh argue that, firstly, “mathematical proof” has two different meanings, formal and informal; and, secondly, informal proofs are affected by human factors, such as individual decisions and collective agreements. I call these two thesis, respectively, “proof dualism” and “humanism”. But on the other hand, their theories have significant dissimilarities and are by no means equivalent. Lakatos is committed to linear proof dualism and methodological humanism, while Hersh’s theory involves some sort of parallel proof dualism and sociological humanism. According to linear proof dualism, the two main types of proofs are provided in order to achieve a common goal: incarnation of mathematical concepts and methods and truth. However, according to the parallel proof dualism, two main types of proofs are provided in order to achieve two different types of purposes: production of a valid sequence of signs (the goal of the formal proof and persuasion of the audience (the goal of the informal proof. Hersh’s humanism is informative and indicates pluralism; whereas, Lakatos’ version of humanism is normative and monistic.

  12. Eigenvalues, embeddings and generalised trigonometric functions

    CERN Document Server

    Lang, Jan

    2011-01-01

    The main theme of the book is the study, from the standpoint of s-numbers, of integral operators of Hardy type and related Sobolev embeddings. In the theory of s-numbers the idea is to attach to every bounded linear map between Banach spaces a monotone decreasing sequence of non-negative numbers with a view to the classification of operators according to the way in which these numbers approach a limit: approximation numbers provide an especially important example of such numbers. The asymptotic behavior of the s-numbers of Hardy operators acting between Lebesgue spaces is determined here in a wide variety of cases. The proof methods involve the geometry of Banach spaces and generalized trigonometric functions; there are connections with the theory of the p-Laplacian.

  13. Embedding JIT into MRP

    NARCIS (Netherlands)

    Flapper, S.D.P.; Miltenburg, G.J.; Wijngaard, J.

    1991-01-01

    Today many companies who are using MRP production control systems are investigating how they can produce some or all of their products using just-in time (JIT) principles. They wonder to what extent MRP can provide support for JIT production. This paper describes how JIT can be embedded into MRP. A

  14. Embedded Multimaterial Extrusion Bioprinting

    NARCIS (Netherlands)

    Rocca, Marco; Fragasso, Alessio; Liu, Wanjun; Heinrich, Marcel A.; Zhang, Yu Shrike

    Embedded extrusion bioprinting allows for the generation of complex structures that otherwise cannot be achieved with conventional layer-by-layer deposition from the bottom, by overcoming the limits imposed by gravitational force. By taking advantage of a hydrogel bath, serving as a sacrificial

  15. Embedded data representations

    DEFF Research Database (Denmark)

    Willett, Wesley; Jansen, Yvonne; Dragicevic, Pierre

    2017-01-01

    We introduce embedded data representations, the use of visual and physical representations of data that are deeply integrated with the physical spaces, objects, and entities to which the data refers. Technologies like lightweight wireless displays, mixed reality hardware, and autonomous vehicles...

  16. Polarizable Density Embedding

    DEFF Research Database (Denmark)

    Reinholdt, Peter; Kongsted, Jacob; Olsen, Jógvan Magnus Haugaard

    2017-01-01

    We analyze the performance of the polarizable density embedding (PDE) model-a new multiscale computational approach designed for prediction and rationalization of general molecular properties of large and complex systems. We showcase how the PDE model very effectively handles the use of large...

  17. Embedded enzymes catalyse capture

    Science.gov (United States)

    Kentish, Sandra

    2018-05-01

    Membrane technologies for carbon capture can offer economic and environmental advantages over conventional amine-based absorption, but can suffer from limited gas flux and selectivity to CO2. Now, a membrane based on enzymes embedded in hydrophilic pores is shown to exhibit combined flux and selectivity that challenges the state of the art.

  18. Formal Proofs for Nonlinear Optimization

    Directory of Open Access Journals (Sweden)

    Victor Magron

    2015-01-01

    Full Text Available We present a formally verified global optimization framework. Given a semialgebraic or transcendental function f and a compact semialgebraic domain K, we use the nonlinear maxplus template approximation algorithm to provide a certified lower bound of f over K.This method allows to bound in a modular way some of the constituents of f by suprema of quadratic forms with a well chosen curvature. Thus, we reduce the initial goal to a hierarchy of semialgebraic optimization problems, solved by sums of squares relaxations. Our implementation tool interleaves  semialgebraic approximations with sums of squares witnesses to form certificates. It is interfaced with Coq and thus benefits from the trusted arithmetic available inside the proof assistant. This feature is used to produce, from the certificates, both valid underestimators and lower bounds for each approximated constituent.The application range for such a tool is widespread; for instance Hales' proof of Kepler's conjecture yields thousands of multivariate transcendental inequalities. We illustrate the performance of our formal framework on some of these inequalities as well as on examples from the global optimization literature.

  19. Technical solutions to enable embedded generation growth

    Energy Technology Data Exchange (ETDEWEB)

    Lynch, C.A.; Todd, S.; Millar, W.; Wood, H.S.

    2003-07-01

    This report describes the results of one of a series of studies commissioned by the UK Department of Trade and Industry into various aspects of embedded generation with the aim of supporting the development and deployment of electrical sources (particularly their ease of connection to the network) to deliver power to consumers. The first phase of the project involved a literature review and meetings with embedded generation developers and planning engineers from distribution network operators (DNOs). The second phase investigated embedded generation at different levels of the distribution network and included modelling a representative network. Technologies that could facilitate a significant increase in embedded generation were identified and estimates made of when and where significant development would be needed. Technical problems identified by DNOs were concerned with thermal loading, voltage regulation, fault levels, protection and network operation. A number of non-technical (commercial and regulatory) problems were also identified. The report describes the UK regulatory framework, the present situation, the British power system, the accommodation of embedded generation by established means, the representative model and technical innovations.

  20. Introduction to proof in abstract mathematics

    CERN Document Server

    Wohlgemuth, Andrew

    2011-01-01

    The primary purpose of this undergraduate text is to teach students to do mathematical proofs. It enables readers to recognize the elements that constitute an acceptable proof, and it develops their ability to do proofs of routine problems as well as those requiring creative insights. The self-contained treatment features many exercises, problems, and selected answers, including worked-out solutions. Starting with sets and rules of inference, this text covers functions, relations, operation, and the integers. Additional topics include proofs in analysis, cardinality, and groups. Six appendixe

  1. Impact- and earthquake- proof roof structure

    International Nuclear Information System (INIS)

    Shohara, Ryoichi.

    1990-01-01

    Building roofs are constituted with roof slabs, an earthquake proof layer at the upper surface thereof and an impact proof layer made of iron-reinforced concrete disposed further thereover. Since the roofs constitute an earthquake proof structure loading building dampers on the upper surface of the slabs by the concrete layer, seismic inputs of earthquakes to the buildings can be moderated and the impact-proof layer is formed, to ensure the safety to external conditions such as earthquakes or falling accidents of airplane in important facilities such as reactor buildings. (T.M.)

  2. Embedding in thermosetting resins

    International Nuclear Information System (INIS)

    Buzonniere, A. de

    1985-01-01

    Medium activity waste coming either from nuclear power plants in operation such as evaporator concentrates, spent resins, filter cartridges or the dismantling of installations are embedded in order to obtain a product suitable for long term disposal. Embedding in thermosetting resins (polyester or epoxy) is one among currently used techniques; it is being developed by the CEA (Commissariat a l'Energie Atomique) and Technicatome (subsidiary of CEA and EDF). The process is easy to operate and yields excellent results particularly as far as volume reduction and radioelement containment (cesium particularly) are concerned. The process has already been in operation in four stationary plants for several years. Extension of the process to mobile units has been completed by Technicatome in collaboration with the CEA [fr

  3. Bistatic SAR: Proof of Concept.

    Energy Technology Data Exchange (ETDEWEB)

    Yocky, David A.; Doren, Neall E.; Bacon, Terry A.; Wahl, Daniel E.; Eichel, Paul H.; Jakowatz, Charles V,; Delaplain, Gilbert G.; Dubbert, Dale F.; Tise, Bertice L.; White, Kyle R.

    2014-10-01

    Typical synthetic aperture RADAR (SAR) imaging employs a co-located RADAR transmitter and receiver. Bistatic SAR imaging separates the transmitter and receiver locations. A bistatic SAR configuration allows for the transmitter and receiver(s) to be in a variety of geometric alignments. Sandia National Laboratories (SNL) / New Mexico proposed the deployment of a ground-based RADAR receiver. This RADAR receiver was coupled with the capability of digitizing and recording the signal collected. SNL proposed the possibility of creating an image of targets the illuminating SAR observes. This document describes the developed hardware, software, bistatic SAR configuration, and its deployment to test the concept of a ground-based bistatic SAR. In the proof-of-concept experiments herein, the RADAR transmitter will be a commercial SAR satellite and the RADAR receiver will be deployed at ground level, observing and capturing RADAR ground/targets illuminated by the satellite system.

  4. Prospective Teachers' Conceptions of Proof Comprehension: Revisiting a Proof of the Pythagorean Theorem

    Science.gov (United States)

    Zazkis, Dov; Zazkis, Rina

    2016-01-01

    A significant body of research literature in mathematics education attends to mathematical proofs. However, scant research attends to proof comprehension, which is the focus of this study. We examine perspective secondary teachers' conceptions of what constitutes comprehension of a given proof and their ideas of how students' comprehension can be…

  5. Proof Problems with Diagrams: An Opportunity for Experiencing Proofs and Refutations

    Science.gov (United States)

    Komatsu, Kotaro; Tsujiyama, Yosuke; Sakamaki, Aruta; Koike, Norio

    2014-01-01

    It has become gradually accepted that proof and proving are essential at all grades of mathematical learning. Among the various aspects of proof and proving, this study addresses proofs and refutations described by Lakatos, in particular a part of increasing content by deductive guessing, to introduce an authentic process into mathematics…

  6. Embedded Librarians: Just-in-Time or Just-in-Case? A Research Study

    Science.gov (United States)

    Heathcock, Kristin

    2015-01-01

    Embedded librarians in online courses provide a wealth of service and information to students. Though students indicate that these services are valuable, the librarians providing embedded services frequently note that these projects are very time consuming. This study examines the provision of a less time-intensive model of embedded librarianship…

  7. Projectables

    DEFF Research Database (Denmark)

    Rasmussen, Troels A.; Merritt, Timothy R.

    2017-01-01

    CNC cutting machines have become essential tools for designers and architects enabling rapid prototyping, model-building and production of high quality components. Designers often cut from new materials, discarding the irregularly shaped remains. We introduce ProjecTables, a visual augmented...... reality system for interactive packing of model parts onto sheet materials. ProjecTables enables designers to (re)use scrap materials for CNC cutting that would have been previously thrown away, at the same time supporting aesthetic choices related to wood grain, avoiding surface blemishes, and other...... relevant material properties. We conducted evaluations of ProjecTables with design students from Aarhus School of Architecture, demonstrating that participants could quickly and easily place and orient model parts reducing material waste. Contextual interviews and ideation sessions led to a deeper...

  8. Time-dependent potential-functional embedding theory

    International Nuclear Information System (INIS)

    Huang, Chen; Libisch, Florian; Peng, Qing; Carter, Emily A.

    2014-01-01

    We introduce a time-dependent potential-functional embedding theory (TD-PFET), in which atoms are grouped into subsystems. In TD-PFET, subsystems can be propagated by different suitable time-dependent quantum mechanical methods and their interactions can be treated in a seamless, first-principles manner. TD-PFET is formulated based on the time-dependent quantum mechanics variational principle. The action of the total quantum system is written as a functional of the time-dependent embedding potential, i.e., a potential-functional formulation. By exploiting the Runge-Gross theorem, we prove the uniqueness of the time-dependent embedding potential under the constraint that all subsystems share a common embedding potential. We derive the integral equation that such an embedding potential needs to satisfy. As proof-of-principle, we demonstrate TD-PFET for a Na 4 cluster, in which each Na atom is treated as one subsystem and propagated by time-dependent Kohn-Sham density functional theory (TDDFT) using the adiabatic local density approximation (ALDA). Our results agree well with a direct TDDFT calculation on the whole Na 4 cluster using ALDA. We envision that TD-PFET will ultimately be useful for studying ultrafast quantum dynamics in condensed matter, where key regions are solved by highly accurate time-dependent quantum mechanics methods, and unimportant regions are solved by faster, less accurate methods

  9. Multiparty session types as coherence proofs

    DEFF Research Database (Denmark)

    Carbone, Marco; Montesi, Fabrizio; Schürmann, Carsten

    2017-01-01

    We propose a Curry–Howard correspondence between a language for programming multiparty sessions and a generalisation of Classical Linear Logic (CLL). In this framework, propositions correspond to the local behaviour of a participant in a multiparty session type, proofs to processes, and proof nor...

  10. Verifying Process Algebra Proofs in Type Theory

    NARCIS (Netherlands)

    Sellink, M.P.A.

    In this paper we study automatic verification of proofs in process algebra. Formulas of process algebra are represented by types in typed λ-calculus. Inhabitants (terms) of these types represent proofs. The specific typed λ-calculus we use is the Calculus of Inductive Constructions as implemented

  11. Other trigonometric proofs of Pythagoras theorem

    OpenAIRE

    Luzia, Nuno

    2015-01-01

    Only very recently a trigonometric proof of the Pythagoras theorem was given by Zimba \\cite{1}, many authors thought this was not possible. In this note we give other trigonometric proofs of Pythagoras theorem by establishing, geometrically, the half-angle formula $\\cos\\theta=1-2\\sin^2 \\frac{\\theta}{2}$.

  12. Proof in Algebra: Reasoning beyond Examples

    Science.gov (United States)

    Otten, Samuel; Herbel-Eisenmann, Beth A.; Males, Lorraine M.

    2010-01-01

    The purpose of this article is to provide an image of what proof could look like in beginning algebra, a course that nearly every secondary school student encounters. The authors present an actual classroom vignette in which a rich opportunity for student reasoning arose. After analyzing the proof schemes at play, the authors provide a…

  13. On Callan's proof of the BPHZ theorem

    International Nuclear Information System (INIS)

    Lesniewski, A.

    1984-01-01

    The author gives an elementary proof of the BPHZ theorem in the case of the Euclidean lambdaphi 4 theory. The method of proof relies on a detailed analysis of the skeleton structure of graphs and estimates based on the Callan-Symanzik equations. (Auth.)

  14. Interval logic. Proof theory and theorem proving

    DEFF Research Database (Denmark)

    Rasmussen, Thomas Marthedal

    2002-01-01

    of a direction of an interval, and present a sound and complete Hilbert proof system for it. Because of its generality, SIL can conveniently act as a general formalism in which other interval logics can be encoded. We develop proof theory for SIL including both a sequent calculus system and a labelled natural...

  15. The statistical strength of nonlocality proofs

    NARCIS (Netherlands)

    Dam, van W.; Gill, R.D.; Grünwald, P.D.

    2005-01-01

    There exist numerous proofs of Bell's theorem, stating that quantum mechanics is incompatible with local realistic theories of nature. Here the strength of such nonlocality proofs is defined in terms of the amount of evidence against local realism provided by the corresponding experiments.

  16. Dynamic temperature measurements with embedded optical sensors.

    Energy Technology Data Exchange (ETDEWEB)

    Dolan, Daniel H.,; Seagle, Christopher T; Ao, Tommy

    2013-10-01

    This report summarizes LDRD project number 151365, \\Dynamic Temperature Measurements with Embedded Optical Sensors". The purpose of this project was to develop an optical sensor capable of detecting modest temperature states (<1000 K) with nanosecond time resolution, a recurring diagnostic need in dynamic compression experiments at the Sandia Z machine. Gold sensors were selected because the visible re ectance spectrum of gold varies strongly with temperature. A variety of static and dynamic measurements were performed to assess re ectance changes at di erent temperatures and pressures. Using a minimal optical model for gold, a plausible connection between static calibrations and dynamic measurements was found. With re nements to the model and diagnostic upgrades, embedded gold sensors seem capable of detecting minor (<50 K) temperature changes under dynamic compression.

  17. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  18. Integrated Design Tools for Embedded Control Systems

    OpenAIRE

    Jovanovic, D.S.; Hilderink, G.H.; Broenink, Johannes F.; Karelse, F.

    2001-01-01

    Currently, computer-based control systems are still being implemented using the same techniques as 10 years ago. The purpose of this project is the development of a design framework, consisting of tools and libraries, which allows the designer to build high reliable heterogeneous real-time embedded systems in a very short time at a fraction of the present day costs. The ultimate focus of current research is on transformation control laws to efficient concurrent algorithms, with concerns about...

  19. System Description: Embedding Verification into Microsoft Excel

    OpenAIRE

    Collins, Graham; Dennis, Louise Abigail

    2000-01-01

    The aim of the PROSPER project is to allow the embedding of existing verification technology into applications in such a way that the theorem proving is hidden, or presented to the end user in a natural way. This paper describes a system built to test whether the PROSPER toolkit satisfied this aim. The system combines the toolkit with Microsoft Excel, a popular commercial spreadsheet application.

  20. Unsteady Flame Embedding

    KAUST Repository

    El-Asrag, Hossam A.

    2011-01-01

    Direct simulation of all the length and time scales relevant to practical combustion processes is computationally prohibitive. When combustion processes are driven by reaction and transport phenomena occurring at the unresolved scales of a numerical simulation, one must introduce a dynamic subgrid model that accounts for the multiscale nature of the problem using information available on a resolvable grid. Here, we discuss a model that captures unsteady flow-flame interactions- including extinction, re-ignition, and history effects-via embedded simulations at the subgrid level. The model efficiently accounts for subgrid flame structure and incorporates detailed chemistry and transport, allowing more accurate prediction of the stretch effect and the heat release. In this chapter we first review the work done in the past thirty years to develop the flame embedding concept. Next we present a formulation for the same concept that is compatible with Large Eddy Simulation in the flamelet regimes. The unsteady flame embedding approach (UFE) treats the flame as an ensemble of locally one-dimensional flames, similar to the flamelet approach. However, a set of elemental one-dimensional flames is used to describe the turbulent flame structure directly at the subgrid level. The calculations employ a one-dimensional unsteady flame model that incorporates unsteady strain rate, curvature, and mixture boundary conditions imposed by the resolved scales. The model is used for closure of the subgrid terms in the context of large eddy simulation. Direct numerical simulation (DNS) data from a flame-vortex interaction problem is used for comparison. © Springer Science+Business Media B.V. 2011.

  1. Embedded microcontroller interfacing

    CERN Document Server

    Gupta, Gourab Sen

    2010-01-01

    Mixed-Signal Embedded Microcontrollers are commonly used in integrating analog components needed to control non-digital electronic systems. They are used in automatically controlled devices and products, such as automobile engine control systems, wireless remote controllers, office machines, home appliances, power tools, and toys. Microcontrollers make it economical to digitally control even more devices and processes by reducing the size and cost, compared to a design that uses a separate microprocessor, memory, and input/output devices. In many undergraduate and post-graduate courses, teachi

  2. Societal embedding of climate-friendly innovations

    International Nuclear Information System (INIS)

    Vaeyrynen, E.; Kivisaari, Sirkku; Lovio, R.

    2002-01-01

    This project assesses the possibilities of constructing a market for climate-friendly energy technologies by applying the process of 'societal embedding of innovations'. The term refers to an interactive learning process amongst three groups of key actors: producers, users and societal actors. Their co-operation shapes the innovation to fit the needs of the market and contributes to creation of conditions in which the innovation can be adopted. The project consists of two case studies: (1) Shaping of the ESCO energy service concept in Finnish municipalities and (2) Increasing the use of wood pellets in single-family houses. The case studies have illustrated the possibilities and limitations concerning the application of societal embedding in the energy sector. The project indicates that societal embedding may promote the implementation of climate-friendly energy technologies in at least three ways. Firstly, the process mobilises key actors to cooperation. This generates interactive learning on the problem and its solving. Market construction is forged ahead by mutual adaptation of the innovation and its environment. Secondly, this approach offers a tool to examine the societal quality of the innovation, a question related vitally to climate change. Thirdly, by producing new knowledge of the needs on the market this approach supports the societal actors in choosing different instruments to induce the intended transition to sustainability. (orig.)

  3. Unicycle Project Report

    OpenAIRE

    Thomson, S

    2010-01-01

    The Unicycle project implemented an institutional Open Educational Resource repository with a view to ensuring sustainability in approach by embedding OER as an Assessment, Learning and Teaching strategy. This is the final submitted report for the project.

  4. Embedded Multimaterial Extrusion Bioprinting.

    Science.gov (United States)

    Rocca, Marco; Fragasso, Alessio; Liu, Wanjun; Heinrich, Marcel A; Zhang, Yu Shrike

    2018-04-01

    Embedded extrusion bioprinting allows for the generation of complex structures that otherwise cannot be achieved with conventional layer-by-layer deposition from the bottom, by overcoming the limits imposed by gravitational force. By taking advantage of a hydrogel bath, serving as a sacrificial printing environment, it is feasible to extrude a bioink in freeform until the entire structure is deposited and crosslinked. The bioprinted structure can be subsequently released from the supporting hydrogel and used for further applications. Combining this advanced three-dimensional (3D) bioprinting technique with a multimaterial extrusion printhead setup enables the fabrication of complex volumetric structures built from multiple bioinks. The work described in this paper focuses on the optimization of the experimental setup and proposes a workflow to automate the bioprinting process, resulting in a fast and efficient conversion of a virtual 3D model into a physical, extruded structure in freeform using the multimaterial embedded bioprinting system. It is anticipated that further development of this technology will likely lead to widespread applications in areas such as tissue engineering, pharmaceutical testing, and organs-on-chips.

  5. Learning optimal embedded cascades.

    Science.gov (United States)

    Saberian, Mohammad Javad; Vasconcelos, Nuno

    2012-10-01

    The problem of automatic and optimal design of embedded object detector cascades is considered. Two main challenges are identified: optimization of the cascade configuration and optimization of individual cascade stages, so as to achieve the best tradeoff between classification accuracy and speed, under a detection rate constraint. Two novel boosting algorithms are proposed to address these problems. The first, RCBoost, formulates boosting as a constrained optimization problem which is solved with a barrier penalty method. The constraint is the target detection rate, which is met at all iterations of the boosting process. This enables the design of embedded cascades of known configuration without extensive cross validation or heuristics. The second, ECBoost, searches over cascade configurations to achieve the optimal tradeoff between classification risk and speed. The two algorithms are combined into an overall boosting procedure, RCECBoost, which optimizes both the cascade configuration and its stages under a detection rate constraint, in a fully automated manner. Extensive experiments in face, car, pedestrian, and panda detection show that the resulting detectors achieve an accuracy versus speed tradeoff superior to those of previous methods.

  6. Distributed analysis with PROOF in ATLAS collaboration

    International Nuclear Information System (INIS)

    Panitkin, S Y; Ernst, M; Ito, H; Maeno, T; Majewski, S; Rind, O; Tarrade, F; Wenaus, T; Ye, S; Benjamin, D; Montoya, G Carillo; Guan, W; Mellado, B; Xu, N; Cranmer, K; Shibata, A

    2010-01-01

    The Parallel ROOT Facility - PROOF is a distributed analysis system which allows to exploit inherent event level parallelism of high energy physics data. PROOF can be configured to work with centralized storage systems, but it is especially effective together with distributed local storage systems - like Xrootd, when data are distributed over computing nodes. It works efficiently on different types of hardware and scales well from a multi-core laptop to large computing farms. From that point of view it is well suited for both large central analysis facilities and Tier 3 type analysis farms. PROOF can be used in interactive or batch like regimes. The interactive regime allows the user to work with typically distributed data from the ROOT command prompt and get a real time feedback on analysis progress and intermediate results. We will discuss our experience with PROOF in the context of ATLAS Collaboration distributed analysis. In particular we will discuss PROOF performance in various analysis scenarios and in multi-user, multi-session environments. We will also describe PROOF integration with the ATLAS distributed data management system and prospects of running PROOF on geographically distributed analysis farms.

  7. Distributed analysis with PROOF in ATLAS collaboration

    Energy Technology Data Exchange (ETDEWEB)

    Panitkin, S Y; Ernst, M; Ito, H; Maeno, T; Majewski, S; Rind, O; Tarrade, F; Wenaus, T; Ye, S [Brookhaven National Laboratory, Upton, NY 11973 (United States); Benjamin, D [Duke University, Durham, NC 27708 (United States); Montoya, G Carillo; Guan, W; Mellado, B; Xu, N [University of Wisconsin-Madison, Madison, WI 53706 (United States); Cranmer, K; Shibata, A [New York University, New York, NY 10003 (United States)

    2010-04-01

    The Parallel ROOT Facility - PROOF is a distributed analysis system which allows to exploit inherent event level parallelism of high energy physics data. PROOF can be configured to work with centralized storage systems, but it is especially effective together with distributed local storage systems - like Xrootd, when data are distributed over computing nodes. It works efficiently on different types of hardware and scales well from a multi-core laptop to large computing farms. From that point of view it is well suited for both large central analysis facilities and Tier 3 type analysis farms. PROOF can be used in interactive or batch like regimes. The interactive regime allows the user to work with typically distributed data from the ROOT command prompt and get a real time feedback on analysis progress and intermediate results. We will discuss our experience with PROOF in the context of ATLAS Collaboration distributed analysis. In particular we will discuss PROOF performance in various analysis scenarios and in multi-user, multi-session environments. We will also describe PROOF integration with the ATLAS distributed data management system and prospects of running PROOF on geographically distributed analysis farms.

  8. The on-board tailpipe emissions measurement system (TOTEMS) : proof\\0x2010 of\\0x2010concept.

    Science.gov (United States)

    2009-06-03

    An on-board tailpipe emissions instrumentation system was designed, assembled and tested as proof-of-concept : for the University of Vermonts Transportation Research Center (TRC) Signature Project #2 real-world vehicle : emissions data colle...

  9. Safety-critical Java for embedded systems

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Dalsgaard, Andreas Engelbredt; Hansen, René Rydhof

    2016-01-01

    This paper presents the motivation for and outcomes of an engineering research project on certifiable Javafor embedded systems. The project supports the upcoming standard for safety-critical Java, which defines asubset of Java and libraries aiming for development of high criticality systems....... The outcome of this projectinclude prototype safety-critical Java implementations, a time-predictable Java processor, analysis tools formemory safety, and example applications to explore the usability of safety-critical Java for this applicationarea. The text summarizes developments and key contributions...

  10. Hybrid Logic and its Proof-Theory

    CERN Document Server

    Brauner, Torben

    2011-01-01

    This is the first book-length treatment of hybrid logic and its proof-theory. Hybrid logic is an extension of ordinary modal logic which allows explicit reference to individual points in a model (where the points represent times, possible worlds, states in a computer, or something else). This is useful for many applications, for example when reasoning about time one often wants to formulate a series of statements about what happens at specific times. There is little consensus about proof-theory for ordinary modal logic. Many modal-logical proof systems lack important properties and the relatio

  11. ROPE: Recoverable Order-Preserving Embedding of Natural Language

    Energy Technology Data Exchange (ETDEWEB)

    Widemann, David P. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Wang, Eric X. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Thiagarajan, Jayaraman J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-02-11

    We present a novel Recoverable Order-Preserving Embedding (ROPE) of natural language. ROPE maps natural language passages from sparse concatenated one-hot representations to distributed vector representations of predetermined fixed length. We use Euclidean distance to return search results that are both grammatically and semantically similar. ROPE is based on a series of random projections of distributed word embeddings. We show that our technique typically forms a dictionary with sufficient incoherence such that sparse recovery of the original text is possible. We then show how our embedding allows for efficient and meaningful natural search and retrieval on Microsoft’s COCO dataset and the IMDB Movie Review dataset.

  12. Programming Windows® Embedded CE 60 Developer Reference

    CERN Document Server

    Boling, Douglas

    2010-01-01

    Get the popular, practical reference to developing small footprint applications-now updated for the Windows Embedded CE 6.0 kernel. Written by an authority on embedded application development, this book focuses in on core operating concepts and the Win32 API. It delivers extensive code samples and sample projects-helping you build proficiency creating innovative Windows applications for a new generation of devices. Discover how to: Create complex applications designed for the unique requirements of embedded devicesManage virtual memory, heaps, and the stack to minimize your memory footprintC

  13. Spatially Embedded Inequality

    DEFF Research Database (Denmark)

    Holck, Lotte

    2016-01-01

    /methodology/approach: – The (re)production of inequality is explored by linking research on organizational space with HRM diversity management. Data from an ethnographic study undertaken in a Danish municipal center illustrates how a substructure of inequality is spatially upheld alongside a formal diversity policy. Archer...... and ethnification of job categories. However, the same spatial structures allows for a variety of opposition and conciliation strategies among minority employees, even though the latter tend to prevail in a reproduction rather than a transformation of the organizational opportunity structures. Research limitations...... the more subtle, spatially embedded forms of inequality. Originality/value: – Theoretical and empirical connections between research on organizational space and HRM diversity management have thus far not been systematically studied. This combination might advance knowledge on the persistence of micro...

  14. Embedded sensor systems

    CERN Document Server

    Agrawal, Dharma Prakash

    2017-01-01

    This inspiring textbook provides an introduction to wireless technologies for sensors, explores potential use of sensors for numerous applications, and utilizes probability theory and mathematical methods as a means of embedding sensors in system design. It discusses the need for synchronization and underlying limitations, inter-relation between given coverage and connectivity to number of sensors needed, and the use of geometrical distance to determine location of the base station for data collection and explore use of anchor nodes for relative position determination of sensors. The book explores energy conservation, communication using TCP, the need for clustering and data aggregation, and residual energy determination and energy harvesting. It covers key topics of sensor communication like mobile base stations and relay nodes, delay-tolerant sensor networks, and remote sensing and possible applications. The book defines routing methods and do performance evaluation for random and regular sensor topology an...

  15. Communicating embedded systems networks applications

    CERN Document Server

    Krief, Francine

    2013-01-01

    Embedded systems become more and more complex and require having some knowledge in various disciplines such as electronics, data processing, telecommunications and networks. Without detailing all the aspects related to the design of embedded systems, this book, which was written by specialists in electronics, data processing and telecommunications and networks, gives an interesting point of view of communication techniques and problems in embedded systems. This choice is easily justified by the fact that embedded systems are today massively communicating and that telecommunications and network

  16. Advances in embedded computer vision

    CERN Document Server

    Kisacanin, Branislav

    2014-01-01

    This illuminating collection offers a fresh look at the very latest advances in the field of embedded computer vision. Emerging areas covered by this comprehensive text/reference include the embedded realization of 3D vision technologies for a variety of applications, such as stereo cameras on mobile devices. Recent trends towards the development of small unmanned aerial vehicles (UAVs) with embedded image and video processing algorithms are also examined. The authoritative insights range from historical perspectives to future developments, reviewing embedded implementation, tools, technolog

  17. Embedded Systems Design with FPGAs

    CERN Document Server

    Pnevmatikatos, Dionisios; Sklavos, Nicolas

    2013-01-01

    This book presents methodologies for modern applications of embedded systems design, using field programmable gate array (FPGA) devices.  Coverage includes state-of-the-art research from academia and industry on a wide range of topics, including advanced electronic design automation (EDA), novel system architectures, embedded processors, arithmetic, dynamic reconfiguration and applications. Describes a variety of methodologies for modern embedded systems design;  Implements methodologies presented on FPGAs; Covers a wide variety of applications for reconfigurable embedded systems, including Bioinformatics, Communications and networking, Application acceleration, Medical solutions, Experiments for high energy physics, Astronomy, Aerospace, Biologically inspired systems and Computational fluid dynamics (CFD).

  18. Embedding Complementarity in HCI Methods

    DEFF Research Database (Denmark)

    Nielsen, Janni; Yssing, Carsten; Tweddell Levinsen, Karin

    2007-01-01

    Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded in the tec......Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded...

  19. Evaluating Google compute engine with PROOF

    International Nuclear Information System (INIS)

    Ganis, Gerardo; Panitkin, Sergey

    2014-01-01

    The advent of private and commercial cloud platforms has opened the question of evaluating the cost-effectiveness of such solution for computing in High Energy Physics . Google Compute Engine (GCE) is a IaaS product launched by Google as an experimental platform during 2012 and now open to the public market. In this contribution we present the results of a set of CPU-intensive and I/O-intensive tests we have run with PROOF on a GCE resources made available by Google for test purposes. We have run tests on large scale PROOF clusters (up to 1000 workers) to study the overall scalability of coordinated multi-process jobs. We have studied and compared the performance of ephemeral and persistent storage with PROOF-Lite on the single machines and of standard PROOF on the whole cluster. We will discuss our results in perspective, in particular with respect to the typical analysis needs of an LHC experiment.

  20. Towards an Intelligent Tutor for Mathematical Proofs

    Directory of Open Access Journals (Sweden)

    Serge Autexier

    2012-02-01

    Full Text Available Computer-supported learning is an increasingly important form of study since it allows for independent learning and individualized instruction. In this paper, we discuss a novel approach to developing an intelligent tutoring system for teaching textbook-style mathematical proofs. We characterize the particularities of the domain and discuss common ITS design models. Our approach is motivated by phenomena found in a corpus of tutorial dialogs that were collected in a Wizard-of-Oz experiment. We show how an intelligent tutor for textbook-style mathematical proofs can be built on top of an adapted assertion-level proof assistant by reusing representations and proof search strategies originally developed for automated and interactive theorem proving. The resulting prototype was successfully evaluated on a corpus of tutorial dialogs and yields good results.

  1. Parallel interactive data analysis with PROOF

    International Nuclear Information System (INIS)

    Ballintijn, Maarten; Biskup, Marek; Brun, Rene; Canal, Philippe; Feichtinger, Derek; Ganis, Gerardo; Kickinger, Guenter; Peters, Andreas; Rademakers, Fons

    2006-01-01

    The Parallel ROOT Facility, PROOF, enables the analysis of much larger data sets on a shorter time scale. It exploits the inherent parallelism in data of uncorrelated events via a multi-tier architecture that optimizes I/O and CPU utilization in heterogeneous clusters with distributed storage. The system provides transparent and interactive access to gigabytes today. Being part of the ROOT framework PROOF inherits the benefits of a performant object storage system and a wealth of statistical and visualization tools. This paper describes the data analysis model of ROOT and the latest developments on closer integration of PROOF into that model and the ROOT user environment, e.g. support for PROOF-based browsing of trees stored remotely, and the popular TTree::Draw() interface. We also outline the ongoing developments aimed to improve the flexibility and user-friendliness of the system

  2. Proof of payment for all reimbursement claims

    CERN Multimedia

    HR Department

    2006-01-01

    Members of the personnel are kindly requested to note that only documents proving that a payment has been made are accepted as proof of payment for any claims for reimbursement, including specifically the reimbursement of education fees. In particular, the following will be accepted as proof of payment: bank or post office bank statements indicating the name of the institution to which the payment was made; photocopies of cheques made out to the institution to which the payments were made together with bank statements showing the numbers of the relevant cheques; proof of payment in the form of discharged payment slips; invoices with acknowledgement of settlement, receipts, bank statements detailing operations crediting another account or similar documents. As a result, the following documents in particular will no longer be accepted as proof of payment: photocopies of cheques that are not submitted together with bank or post office bank statements showing the numbers of the relevant cheques; details of ...

  3. Problems and proofs in numbers and algebra

    CERN Document Server

    Millman, Richard S; Kahn, Eric Brendan

    2015-01-01

    Designed to facilitate the transition from undergraduate calculus and differential equations to learning about proofs, this book helps students develop the rigorous mathematical reasoning needed for advanced courses in analysis, abstract algebra, and more. Students will focus on both how to prove theorems and solve problem sets in-depth; that is, where multiple steps are needed to prove or solve. This proof technique is developed by examining two specific content themes and their applications in-depth: number theory and algebra. This choice of content themes enables students to develop an understanding of proof technique in the context of topics with which they are already familiar, as well as reinforcing natural and conceptual understandings of mathematical methods and styles. The key to the text is its interesting and intriguing problems, exercises, theorems, and proofs, showing how students will transition from the usual, more routine calculus to abstraction while also learning how to “prove” or “sol...

  4. 33 CFR 136.233 - Proof.

    Science.gov (United States)

    2010-07-01

    ... SOURCE; AND ADVERTISEMENT Procedures for Particular Claims § 136.233 Proof. In addition to the... must be established. (d) Whether alternative employment or business was available and undertaken and...

  5. Embedding potentials for excited states of embedded species

    International Nuclear Information System (INIS)

    Wesolowski, Tomasz A.

    2014-01-01

    Frozen-Density-Embedding Theory (FDET) is a formalism to obtain the upper bound of the ground-state energy of the total system and the corresponding embedded wavefunction by means of Euler-Lagrange equations [T. A. Wesolowski, Phys. Rev. A 77(1), 012504 (2008)]. FDET provides the expression for the embedding potential as a functional of the electron density of the embedded species, electron density of the environment, and the field generated by other charges in the environment. Under certain conditions, FDET leads to the exact ground-state energy and density of the whole system. Following Perdew-Levy theorem on stationary states of the ground-state energy functional, the other-than-ground-state stationary states of the FDET energy functional correspond to excited states. In the present work, we analyze such use of other-than-ground-state embedded wavefunctions obtained in practical calculations, i.e., when the FDET embedding potential is approximated. Three computational approaches based on FDET, that assure self-consistent excitation energy and embedded wavefunction dealing with the issue of orthogonality of embedded wavefunctions for different states in a different manner, are proposed and discussed

  6. A short proof of increased parabolic regularity

    Directory of Open Access Journals (Sweden)

    Stephen Pankavich

    2015-08-01

    Full Text Available We present a short proof of the increased regularity obtained by solutions to uniformly parabolic partial differential equations. Though this setting is fairly introductory, our new method of proof, which uses a priori estimates and an inductive method, can be extended to prove analogous results for problems with time-dependent coefficients, advection-diffusion or reaction diffusion equations, and nonlinear PDEs even when other tools, such as semigroup methods or the use of explicit fundamental solutions, are unavailable.

  7. Symbolic logic syntax, semantics, and proof

    CERN Document Server

    Agler, David

    2012-01-01

    Brimming with visual examples of concepts, derivation rules, and proof strategies, this introductory text is ideal for students with no previous experience in logic. Students will learn translation both from formal language into English and from English into formal language; how to use truth trees and truth tables to test propositions for logical properties; and how to construct and strategically use derivation rules in proofs.

  8. Synchronous correlation matrices and Connes’ embedding conjecture

    Energy Technology Data Exchange (ETDEWEB)

    Dykema, Kenneth J., E-mail: kdykema@math.tamu.edu [Department of Mathematics, Texas A& M University, College Station, Texas 77843-3368 (United States); Paulsen, Vern, E-mail: vern@math.uh.edu [Department of Mathematics, University of Houston, Houston, Texas 77204 (United States)

    2016-01-15

    In the work of Paulsen et al. [J. Funct. Anal. (in press); preprint arXiv:1407.6918], the concept of synchronous quantum correlation matrices was introduced and these were shown to correspond to traces on certain C*-algebras. In particular, synchronous correlation matrices arose in their study of various versions of quantum chromatic numbers of graphs and other quantum versions of graph theoretic parameters. In this paper, we develop these ideas further, focusing on the relations between synchronous correlation matrices and microstates. We prove that Connes’ embedding conjecture is equivalent to the equality of two families of synchronous quantum correlation matrices. We prove that if Connes’ embedding conjecture has a positive answer, then the tracial rank and projective rank are equal for every graph. We then apply these results to more general non-local games.

  9. ReACT Methodology Proof of Concept Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston; Sarah Freeman

    2014-03-01

    The Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) funded INL Researchers to evaluate a novel process for assessing and mitigating cyber security risks. The proof of concept level of the method was tested in an industry environment. This case study, plus additional case studies will support the further development of the method into a tool to assist industry in securing their critical networks. This report provides an understanding of the process developed in the Response Analysis and Characterization Tool (ReACT) project. This report concludes with lessons learned and a roadmap for final development of these tools for use by industry.

  10. Parity games and propositional proofs

    Czech Academy of Sciences Publication Activity Database

    Beckmann, A.; Pudlák, Pavel; Thapen, Neil

    2014-01-01

    Roč. 15, č. 2 (2014), s. 17 ISSN 1529-3785 R&D Projects: GA AV ČR IAA100190902 Institutional support: RVO:67985840 Keywords : bounded arithmetic * mean payoff games * parity games Subject RIV: BA - General Mathematics Impact factor: 0.618, year: 2014 http://dl.acm.org/ citation .cfm?doid=2616911.2579822

  11. Parity games and propositional proofs

    Czech Academy of Sciences Publication Activity Database

    Beckmann, A.; Pudlák, Pavel; Thapen, Neil

    2014-01-01

    Roč. 15, č. 2 (2014), s. 17 ISSN 1529-3785 R&D Projects: GA AV ČR IAA100190902 Institutional support: RVO:67985840 Keywords : bounded arithmetic * mean payoff games * parity games Subject RIV: BA - General Mathematics Impact factor: 0.618, year: 2014 http://dl.acm.org/citation.cfm?doid=2616911.2579822

  12. Modeling of Embedded Human Systems

    Science.gov (United States)

    2013-07-01

    ISAT study [7] for DARPA in 20051 concretized the notion of an embedded human, who is a necessary component of the system. The proposed work integrates...Technology, IEEE Transactions on, vol. 16, no. 2, pp. 229–244, March 2008. [7] C. J. Tomlin and S. S. Sastry, “Embedded humans,” tech. rep., DARPA ISAT

  13. 46 CFR 201.144 - Offer of proof.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Offer of proof. 201.144 Section 201.144 Shipping... PROCEDURE Evidence (Rule 14) § 201.144 Offer of proof. An offer of proof made in connection with an... accompany the record as the offer of proof. ...

  14. 45 CFR 81.85 - Offer of proof.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Offer of proof. 81.85 Section 81.85 Public Welfare... 80 OF THIS TITLE Hearing Procedures § 81.85 Offer of proof. An offer of proof made in connection with... identification and shall accompany the record as the offer of proof. ...

  15. 38 CFR 18b.64 - Offer of proof.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Offer of proof. 18b.64... Procedures § 18b.64 Offer of proof. An offer of proof made in connection with an objection taken to any... record as the offer of proof. ...

  16. Vibration-proof FBR type reactor

    International Nuclear Information System (INIS)

    Kawamura, Yutaka.

    1992-01-01

    In a reactor container in an FBR type reactor, an outer building and upper and lower portions of a reactor container are connected by a load transmission device made of a laminated material of rubber and steel plates. Each of the reactor container and the outer building is disposed on a lower raft disposed on a rock by way of a vibration-proof device made of a laminated material of rubber and steel plates. Vibration-proof elements for providing vertical eigen frequency of the vibration-proof system comprising the reactor building and the vibration-proof device within a range of 3Hz to 5Hz are used. That is, the peak of designed acceleration for response spectrum in the horizontal direction of the reactor structural portions is shifted to side of shorter period from the main frequency region of the reactor structure. Alternatively, rigidity of the vibration-proof elements is decreased to shift the peak to the side of long period from the main frequency region. Designed seismic force can be greatly reduced both horizontally and vertically, to reduce the wall thickness of the structural members, improve the plant economy and to ensure the safety against earthquakes. (N.H.)

  17. Embedding GroupThink

    DEFF Research Database (Denmark)

    Seabrooke, Leonard; Ban, Cornel; Helgadóttir, Oddný

    This memo outlines key concepts and the methodological approach involved in a recently funded Institute for New Economic Thinking project. Our aim is to pinpoint the relationship between the reception of academic ideas, traced by citation networks with qualitative coding, and positions...

  18. Embedded mechatronic systems 1 analysis of failures, predictive reliability

    CERN Document Server

    El Hami, Abdelkhalak

    2015-01-01

    In operation, mechatronics embedded systems are stressed by loads of different causes: climate (temperature, humidity), vibration, electrical and electromagnetic. These stresses in components which induce failure mechanisms should be identified and modeled for better control. AUDACE is a collaborative project of the cluster Mov'eo that address issues specific to mechatronic reliability embedded systems. AUDACE means analyzing the causes of failure of components of mechatronic systems onboard. The goal of the project is to optimize the design of mechatronic devices by reliability. The projec

  19. Parallel embedded systems: where real-time and low-power meet

    DEFF Research Database (Denmark)

    Karakehayov, Zdravko; Guo, Yu

    2008-01-01

    This paper introduces a combination of models and proofs for optimal power management via Dynamic Frequency Scaling and Dynamic Voltage Scaling. The approach is suitable for systems on a chip or microcontrollers where processors run in parallel with embedded peripherals. We have developed...... a software tool, called CASTLE, to provide computer assistance in the design process of energy-aware embedded systems. The tool considers single processor and parallel architectures. An example shows an energy reduction of 23% when the tool allocates two microcontrollers for parallel execution....

  20. Phylogenetic trees and Euclidean embeddings.

    Science.gov (United States)

    Layer, Mark; Rhodes, John A

    2017-01-01

    It was recently observed by de Vienne et al. (Syst Biol 60(6):826-832, 2011) that a simple square root transformation of distances between taxa on a phylogenetic tree allowed for an embedding of the taxa into Euclidean space. While the justification for this was based on a diffusion model of continuous character evolution along the tree, here we give a direct and elementary explanation for it that provides substantial additional insight. We use this embedding to reinterpret the differences between the NJ and BIONJ tree building algorithms, providing one illustration of how this embedding reflects tree structures in data.

  1. Tensor Train Neighborhood Preserving Embedding

    Science.gov (United States)

    Wang, Wenqi; Aggarwal, Vaneet; Aeron, Shuchin

    2018-05-01

    In this paper, we propose a Tensor Train Neighborhood Preserving Embedding (TTNPE) to embed multi-dimensional tensor data into low dimensional tensor subspace. Novel approaches to solve the optimization problem in TTNPE are proposed. For this embedding, we evaluate novel trade-off gain among classification, computation, and dimensionality reduction (storage) for supervised learning. It is shown that compared to the state-of-the-arts tensor embedding methods, TTNPE achieves superior trade-off in classification, computation, and dimensionality reduction in MNIST handwritten digits and Weizmann face datasets.

  2. A Prototype Embedding of Bluespec System Verilog in the PVS Theorem Prover

    Science.gov (United States)

    Richards, Dominic; Lester, David

    2010-01-01

    Bluespec SystemVerilog (BSV) is a Hardware Description Language based on the guarded action model of concurrency. It has an elegant semantics, which makes it well suited for formal reasoning. To date, a number of BSV designs have been verified with hand proofs, but little work has been conducted on the application of automated reasoning. We present a prototype shallow embedding of BSV in the PVS theorem prover. Our embedding is compatible with the PVS model checker, which can automatically prove an important class of theorems, and can also be used in conjunction with the powerful proof strategies of PVS to verify a broader class of properties than can be achieved with model checking alone.

  3. Proof testing of CANDU concrete containment structures

    International Nuclear Information System (INIS)

    Pandey, M.D.

    1996-05-01

    Prior to commissioning of a CANDU reactor, a proof pressure test is required to demonstrate the structural integrity of the containment envelope. The test pressure specified by AECB Regulatory Document R-7 (1991) was selected without a rigorous consideration of uncertainties associated with estimates of accident pressure and conatinment resistance. This study was undertaken to develop a reliability-based philosophy for defining proof testing requirements that are consistent with the current limit states design code for concrete containments (CSA N287.3).It was shown that the upodated probability of failure after a successful test is always less than the original estimate

  4. Web-based international knowledge exchange tool on urban resilience and climate proofing cities : climatescan

    NARCIS (Netherlands)

    Boogaard, Floris; Tipping, Jonathan; Muthanna, T.; Duffy, A.; Bendall, Barry; Kluck, Jeroen

    There is a wide diversity of projects undertaken to address urban resillience and climate proofing in the world. International knowledge exchange tools are evaluated with result: stakeholders demand tools that are interactive, open source and provide more detailed information (location, free photo

  5. Substitution Frege and extended Frege proof systems in non-classical logics

    Czech Academy of Sciences Publication Activity Database

    Jeřábek, Emil

    2009-01-01

    Roč. 159, č. 2 (2009), s. 1-48 ISSN 0168-0072 R&D Projects: GA AV ČR IAA1019401 Institutional research plan: CEZ:AV0Z10190503 Keywords : propositional proof complexity * Frege system * model logic Subject RIV: BA - General Mathematics Impact factor: 0.667, year: 2009

  6. Parametric embedding for class visualization.

    Science.gov (United States)

    Iwata, Tomoharu; Saito, Kazumi; Ueda, Naonori; Stromsten, Sean; Griffiths, Thomas L; Tenenbaum, Joshua B

    2007-09-01

    We propose a new method, parametric embedding (PE), that embeds objects with the class structure into a low-dimensional visualization space. PE takes as input a set of class conditional probabilities for given data points and tries to preserve the structure in an embedding space by minimizing a sum of Kullback-Leibler divergences, under the assumption that samples are generated by a gaussian mixture with equal covariances in the embedding space. PE has many potential uses depending on the source of the input data, providing insight into the classifier's behavior in supervised, semisupervised, and unsupervised settings. The PE algorithm has a computational advantage over conventional embedding methods based on pairwise object relations since its complexity scales with the product of the number of objects and the number of classes. We demonstrate PE by visualizing supervised categorization of Web pages, semisupervised categorization of digits, and the relations of words and latent topics found by an unsupervised algorithm, latent Dirichlet allocation.

  7. Embedded System for Biometric Identification

    OpenAIRE

    Rosli, Ahmad Nasir Che

    2010-01-01

    This chapter describes the design and implementation of an Embedded System for Biometric Identification from hardware and software perspectives. The first part of the chapter describes the idea of biometric identification. This includes the definition of

  8. Hardware Support for Embedded Java

    DEFF Research Database (Denmark)

    Schoeberl, Martin

    2012-01-01

    The general Java runtime environment is resource hungry and unfriendly for real-time systems. To reduce the resource consumption of Java in embedded systems, direct hardware support of the language is a valuable option. Furthermore, an implementation of the Java virtual machine in hardware enables...... worst-case execution time analysis of Java programs. This chapter gives an overview of current approaches to hardware support for embedded and real-time Java....

  9. Molecular Properties through Polarizable Embedding

    DEFF Research Database (Denmark)

    Olsen, Jógvan Magnus Haugaard; Kongsted, Jacob

    2011-01-01

    We review the theory related to the calculation of electric and magnetic molecular properties through polarizable embedding. In particular, we derive the expressions for the response functions up to the level of cubic response within the density functional theory-based polarizable embedding (PE......-DFT) formalism. In addition, we discuss some illustrative applications related to the calculation of nuclear magnetic resonance parameters, nonlinear optical properties, and electronic excited states in solution....

  10. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2003-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply...... be answered affirmatively for an idealized Haskell-like language and discuss to which extent Haskell can be used as a meta-language....

  11. Unsupervised Document Embedding With CNNs

    OpenAIRE

    Liu, Chundi; Zhao, Shunan; Volkovs, Maksims

    2017-01-01

    We propose a new model for unsupervised document embedding. Leading existing approaches either require complex inference or use recurrent neural networks (RNN) that are difficult to parallelize. We take a different route and develop a convolutional neural network (CNN) embedding model. Our CNN architecture is fully parallelizable resulting in over 10x speedup in inference time over RNN models. Parallelizable architecture enables to train deeper models where each successive layer has increasin...

  12. CIRCULATING MOVING BED COMBUSTION PROOF OF CONCEPT

    Energy Technology Data Exchange (ETDEWEB)

    Jukkola, Glen

    2010-06-30

    Circulating Moving Bed (CMB) combustion technology has its roots in traditional circulating fluidized bed technology and involves a novel method of solid fuel combustion and heat transfer. CMB technology represents a step change in improved performance and cost relative to conventional PC and FBC boilers. The CMB heat exchanger preheats the energy cycle working fluid, steam or air, to the high temperature levels required in systems for advanced power generation. Unique features of the CMB are the reduction of the heat transfer surfaces by about 60% as a result of the enhanced heat transfer rates, flexibility of operation, and about 30% lower cost over existing technology. The CMB Phase I project ran from July 2001 through March 2003. Its objective was to continue development of the CMB technology with a series of proof of concept tests. The tests were conducted at a scale that provided design data for scale up to a demonstration plant. These objectives were met by conducting a series of experiments in ALSTOM Power’s Multi-use Test Facility (MTF). The MTF was modified to operate under CMB conditions of commercial interest. The objective of the tests were to evaluate gas-to-solids heat transfer in the upper furnace, assess agglomeration in the high temperature CMB bubbling bed, and evaluate solids-to-tube heat transfer in the moving bed heat exchanger. The Phase I program results showed that there are still some significant technical uncertainties that needed to be resolved before the technology can be confidently scaled up for a successful demonstration plant design. Work remained in three primary areas: • scale up of gas to solid heat transfer • high temperature finned surface design • the overall requirements of mechanical and process design. The CMB Phase II workscope built upon the results of Phase I and specifically addressed the remaining technical uncertainties. It included a scaled MTF heat transfer test to provide the necessary data to scale up gas

  13. Proof systems for Moss’ coalgebraic logic

    NARCIS (Netherlands)

    Bílková, M.; Palmigiano, A.; Venema, Y.

    2014-01-01

    We study Gentzen-style proof theory of the finitary version of the coalgebraic logic introduced by L. Moss. The logic captures the behaviour of coalgebras for a large class of set functors. The syntax of the logic, defined uniformly with respect to a finitary coalgebraic type functor T , uses a

  14. Data-oriented scheduling for PROOF

    International Nuclear Information System (INIS)

    Xu Neng; Guan Wen; Wu Sau Lan; Ganis, Gerardo

    2011-01-01

    The Parallel ROOT Facility - PROOF - is a distributed analysis system optimized for I/O intensive analysis tasks of HEP data. With LHC entering the analysis phase, PROOF has become a natural ingredient for computing farms at Tier3 level. These analysis facilities will typically be used by a few tenths of users, and can also be federated into a sort of analysis cloud corresponding to the Virtual Organization of the experiment. Proper scheduling is required to guarantee fair resource usage, to enforce priority policies and to optimize the throughput. In this paper we discuss an advanced priority system that we are developing for PROOF. The system has been designed to automatically adapt to unknown length of the tasks, to take into account the data location and availability (including distribution across geographically separated sites), and the {group, user} default priorities. In this system, every element - user, group, dataset, job slot and storage - gets its priority and those priorities are dynamically linked with each other. In order to tune the interplay between the various components, we have designed and started implementing a simulation application that can model various type and size of PROOF clusters. In this application a monitoring package records all the changes of them so that we can easily understand and tune the performance. We will discuss the status of our simulation and show examples of the results we are expecting from it.

  15. 33 CFR 136.215 - Proof.

    Science.gov (United States)

    2010-07-01

    ... FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL LIABILITY TRUST FUND; CLAIMS PROCEDURES; DESIGNATION OF SOURCE; AND ADVERTISEMENT Procedures for Particular Claims § 136.215 Proof. (a) In addition to the... each claim for economic loss resulting from destruction of real or personal property, the claimant must...

  16. Teaching Syllogistics Through Gamification and Interactive Proofs

    DEFF Research Database (Denmark)

    Øhrstrøm, Peter; Sandborg-Petersen, Ulrik; Thorvaldsen, Steinar

    2015-01-01

    teaching through the use of interactive systems and also to do learning analytics based on the log-data from the use of the systems. The aim of the present paper is to investigate whether the use of gamification and an interactive proof system formulated in terms of controlled natural language can...

  17. Proofs of Contracted Length Non-covariance

    International Nuclear Information System (INIS)

    Strel'tsov, V.N.

    1994-01-01

    Different proofs of contracted length non covariance are discussed. The way based on the establishment of interval inconstancy (dependence on velocity) seems to be the most convincing one. It is stressed that the known non covariance of the electromagnetic field energy and momentum of a moving charge ('the problem 4/3') is a direct consequence of contracted length non covariance. 8 refs

  18. A Foundational Proof Framework for Cryptography

    Science.gov (United States)

    2015-05-01

    uniformly-distributed natural numbers in [0, ) is shown in Listing 7. RndNat_h is a helper function that samples a natural number with the appro...expect that a skilled Coq developer could complete such a proof in a matter of days (though he may require the help of a cryptographer to develop the

  19. Strategy-Proof Assignment Of Multiple Resources

    DEFF Research Database (Denmark)

    Erlanson, Albin; Szwagrzak, Karol

    2015-01-01

    We examine the strategy-proof allocation of multiple resources; an application is the assignment of packages of tasks, workloads, and compensations among the members of an organization. In the domain of multidimensional single-peaked preferences, we find that any allocation mechanism obtained by ...

  20. Complexity of Propositional Proofs Under a Promise

    Czech Academy of Sciences Publication Activity Database

    Dershowitz, N.; Tzameret, Iddo

    2010-01-01

    Roč. 11, č. 3 (2010), s. 1-29 ISSN 1529-3785 Institutional research plan: CEZ:AV0Z10190503 Keywords : theory * promise problems * propositional proof complexity * random 3CNF * resolution Subject RIV: BA - General Mathematics Impact factor: 1.391, year: 2010 http://dl.acm.org/ citation .cfm?doid=1740582.1740586

  1. Complexity of Propositional Proofs Under a Promise

    Czech Academy of Sciences Publication Activity Database

    Dershowitz, N.; Tzameret, Iddo

    2010-01-01

    Roč. 11, č. 3 (2010), s. 1-29 ISSN 1529-3785 Institutional research plan: CEZ:AV0Z10190503 Keywords : theory * promise problems * propositional proof complexity * random 3CNF * resolution Subject RIV: BA - General Mathematics Impact factor: 1.391, year: 2010 http://dl.acm.org/citation.cfm?doid=1740582.1740586

  2. Proof of Nishida's Conjecture on Anharmonic Lattices

    Science.gov (United States)

    Rink, Bob

    2006-02-01

    We prove Nishida's 1971 conjecture stating that almost all low-energetic motions of the anharmonic Fermi-Pasta-Ulam lattice with fixed endpoints are quasi-periodic. The proof is based on the formal computations of Nishida, the KAM theorem, discrete symmetry considerations and an algebraic trick that considerably simplifies earlier results.

  3. Decorated proofs for computational effects: States

    Directory of Open Access Journals (Sweden)

    Jean-Guillaume Dumas

    2012-08-01

    Full Text Available The syntax of an imperative language does not mention explicitly the state, while its denotational semantics has to mention it. In this paper we show that the equational proofs about an imperative language may hide the state, in the same way as the syntax does.

  4. Computer-Assisted Discovery and Proof

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, David H.; Borwein, Jonathan M.

    2007-12-10

    With the advent of powerful, widely-available mathematical software, combined with ever-faster computer hardware, we are approaching a day when both the discovery and proof of mathematical facts can be done in a computer-assisted manner. his article presents several specific examples of this new paradigm in action.

  5. Proofs of certain properties of irrational roots

    OpenAIRE

    Belbas, S. A.

    2009-01-01

    We give two elementary proofs, at a level understandable by students with only pre-calculus knowledge of Algebra, of the well known fact that an irreducible irrational n-th root of a positive rational number cannot be solution of a polynomial of degree less than n with rational coefficients. We also state and prove a few simple consequences.

  6. Hash3: Proofs, Analysis and Implementation

    DEFF Research Database (Denmark)

    Gauravaram, Praveen

    2009-01-01

    This report outlines the talks presented at the winter school on Hash3: Proofs, Analysis, and Implementation, ECRYPT II Event on Hash Functions. In general, speakers may not write everything what they talk on the slides. So, this report also outlines such findings following the understanding of t...

  7. An embedded system developed for hand held assay used in water monitoring

    Science.gov (United States)

    Wu, Lin; Wang, Jianwei; Ramakrishna, Bharath; Hsueh, Mingkai; Liu, Jonathan; Wu, Qufei; Wu, Chao-Cheng; Cao, Mang; Chang, Chein-I.; Jensen, Janet L.; Jensen, James O.; Knapp, Harlan; Daniel, Robert; Yin, Ray

    2005-11-01

    The US Army Joint Service Agent Water Monitor (JSAWM) program is currently interested in an approach that can implement a hardware- designed device in ticket-based hand-held assay (currently being developed) used for chemical/biological agent detection. This paper presents a preliminary investigation of the proof of concept. Three components are envisioned to accomplish the task. One is the ticket development which has been undertaken by the ANP, Inc. Another component is the software development which has been carried out by the Remote Sensing Signal and Image Processing Laboratory (RSSIPL) at the University of Maryland, Baltimore County (UMBC). A third component is an embedded system development which can be used to drive the UMBC-developed software to analyze the ANP-developed HHA tickets on a small pocket-size device like a PDA. The main focus of this paper is to investigate the third component that is viable and is yet to be explored. In order to facilitate to prove the concept, a flatbed scanner is used to replace a ticket reader to serve as an input device. The Stargate processor board is used as the embedded System with Embedded Linux installed. It is connected to an input device such as scanner as well as output devices such as LCD display or laptop etc. It executes the C-Coded processing program developed for this embedded system and outputs its findings on a display device. The embedded system to be developed and investigated in this paper is the core of a future hardware device. Several issues arising in such an embedded system will be addressed. Finally, the proof-of-concept pilot embedded system will be demonstrated.

  8. Proof of the holographic formula for entanglement entropy

    International Nuclear Information System (INIS)

    Fursaev, Dmitri V.

    2006-01-01

    Entanglement entropy for a spatial partition of a quantum system is studied in theories which admit a dual description in terms of the anti-de Sitter (AdS) gravity one dimension higher. A general proof of the holographic formula which relates the entropy to the area of a codimension 2 minimal hypersurface embedded in the bulk AdS space is given. The entanglement entropy is determined by a partition function which is defined as a path integral over Riemannian AdS geometries with non-trivial boundary conditions. The topology of the Riemannian spaces puts restrictions on the choice of the minimal hypersurface for a given boundary conditions. The entanglement entropy is also considered in Randall-Sundrum braneworld models where its asymptotic expansion is derived when the curvature radius of the brane is much larger than the AdS radius. Special attention is paid to the geometrical structure of anomalous terms in the entropy in four dimensions. Modification of the holographic formula by the higher curvature terms in the bulk is briefly discussed

  9. Embedded Empiricisms in Soft Soil Technology

    Science.gov (United States)

    Wijeyesekera, D. C.; John, L. M. S. Alvin; Adnan, Z.

    2016-07-01

    Civil engineers of today are continuously challenged by innovative projects that push further the knowledge boundaries with conceptual and/or ingenious solutions leading to the realization of that once was considered impossible in the realms of geotechnology. Some of the forward developments rely on empirical methods embedded within soft soil technology and the spectral realms of engineering in its entirety. Empiricisms unlike folklore are not always shrouded in mysticism but can find scientific reasoning to justify them being adopted in design and tangible construction projects. This lecture therefore is an outline exposition of how empiricism has been integrally embedded in total empirical beginnings in the evolution of soft soil technology from the Renaissance time, through the developments of soil mechanics in the 19th century which in turn has paved the way to the rise of computational soil mechanics. Developments in computational soil mechanics has always embraced and are founded on a wide backdrop of empirical geoenvironment simulations. However, it is imperative that a competent geotechnical engineer needs postgraduate training combined with empiricism that is based on years of well- winnowed practical experience to fathom the diverseness and complexity of nature. However, experience being regarded more highly than expertise can, perhaps inadvertently, inhibit development and innovation.

  10. The Proof by Cases Property and its Variants in Structural Consequence Relations

    Czech Academy of Sciences Publication Activity Database

    Cintula, Petr; Noguera, Carles

    2013-01-01

    Roč. 101, č. 4 (2013), s. 713-747 ISSN 0039-3215 R&D Project s: GA MŠk(CZ) 1M0545 EU Project s: European Commission(XE) 247584 - MATOMUVI Institutional research plan: CEZ:AV0Z1030915 Institutional support: RVO:67985556 Keywords : Abstract Algebraic Logic * Generalized disjunction * Proof by cases properties * Consequence relations * Filter-distributive logics * Protoalgebraic logics Subject RIV: BA - General Mathematics Impact factor: 0.330, year: 2013

  11. The Proof by Cases Property and its Variants in Structural Consequence Relations

    Czech Academy of Sciences Publication Activity Database

    Cintula, Petr; Noguera, Carles

    2013-01-01

    Roč. 101, č. 4 (2013), s. 713-747 ISSN 0039-3215 R&D Projects: GA MŠk(CZ) 1M0545 EU Projects: European Commission(XE) 247584 - MATOMUVI Institutional research plan: CEZ:AV0Z1030915 Institutional support: RVO:67985556 Keywords : Abstract Algebraic Logic * Generalized disjunction * Proof by cases properties * Consequence relations * Filter-distributive logics * Protoalgebraic logics Subject RIV: BA - General Mathematics Impact factor: 0.330, year: 2013

  12. FAILSAFE Health Management for Embedded Systems

    Science.gov (United States)

    Horvath, Gregory A.; Wagner, David A.; Wen, Hui Ying; Barry, Matthew

    2010-01-01

    The FAILSAFE project is developing concepts and prototype implementations for software health management in mission- critical, real-time embedded systems. The project unites features of the industry-standard ARINC 653 Avionics Application Software Standard Interface and JPL s Mission Data System (MDS) technology (see figure). The ARINC 653 standard establishes requirements for the services provided by partitioned, real-time operating systems. The MDS technology provides a state analysis method, canonical architecture, and software framework that facilitates the design and implementation of software-intensive complex systems. The MDS technology has been used to provide the health management function for an ARINC 653 application implementation. In particular, the focus is on showing how this combination enables reasoning about, and recovering from, application software problems.

  13. Sustainability in the built environment using embedded technology

    DEFF Research Database (Denmark)

    Buch-Hansen, Thomas Cornelius; Storgaard, Kresten; Ærenlund, Lærke

    2011-01-01

    designated Open Built Source products (OBS), by applying two principle: compatibility and reuse of building products with embedded technology. The project is carried out by DI and SBi and involves 30 firms namely building materials manufacturers and IT developer companies. The methods used in the User...

  14. Fault tolerant embedded computers and power electronics for nuclear robotics

    International Nuclear Information System (INIS)

    Giraud, A.; Robiolle, M.

    1995-01-01

    For requirements of nuclear industries, it is necessary to use embedded rad-tolerant electronics and high-level safety. In this paper, we first describe a computer architecture called MICADO designed for French nuclear industry. We then present outgoing projects on our industry. A special point is made on power electronics for remote-operated and legged robots. (authors). 7 refs., 2 figs

  15. Design, implementation, and evaluation of the Resilient Smalltalk embedded platform

    DEFF Research Database (Denmark)

    Andersen, Jacob Robert; Bak, Lars; Grarup, Steffen

    2005-01-01

    machine running on embedded systems. Programmers may connect to running virtual machines and service, monitor, or change the running systems. Furthermore, we present an evaluation of the Resilient platform in relation to the design goals through a case study of two development projects which successfully...

  16. Sharp Embeddings of Besov Spaces with Logarithmic Smoothness

    Czech Academy of Sciences Publication Activity Database

    Gurka, P.; Opic, Bohumír

    2005-01-01

    Roč. 18, č. 1 (2005), s. 81-110 ISSN 1139-1138 R&D Projects: GA ČR(CZ) GA201/01/0333 Institutional research plan: CEZ:AV0Z10190503 Keywords : Besov spaces wirh logarithmic smoothness * Lorentz-Zygmund spaces * sharp embeddings Subject RIV: BA - General Mathematics

  17. HAMLET: HPCN Technology for Real-Time, Embedded Applications

    NARCIS (Netherlands)

    Mager, J.W.L.J.; Dam, A. ten

    1995-01-01

    Building an application by using HPCN technology makes the solution scalable and therefore more flexible. The uptake of HPCN technology for real-time, embedded applications, however, is severely hampered by the lack of real application development support. Within the Esprit project HAMLET,

  18. Let's take this conversation outside: supporting embodied embedded memory

    NARCIS (Netherlands)

    Dijk, van J.; Lugt, van der R.; Overbeeke, C.J.

    2009-01-01

    In a research-through-design project we developed NOOT, a tangible interaction device that links conversational context to texts and sketches generated during creative sessions. We assumed an embodied embedded cognition perspective; i.e.: cognition was assumed to be embodied in human activity and

  19. Fault tolerant embedded computers and power electronics for nuclear robotics

    Energy Technology Data Exchange (ETDEWEB)

    Giraud, A.; Robiolle, M.

    1995-12-31

    For requirements of nuclear industries, it is necessary to use embedded rad-tolerant electronics and high-level safety. In this paper, we first describe a computer architecture called MICADO designed for French nuclear industry. We then present outgoing projects on our industry. A special point is made on power electronics for remote-operated and legged robots. (authors). 7 refs., 2 figs.

  20. Trusted computing for embedded systems

    CERN Document Server

    Soudris, Dimitrios; Anagnostopoulos, Iraklis

    2015-01-01

    This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. ·         Enables readers to address a variety of security threats to embedded hardware and software; ·         Describes design of secure wireless sensor networks, to address secure authen...

  1. Embedded Systems Development Tools: A MODUS-oriented Market Overview

    Directory of Open Access Journals (Sweden)

    Loupis Michalis

    2014-03-01

    Full Text Available Background: The embedded systems technology has perhaps been the most dominating technology in high-tech industries, in the past decade. The industry has correctly identified the potential of this technology and has put its efforts into exploring its full potential. Objectives: The goal of the paper is to explore the versatility of the application in the embedded system development based on one FP7-SME project. Methods/Approach: Embedded applications normally demand high resilience and quality, as well as conformity to quality standards and rigid performance. As a result embedded system developers have adopted software methods that yield high quality. The qualitative approach to examining embedded systems development tools has been applied in this work. Results: This paper presents a MODUS-oriented market analysis in the domains of Formal Verification tools, HW/SW co-simulation tools, Software Performance Optimization tools and Code Generation tools. Conclusions: The versatility of applications this technology serves is amazing. With all this performance potential, the technology has carried with itself a large number of issues which the industry essentially needs to resolve to be able to harness the full potential contained. The MODUS project toolset addressed four discrete domains of the ESD Software Market, in which corresponding open tools were developed

  2. SocRobust (Management tools and a management framework for assessing the potetial long-term S&T options to become embedded in society) Final Report; Project SOE 1981126 of the TSER Programme of the European Commission,

    NARCIS (Netherlands)

    Laredo, Philippe; Rip, Arie; Jolivet, Eric; Shove, Elizabeth; Raman, Sujatha; Moors, E.H.M.; Poti, Bianca; Schaeffer, Gerrit Jan; Penan, Herv; Clara Eugenia, Garcia

    2002-01-01

    This project concerns the management of especially risky and uncertain forms of innovation. More precisely, it concentrates on architectural or radical innovations which by their nature challenge existing technological conventions, regulatory frameworks, and established relations between consumers

  3. Adapting proofs-as-programs the Curry-Howard protocol

    CERN Document Server

    Poernomo, Iman Hafiz; Crossley, John Newsome

    2007-01-01

    Details developments in the direction of a practical proofs-as-programs paradigm, which constitutes a set of approaches to developing programs from proofs in constructive logic with applications to industrial-scale, complex software engineering problems.

  4. Proof test diagrams for Zerodur glass-ceramic

    Science.gov (United States)

    Tucker, D. S.

    1991-01-01

    Proof test diagrams for Zerodur glass-ceramics are calculated from available fracture mechanics data. It is shown that the environment has a large effect on minimum time-to-failure as predicted by proof test diagrams.

  5. Design Methodologies for Secure Embedded Systems

    CERN Document Server

    Biedermann, Alexander

    2011-01-01

    Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? And how can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration o

  6. Proof, rigour and informality : a virtue account of mathematical knowledge

    OpenAIRE

    Tanswell, Fenner Stanley

    2017-01-01

    This thesis is about the nature of proofs in mathematics as it is practiced, contrasting the informal proofs found in practice with formal proofs in formal systems. In the first chapter I present a new argument against the Formalist-Reductionist view that informal proofs are justified as rigorous and correct by corresponding to formal counterparts. The second chapter builds on this to reject arguments from Gödel's paradox and incompleteness theorems to the claim that mathematics is inherently...

  7. Embedding Climate Services

    Science.gov (United States)

    Shafer, M.; Boone, M.; Keim, B. D.

    2015-12-01

    With the rapidly-increasing number of climate services providers, the landscape for putting climate into practice is getting both easier to access and more confusing. Each provider serves a different clientele, and in so doing draws more stakeholder organizations into the sphere of those using climate information in decision-making. The challenge has been in connecting these new stakeholders with expertise that may reside within a different provider organization. To help close the gap, the Southern Climate Impacts Planning Program (SCIPP; http://www.southernclimate.org), a NOAA RISA Team, initiated a summer internship program, where students with expertise in meteorology or climatology would work for an organization more closely aligned with another climate services provider network. The format was patterned after the successful NSF-funded Research Experience for Undergraduates (REU) program at the National Weather Center, where students are selected from undergraduate programs across the nation to spend a summer conducting research under a scientific mentor. The SCIPP initiative flipped this model, instead sending students to organizations with operational needs for climate information to work under their mentorship in partnership with SCIPP scientists. Over the past two summers, SCIPP has recruited students to work at landscape-based (Gulf Coast Joint Venture and National Wetlands Research Center) and community-based (Tulsa Partners) organizations. Students worked alongside the organizations' staff on a daily basis and were supported through periodic calls with the SCIPP team to help identify appropriate datasets and work through methodological issues. This presentation will discuss how these relationships were created, the expertise of each of the organizations involved, and outcomes from the projects.

  8. Morphware - Fremtidens Embedded System Platform

    DEFF Research Database (Denmark)

    Madsen, Jan

    2006-01-01

    FPGA'er bliver i stigende grad brugt som komponenter i embedded systemer. Faldende priser, større kapacitet og en større felksibilitet har gjort FPGA'en til en attraktiv og konkurrencedygtig teknologi der tillader en stadig stigende grad af system integration, hvor traditionel hardware og software...... kombineres og rekonfigureres. Muligheden for at rekonfigurere systemet, og specielt rekonfigurerer det medens det kører, giver nogle helt nye muligheder for at designe og programmere embedded systemer. Dette foredrag vil give et indblik i disse nye og fremtidige muligheder....

  9. Implementation of an embedded computer

    OpenAIRE

    Pikl, Bojan

    2011-01-01

    The goal of this thesis is to describe a production of an embedded computer. The thesis describes development and production of an embedded computer for the medical diode laser DL30 that is being developed in Robomed d.o.o.. The first part of the thesis describes the choice of hardware devices. I mostly describe the technologies that one can buy on the market. Moreover for every part of the computer installed and developed there is an argument why we selected that exact part. The second part ...

  10. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2003-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply......-typed terms can be represented in Haskell using phantom types? And conversely, can all simply-typed terms be represented in Haskell under the restrictions imposed by phantom types? In this article we investigate the conditions under which these assumptions are true: We show that these questions can...

  11. A Foundation for Embedded Languages

    DEFF Research Database (Denmark)

    Rhiger, Morten

    2002-01-01

    Recent work on embedding object languages into Haskell use "phantom types" (i.e., parameterized types whose parameter does not occur on the right-hand side of the type definition) to ensure that the embedded object-language terms are simply typed. But is it a safe assumption that only simply......-typed terms can be represented in Haskell using phantom types? And conversely, can all simply-typed terms be represented in Haskell under the restrictions imposed by phantom types? In this article we investigate the conditions under which these assumptions are true: We show that these questions can...

  12. 34 CFR 101.85 - Offer of proof.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Offer of proof. 101.85 Section 101.85 Education... PRACTICE AND PROCEDURE FOR HEARINGS UNDER PART 100 OF THIS TITLE Hearing Procedures § 101.85 Offer of proof. An offer of proof made in connection with an objection taken to any ruling of the presiding officer...

  13. 7 CFR 15.122 - Offer of proof.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Offer of proof. 15.122 Section 15.122 Agriculture..., Decisions and Administrative Review Under the Civil Rights Act of 1964 Hearing Procedures § 15.122 Offer of proof. An offer of proof made in connection with an objection taken to any ruling of the hearing officer...

  14. 49 CFR 604.43 - Offer of proof.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Offer of proof. 604.43 Section 604.43..., DEPARTMENT OF TRANSPORTATION CHARTER SERVICE Hearings. § 604.43 Offer of proof. A party whose evidence has... respond to the offer of proof, may offer the evidence on the record when filing an appeal. ...

  15. 36 CFR 1150.79 - Offer of proof.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Offer of proof. 1150.79... BOARD PRACTICE AND PROCEDURES FOR COMPLIANCE HEARINGS Hearing Procedures § 1150.79 Offer of proof. An offer of proof made in connection with an objection taken to a ruling of the judge rejecting or...

  16. Non-Well-Founded Proofs for the Grzegorczyk Modal Logic

    OpenAIRE

    Savateev, Yury; Shamkanov, Daniyar

    2018-01-01

    We present a sequent calculus for the Grzegorczyk modal logic Grz allowing cyclic and other non-well-founded proofs and obtain the cut-elimination theorem for it by constructing a continuous cut-elimination mapping acting on these proofs. As an application, we establish the Lyndon interpolation property for the logic Grz proof-theoretically.

  17. 16 CFR 614.1 - Appropriate proof of identity.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Appropriate proof of identity. 614.1 Section... IDENTITY § 614.1 Appropriate proof of identity. (a) Consumer reporting agencies shall develop and implement reasonable requirements for what information consumers shall provide to constitute proof of identity for...

  18. The direct Flow parametric Proof of Gauss' Divergence Theorem revisited

    DEFF Research Database (Denmark)

    Markvorsen, Steen

    The standard proof of the divergence theorem in undergraduate calculus courses covers the theorem for static domains between two graph surfaces. We show that within first year undergraduate curriculum, the flow proof of the dynamic version of the divergence theorem - which is usually considered...... we apply the key instrumental concepts and verify the various steps towards this alternative proof of the divergence theorem....

  19. How Mathematicians Determine if an Argument Is a Valid Proof

    Science.gov (United States)

    Weber, Keith

    2008-01-01

    The purpose of this article is to investigate the mathematical practice of proof validation--that is, the act of determining whether an argument constitutes a valid proof. The results of a study with 8 mathematicians are reported. The mathematicians were observed as they read purported mathematical proofs and made judgments about their validity;…

  20. Mathematicians' Perspectives on Features of a Good Pedagogical Proof

    Science.gov (United States)

    Lai, Yvonne; Weber, Keith; Mejia-Ramos, Juan Pablo

    2012-01-01

    In this article, we report two studies investigating what mathematicians value in a pedagogical proof. Study 1 is a qualitative study of how eight mathematicians revised two proofs that would be presented in a course for mathematics majors. These mathematicians thought that introductory and concluding sentences should be included in the proofs,…

  1. A Calculus of Circular Proofs and its Categorical Semantics

    DEFF Research Database (Denmark)

    Santocanale, Luigi

    2002-01-01

    We present a calculus of "circular proofs": the graph underlying a proof is not a finite tree but instead it is allowed to contain a certain amount of cycles.The main challenge in developing a theory for the calculus is to define the semantics of proofs, since the usual method by induction...

  2. 29 CFR 1919.31 - Proof tests-loose gear.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 7 2010-07-01 2010-07-01 false Proof tests-loose gear. 1919.31 Section 1919.31 Labor... (CONTINUED) GEAR CERTIFICATION Certification of Vessels: Tests and Proof Loads; Heat Treatment; Competent Persons § 1919.31 Proof tests—loose gear. (a) Chains, rings, shackles and other loose gear (whether...

  3. Proviola: a tool for proof re-animation

    NARCIS (Netherlands)

    Tankink, C.; Geuvers, J.H.; McKinna, J.; Wiedijk, F.; Autexier, S.; Calmet, J.; Delahaye, D.; Ion, P.D.F.; Rideau, L.; Rioboo, R.; Sexton, A.P.

    2010-01-01

    To improve on existing models of interaction with a proof assistant (PA), in particular for storage and replay of proofs, we introduce three related concepts, those of: a proof movie, consisting of frames which record both user input and the corresponding PA response; a camera, which films a user’s

  4. Exploring mathematics problem-solving and proof

    CERN Document Server

    Grieser, Daniel

    2018-01-01

    Have you ever faced a mathematical problem and had no idea how to approach it? Or perhaps you had an idea but got stuck halfway through? This book guides you in developing your creativity, as it takes you on a voyage of discovery into mathematics. Readers will not only learn strategies for solving problems and logical reasoning, but they will also learn about the importance of proofs and various proof techniques. Other topics covered include recursion, mathematical induction, graphs, counting, elementary number theory, and the pigeonhole, extremal and invariance principles. Designed to help students make the transition from secondary school to university level, this book provides readers with a refreshing look at mathematics and deep insights into universal principles that are valuable far beyond the scope of this book. Aimed especially at undergraduate and secondary school students as well as teachers, this book will appeal to anyone interested in mathematics. Only basic secondary school mathematics is requi...

  5. Multiparty Session Types as Coherence Proofs

    DEFF Research Database (Denmark)

    Carbone, Marco; Montesi, Fabrizio; Schürmann, Carsten

    2015-01-01

    We propose a Curry-Howard correspondence between a language for programming multiparty sessions and a generalisation of Classical Linear Logic (CLL). In this framework, propositions correspond to the local behaviour of a participant in a multiparty session type, proofs to processes, and proof...... normalisation to executing communications. Our key contribution is generalising duality, from CLL, to a new notion of n-ary compatibility, called coherence. Building on coherence as a principle of compositionality, we generalise the cut rule of CLL to a new rule for composing many processes communicating...... in a multiparty session. We prove the soundness of our model by showing the admissibility of our new rule, which entails deadlock-freedom via our correspondence....

  6. A proof of the conformal collider bounds

    Energy Technology Data Exchange (ETDEWEB)

    Hofman, Diego M. [Institute for Theoretical Physics, University of Amsterdam, Science Park 904, Postbus 94485, 1090 GL, Amsterdam (Netherlands); Li, Daliang [Department of Physics and Astronomy, Johns Hopkins University, Baltimore, MD 21218 (United States); Meltzer, David [Department of Physics, Yale University, New Haven, CT 06511 (United States); Poland, David [Department of Physics, Yale University, New Haven, CT 06511 (United States); School of Natural Sciences, Institute for Advanced Study, Princeton, NJ 08540 (United States); Rejon-Barrera, Fernando [Institute for Theoretical Physics, University of Amsterdam, Science Park 904, Postbus 94485, 1090 GL, Amsterdam (Netherlands)

    2016-06-20

    In this paper, we prove that the “conformal collider bounds” originally proposed in http://dx.doi.org/10.1088/1126-6708/2008/05/012 hold for any unitary parity-preserving conformal field theory (CFT) with a unique stress tensor in dimensions d≥3. In particular this implies that the ratio of central charges for a unitary 4d CFT lies in the interval (31/18)≥(a/c)≥(1/3). For superconformal theories this is further reduced to (3/2)≥(a/c)≥(1/2). The proof relies only on CFT first principles — in particular, bootstrap methods — and thus constitutes the first complete field theory proof of these bounds. We further elaborate on similar bounds for non-conserved currents and relate them to results obtained recently from deep inelastic scattering.

  7. Consistency Anchor Formalization and Correctness Proofs

    OpenAIRE

    Miguel, Correia; Bessani, Alysson

    2014-01-01

    This is report contains the formal proofs for the techniques for increasing the consistency of cloud storage as presented in "Bessani et al. SCFS: A Cloud-backed File System. Proc. of the 2014 USENIX Annual Technical Conference. June 2014." The consistency anchor technique allows one to increase the consistency provided by eventually consistent cloud storage services like Amazon S3. This technique has been used in the SCFS (Shared Cloud File System) cloud-backed file system for solving rea...

  8. Kant's Transcendental Arguments as Conceptual Proofs | Stapleford ...

    African Journals Online (AJOL)

    The paper is an attempt to explain what a transcendental argument is for Kant. The interpretation is based on a reading of the “Discipline of Pure Reason,” sections 1 and 4, of the first Critique. The author first identifies several statements that Kant makes about the method of proof he followed in the “Analytic of Principles,” ...

  9. Toward a Proof of Concept Cloud Framework for Physics Applications on Blue Gene Supercomputers

    International Nuclear Information System (INIS)

    Dreher, Patrick; Scullin, William; Vouk, Mladen

    2015-01-01

    Traditional high performance supercomputers are capable of delivering large sustained state-of-the-art computational resources to physics applications over extended periods of time using batch processing mode operating environments. However, today there is an increasing demand for more complex workflows that involve large fluctuations in the levels of HPC physics computational requirements during the simulations. Some of the workflow components may also require a richer set of operating system features and schedulers than normally found in a batch oriented HPC environment. This paper reports on progress toward a proof of concept design that implements a cloud framework onto BG/P and BG/Q platforms at the Argonne Leadership Computing Facility. The BG/P implementation utilizes the Kittyhawk utility and the BG/Q platform uses an experimental heterogeneous FusedOS operating system environment. Both platforms use the Virtual Computing Laboratory as the cloud computing system embedded within the supercomputer. This proof of concept design allows a cloud to be configured so that it can capitalize on the specialized infrastructure capabilities of a supercomputer and the flexible cloud configurations without resorting to virtualization. Initial testing of the proof of concept system is done using the lattice QCD MILC code. These types of user reconfigurable environments have the potential to deliver experimental schedulers and operating systems within a working HPC environment for physics computations that may be different from the native OS and schedulers on production HPC supercomputers. (paper)

  10. From statistical proofs of the Kochen-Specker theorem to noise-robust noncontextuality inequalities

    Science.gov (United States)

    Kunjwal, Ravi; Spekkens, Robert W.

    2018-05-01

    The Kochen-Specker theorem rules out models of quantum theory wherein projective measurements are assigned outcomes deterministically and independently of context. This notion of noncontextuality is not applicable to experimental measurements because these are never free of noise and thus never truly projective. For nonprojective measurements, therefore, one must drop the requirement that an outcome be assigned deterministically in the model and merely require that it be assigned a distribution over outcomes in a manner that is context-independent. By demanding context independence in the representation of preparations as well, one obtains a generalized principle of noncontextuality that also supports a quantum no-go theorem. Several recent works have shown how to derive inequalities on experimental data which, if violated, demonstrate the impossibility of finding a generalized-noncontextual model of this data. That is, these inequalities do not presume quantum theory and, in particular, they make sense without requiring an operational analog of the quantum notion of projectiveness. We here describe a technique for deriving such inequalities starting from arbitrary proofs of the Kochen-Specker theorem. It extends significantly previous techniques that worked only for logical proofs, which are based on sets of projective measurements that fail to admit of any deterministic noncontextual assignment, to the case of statistical proofs, which are based on sets of projective measurements that d o admit of some deterministic noncontextual assignments, but not enough to explain the quantum statistics.

  11. Mobile Data Collection Applications: A Proof of Concept

    International Nuclear Information System (INIS)

    Chang, J

    2006-01-01

    This project's goal is to provide a proof of concept for mobile data collection applications, and identify the best ways such applications could be implemented and used. Such an application should decrease the time and resources users now need to devote to redundant data processes, and provide an easy of locating and retrieving data at a later time. The two types of available mobile devices, Personal Digital Assistants and Tablet Personal Computers, each have their particular strengths that suggest themselves for certain types of applications. As such, parallel data collection applications have been developed, with a common web application for uploading information to the database. While these aspects have been developed and proven, it still remains to refine these applications, develop the tables to hold their data, and field-test with users for their feedback

  12. Existence of Projective Planes

    OpenAIRE

    Perrott, Xander

    2016-01-01

    This report gives an overview of the history of finite projective planes and their properties before going on to outline the proof that no projective plane of order 10 exists. The report also investigates the search carried out by MacWilliams, Sloane and Thompson in 1970 [12] and confirms their result by providing independent verification that there is no vector of weight 15 in the code generated by the projective plane of order 10.

  13. Photothermal heating in metal-embedded microtools for material transport

    DEFF Research Database (Denmark)

    Villangca, Mark Jayson; Palima, Darwin; Banas, Andrew Rafael

    2016-01-01

    Material transport is an important mechanism in microfluidics and drug delivery. The methods and solutions found in literature involve passively diffusing structures, microneedles and chemically fueled structures. In this work, we make use of optically actuated microtools with embedded metal layer...... as heating element for controlled loading and release. The new microtools take advantage of the photothermal-induced convection current to load and unload cargo. We also discuss some challenges encountered in realizing a self-contained polymerized microtool. Microfluidic mixing, fluid flow control...... and convection currents have been demonstrated both experimentally and numerically for static metal thin films or passively floating nanoparticles. Here we show an integration of aforementioned functionalities in an opticallyfabricated and actuated microtool. As proof of concept, we demonstrate loading...

  14. Introduction to sofic and hyperlinear groups and Connes' embedding conjecture

    CERN Document Server

    Capraro, Valerio

    2015-01-01

    This monograph presents some cornerstone results in the study of sofic and hyperlinear groups and the closely related Connes' embedding conjecture. These notions, as well as the proofs of many results, are presented in the framework of model theory for metric structures. This point of view, rarely explicitly adopted in the literature, clarifies the ideas therein, and provides additional tools to attack open problems. Sofic and hyperlinear groups are countable discrete groups that can be suitably approximated by finite symmetric groups and groups of unitary matrices. These deep and fruitful notions, introduced by Gromov and Radulescu, respectively, in the late 1990s, stimulated an impressive amount of research in the last 15 years, touching several seemingly distant areas of mathematics including geometric group theory, operator algebras, dynamical systems, graph theory, and quantum information theory. Several long-standing conjectures, still open for arbitrary groups, are now settled for sofic or hyperlinear ...

  15. Embedding Sensors During Additive Manufacturing

    Energy Technology Data Exchange (ETDEWEB)

    Sbriglia, Lexey Raylene [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2015-08-10

    This PowerPoint presentation had the following headings: Fused deposition modeling (FDM); Open source 3D printing; Objectives; Vibration analysis; Equipment; Design; Material choices; Failure causes, such as tension, bubbling; Potential solutions; Simulations; Embedding the sensors; LabView programming; Alternate data acquisition; Problem and proposed solution; and, Conclusions

  16. Embedded EZ-Source Inverters

    DEFF Research Database (Denmark)

    Blaabjerg, Frede; Loh, Poh Chiang; Gao, F.

    2008-01-01

    -voltage oscillations to the system. Therefore, Z-source inverters are in effect safer and less complex, and can be implemented using only passive elements with no additional active semiconductor needed. Believing in the prospects of Z-source inverters, this paper contributes by introducing a new family of embedded EZ...

  17. Software for Embedded Control Systems

    NARCIS (Netherlands)

    Broenink, Johannes F.; Hilderink, G.H.; Jovanovic, D.S.

    2001-01-01

    The research of our team deals with the realization of control schemes on digital computers. As such the emphasis is on embedded control software implementation. Applications are in the field of mechatronic devices, using a mechatronic design approach (the integrated and optimal design of a

  18. An illustration of the explanatory and discovery functions of proof

    Directory of Open Access Journals (Sweden)

    Michael de Villiers

    2012-11-01

    Full Text Available This article provides an illustration of the explanatory and discovery functions of proof with an original geometric conjecture made by a Grade 11 student. After logically explaining (proving the result geometrically and algebraically, the result is generalised to other polygons by further reflection on the proof(s. Different proofs are given, each giving different insights that lead to further generalisations. The underlying heuristic reasoning is carefully described in order to provide an exemplar for designing learning trajectories to engage students with these functions of proof.

  19. On the proof of the first Carnot theorem in thermodynamics

    International Nuclear Information System (INIS)

    Morad, M R; Momeni, F

    2013-01-01

    The proof of the first Carnot theorem in classical thermodynamics is revisited in this study. The underlying conditions of a general proof of this principle presented by Senft (1978 Phys. Educ. 13 35–37) are explored and discussed. These conditions are analysed in more detail using a physical description of heat and work to present a simpler proof of the first principle prior to using the violation of the second law of thermodynamics. Finally, a new simple proof is also presented based on Gibbs relation. This discussion will benefit the teaching of classical thermodynamics and promote better understanding of the proof of the first Carnot theorem in general form. (paper)

  20. Embedded, everywhere: a research agenda for networked systems of embedded computers

    National Research Council Canada - National Science Library

    Committee on Networked Systems of Embedded Computers; National Research Council Staff; Division on Engineering and Physical Sciences; Computer Science and Telecommunications Board; National Academy of Sciences

    2001-01-01

    .... Embedded, Everywhere explores the potential of networked systems of embedded computers and the research challenges arising from embedding computation and communications technology into a wide variety of applicationsâ...

  1. An Investigation of Communication Values and Normative Principles Embedded in a Public/Private Partnership

    National Research Council Canada - National Science Library

    MacDonald, Jessica

    2004-01-01

    .... People cannot work together to solve these problems without communication. this dissertation project examines espoused and embedded preferences for specific communication practices in the context of a public/private partnership...

  2. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    National Research Council Canada - National Science Library

    Ganger, Gregory R

    2007-01-01

    This report summarizes the results of the work on the AFOSR's Critical Infrastructure Protection Program project, entitled Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security...

  3. Involving users in the development of embedded technology in construction

    DEFF Research Database (Denmark)

    Storgaard, Kresten; Buch-Hansen, Thomas Cornelius; Ærenlund, Lærke

    2011-01-01

    Based on a project about user driven innovation and embedded technology in construction (BIIB), the paper discusses methodological issues on user involvement. In the paper especially focus is on the experiences on involving users in collaborative development of scenarios, in the validation...... of scenarios and in developing innovative solutions on a conceptual level. The project discusses 1) concepts of users and 2) methods for collaborative involvement. The first discussion involves presentation of an extended user concept and a discussion of differences between lead users and need-advanced users....... The second discussion on collaborative involvement, discuss experiences with methods for communication across cultural and professional competences with reference to boundary objects, tangible systems and visualization. In the project four segments of situations for use of embedded technology in construction...

  4. 2nd International Conference on Proof-Theoretic Semantics

    CERN Document Server

    Schroeder-Heister, Peter

    2016-01-01

    This volume is the first ever collection devoted to the field of proof-theoretic semantics. Contributions address topics including the systematics of introduction and elimination rules and proofs of normalization, the categorial characterization of deductions, the relation between Heyting's and Gentzen's approaches to meaning, knowability paradoxes, proof-theoretic foundations of set theory, Dummett's justification of logical laws, Kreisel's theory of constructions, paradoxical reasoning, and the defence of model theory. The field of proof-theoretic semantics has existed for almost 50 years, but the term itself was proposed by Schroeder-Heister in the 1980s. Proof-theoretic semantics explains the meaning of linguistic expressions in general and of logical constants in particular in terms of the notion of proof. This volume emerges from presentations at the Second International Conference on Proof-Theoretic Semantics in Tübingen in 2013, where contributing authors were asked to provide a self-contained descri...

  5. Better business case for embedded energy

    International Nuclear Information System (INIS)

    Wallace, Paula

    2014-01-01

    The first customer-led rule change to reform the National Energy Market has been successful, making it easier for clean energy to connect to the national electricity grid. The rule change was adopted by the Australian Energy Market Commission (AEMC) recently and will come into effect from October 1. Led by ClimateWorks Australia, the Property Council of Australia and Seed Advisory, these reforms will make it cheaper and faster to connect co/trigeneration plants and renewable energy to the electricity grid. Some see the reforms unleashing a wave of embedded generation projects on commercial buildings and precincts, seeking energy savings and higher sustainability ratings. However, the benefits that can be assumed at this stage are, greater information from electricity network operators to avoid delays, and known fees and charges so that financial feasibility can be calculated up front.

  6. Getting Embedded in Industry Networks Abroad

    DEFF Research Database (Denmark)

    Gretzinger, Susanne; Dyhr Ulrich, Anna Marie; Hollensen, Svend

    (Hollensen, 2017). This research project aims to explain how the “incubator” can support the acquisition of lacking experiental knowledge and facilitate the process of getting embedded in markets or industrial networks abroad. Theoretical foundation This paper adopts an industrial network approach in line......Expanding to markets abroad is a vital opportunity to stabilize and/or expand a company’s revenues. Companies who suffer from small domestic markets try to overcome competitive pressures by entering new markets (Korsakine and Tvaronaviciene, 2012). In particular, the attention for SMEs to increase...... their activities abroad has turned to the potential of accessing emerging markets with faster growth like the BRIC countries (Brazil, Russia, India and China) in response to the saturation of domestic and European markets (Neupert, et al. 2006, Ulrich, et al., 2014). However, the challenges associated...

  7. Surface Embedded Metal Oxide Sensors (SEMOS)

    DEFF Research Database (Denmark)

    Jespersen, Jesper Lebæk; Talat Ali, Syed; Pleth Nielsen, Lars

    SEMOS is a joint project between Aalborg University, Danish Technological Institute and Danish Technical University in which micro temperature sensors and metal oxide-based gas sensors are developed and tested in a simulated fuel cell environment as well as in actual working fuel cells. Initially......, sensors for measuring the temperatures in an operating HT-PEM (High Temperature-Proton Exchange Membrane) fuel cell are developed for detecting in-plane temperature variations. 5 different tracks for embedded thermal sensors are investigated. The fuel cell MEA (Membrane Electrode Assembly) is quite...... complex and sensors are not easily implemented in the construction. Hence sensor interface and sensor position must therefore be chosen carefully in order to make the sensors as non-intrusive as possible. Metal Oxide Sensors (MOX) for measuring H2, O2 and CO concentration in a fuel cell environment...

  8. Idaho National Engineering and Environmental Laboratory Environmental Technologies Proof-of-Concepts. Final report FY-96

    Energy Technology Data Exchange (ETDEWEB)

    Barrie, S.L.; Carpenter, G.S.; Crockett, A.B. [and others

    1997-04-01

    The Idaho National Engineering and Environmental Laboratory Environmental Technologies Proof-of-Concept Project was initiated for the expedited development of new or conceptual technologies in support of groundwater fate, transport, and remediation; buried waste characterization, retrieval, and treatment; waste minimization/pollution prevention; and spent fuel handling and storage. In Fiscal Year 1996, The Idaho National Engineering and Environmental Laboratory proposed 40 development projects and the Department of Energy funded 15. The projects proved the concepts of the various technologies, and all the technologies contribute to successful environmental management.

  9. Idaho National Engineering and Environmental Laboratory Environmental Technologies Proof-of-Concepts. Final report FY-96

    International Nuclear Information System (INIS)

    Barrie, S.L.; Carpenter, G.S.; Crockett, A.B.

    1997-04-01

    The Idaho National Engineering and Environmental Laboratory Environmental Technologies Proof-of-Concept Project was initiated for the expedited development of new or conceptual technologies in support of groundwater fate, transport, and remediation; buried waste characterization, retrieval, and treatment; waste minimization/pollution prevention; and spent fuel handling and storage. In Fiscal Year 1996, The Idaho National Engineering and Environmental Laboratory proposed 40 development projects and the Department of Energy funded 15. The projects proved the concepts of the various technologies, and all the technologies contribute to successful environmental management

  10. ProofJudge: Automated Proof Judging Tool for Learning Mathematical Logic

    DEFF Research Database (Denmark)

    Villadsen, Jørgen

    2015-01-01

    Today we have software in many artefacts, from medical devices to cars and airplanes, and the software must not only be efficient and intelligent but also reliable and secure. Tests can show the presence of bugs but cannot guarantee their absence. A machine-checked proof using mathematical logic...... pen and paper because no adequate tool was available. The learning problem is how to make abstract concepts of logic as concrete as possible. ProofJudge is a computer system and teaching approach for teaching mathematical logic and automated reasoning which augments the e-learning tool NaDeA (Natural...

  11. ProofJudge: Automated Proof Judging Tool for Learning Mathematical Logic

    DEFF Research Database (Denmark)

    Villadsen, Jørgen

    2016-01-01

    Today we have software in many artefacts, from medical devices to cars and airplanes, and the software must not only be efficient and intelligent but also reliable and secure. Tests can show the presence of bugs but cannot guarantee their absence. A machine-checked proof using mathematical logic...... using pen and paper because no adequate tool was available. The learning problem is how to make abstract concepts of logic as concrete as possible. ProofJudge is a computer system and teaching approach for teaching mathematical logic and automated reasoning which augments the e-learning tool Na...

  12. The Proof is in the Pudding The Changing Nature of Mathematical Proof

    CERN Document Server

    Krantz, Steven G

    2011-01-01

    This text explores the many transformations that the mathematical proof has undergone from its inception to its versatile, present-day use, considering the advent of high-speed computing machines. Though there are many truths to be discovered in this book, by the end it is clear that there is no formalized approach or standard method of discovery to date. Most of the proofs are discussed in detail with figures and equations accompanying them, allowing both the professional mathematician and those less familiar with mathematics to derive the same joy from reading this book.

  13. The selection of embedded computer using in the nuclear physics instruments

    International Nuclear Information System (INIS)

    Zhang Jianchuan; Nan Gangyang; Wang Yanyu; Su Hong

    2010-01-01

    It introduces the requirement for embedded PC and the benefits of using it in the experimental nuclear physics instrument developing and improving project. A cording to the specific requirements in the project of improving laboratory instruments. several kinds of embedded computer are compared and specifically tested. Thus, a x86 architecture embedded computer, which have ultra-low-power consumption and a small in size, is selected to be the main component of the controller using in the nuclear physics instrument, and this will be used in the high-speed data acquisition and electronic control system. (authors)

  14. PC/104 Embedded IOCs at Jefferson Lab

    International Nuclear Information System (INIS)

    Yan, Jianxun; Allison, Trent; Witherspoon, Sue; Cuffe, Anthony

    2009-01-01

    Jefferson Lab has developed embedded IOCs based on PC/104 single board computers (SBC) for low level control systems. The PC/104 IOCs run EPICS on top of the RTEMS operating system. Two types of control system configurations are used in different applications, PC/104 SBC with commercial PC/104 I/O cards and PC/104 SBC with custom designed FPGA-based boards. RTEMS was built with CEXP shell to run on the PC/104 SBC. CEXP shell provides the function of dynamic object loading, which is similar to the widely used VxWorks operating system. Standard software configurations were setup for PC/104 IOC application development to provide a familiar format for new projects as well as ease the conversion of applications from VME based IOCs to PC/104 IOCs. Many new projects at Jefferson Lab are going to employ PC/104 SBCs as IOCs and some applications have already been running them for accelerator operations. The PC/104 - RTEMS IOC provides a free open source Real-Time Operating System (RTOS), low cost/maintenance, easily installed/ configured, flexible, and reliable solution for accelerator control and 12GeV Upgrade projects.

  15. Isometric embeddings in cosmology and astrophysics

    Indian Academy of Sciences (India)

    embedding theory, a given spacetime (or 'brane') is embedded in a higher- ..... If one recalls that the motivation (at least in part) for non-compact extra ... to successfully embed (apparently perfect fluid) astrophysical models, we typically need to.

  16. Poincare ball embeddings of the optical geometry

    International Nuclear Information System (INIS)

    Abramowicz, M A; Bengtsson, I; Karas, V; Rosquist, K

    2002-01-01

    It is shown that the optical geometry of the Reissner-Nordstroem exterior metric can be embedded in a hyperbolic space all the way down to its outer horizon. The adopted embedding procedure removes a breakdown of flat-space embeddings which occurs outside the horizon, at and below the Buchdahl-Bondi limit (R/M=9/4 in the Schwarzschild case). In particular, the horizon can be captured in the optical geometry embedding diagram. Moreover, by using the compact Poincare ball representation of the hyperbolic space, the embedding diagram can cover the whole extent of radius from spatial infinity down to the horizon. Attention is drawn to the advantages of such embeddings in an appropriately curved space: this approach gives compact embeddings and it clearly distinguishes the case of an extremal black hole from a non-extremal one in terms of the topology of the embedded horizon

  17. Open Assessment of Proofs in Litigation

    Directory of Open Access Journals (Sweden)

    Kaltrina Zekolli

    2017-01-01

    Full Text Available The key of existence and success in all domains of life to the entity of justice is the thorough compliance to the truth and justice. Therefore when a certain right is violated, liable or challenged entrusted to solve that, are the institutions of justice, rather the courts. Courts are competent to find the right path towards the truth applying different methods with intention to satisfy the justice. In this paper special attention we dedicated to the method of open assessment of proofs in litigation, that in fact is the subject of this research.

  18. Duan's fixed point theorem: Proof and generalization

    Directory of Open Access Journals (Sweden)

    Arkowitz Martin

    2006-01-01

    Full Text Available Let be an H-space of the homotopy type of a connected, finite CW-complex, any map and the th power map. Duan proved that has a fixed point if . We give a new, short and elementary proof of this. We then use rational homotopy to generalize to spaces whose rational cohomology is the tensor product of an exterior algebra on odd dimensional generators with the tensor product of truncated polynomial algebras on even dimensional generators. The role of the power map is played by a -structure as defined by Hemmi-Morisugi-Ooshima. The conclusion is that and each has a fixed point.

  19. An Embedded Reconfigurable Logic Module

    Science.gov (United States)

    Tucker, Jerry H.; Klenke, Robert H.; Shams, Qamar A. (Technical Monitor)

    2002-01-01

    A Miniature Embedded Reconfigurable Computer and Logic (MERCAL) module has been developed and verified. MERCAL was designed to be a general-purpose, universal module that that can provide significant hardware and software resources to meet the requirements of many of today's complex embedded applications. This is accomplished in the MERCAL module by combining a sub credit card size PC in a DIMM form factor with a XILINX Spartan I1 FPGA. The PC has the ability to download program files to the FPGA to configure it for different hardware functions and to transfer data to and from the FPGA via the PC's ISA bus during run time. The MERCAL module combines, in a compact package, the computational power of a 133 MHz PC with up to 150,000 gate equivalents of digital logic that can be reconfigured by software. The general architecture and functionality of the MERCAL hardware and system software are described.

  20. The Modified Embedded Atom Method

    Energy Technology Data Exchange (ETDEWEB)

    Baskes, M.I.

    1994-08-01

    Recent modifications have been made to generalize the Embedded Atom Method (EAM) to describe bonding in diverse materials. By including angular dependence of the electron density in an empirical way, the Modified Embedded Atom Method (MEAM) has been able to reproduce the basic energetic and structural properties of 45 elements. This method is ideal for examining interfacial behavior of dissimilar materials. This paper explains in detail the derivation of the method, shows how parameters of MEAM are determined directly from experiment or first principles calculations, and examine the quality of the reproduction of the database. Materials with fcc, bcc, hcp, and diamond cubic crystal structure are discussed. A few simple examples of the application of the MEAM to surfaces and interfaces are presented. Calculations of pullout of a SiC fiber in a diamond matrix as a function of applied stress show nonuniform deformation of the fiber.

  1. Embedding

    DEFF Research Database (Denmark)

    Høyrup, Jens

    2016-01-01

    systems, in particular place-value and quasi place-value systems. 2. The development of algebraic symbolisms. 3. The discussion whether “scientific revolutions” ever take place in mathematics, or new conceptualizations always include what preceded them. A final section investigates the relation between...

  2. Sustainable embedded software lifecycle planning

    OpenAIRE

    Lee, Dong-Hyun; In, Hoh Peter; Lee, Keun; Park, Sooyong; Hinchey, Mike

    2012-01-01

    peer-reviewed Time-to-market is a crucial factor in increasing market share in the consumer electronics (CE) market. Furthermore, fierce competition in the market tends to sharply lower the prices of brand-new CE products as soon as they are released. Software-intensive embedded system design methods such as hardware/software co-design have been studied with the goal of reducing development lead-time by designing hardware and software simultaneously. Many researchers, however, concentra...

  3. Embedded multiprocessors scheduling and synchronization

    CERN Document Server

    Sriram, Sundararajan

    2009-01-01

    Techniques for Optimizing Multiprocessor Implementations of Signal Processing ApplicationsAn indispensable component of the information age, signal processing is embedded in a variety of consumer devices, including cell phones and digital television, as well as in communication infrastructure, such as media servers and cellular base stations. Multiple programmable processors, along with custom hardware running in parallel, are needed to achieve the computation throughput required of such applications. Reviews important research in key areas related to the multiprocessor implementation of multi

  4. Bilipschitz embedding of homogeneous fractals

    OpenAIRE

    Lü, Fan; Lou, Man-Li; Wen, Zhi-Ying; Xi, Li-Feng

    2014-01-01

    In this paper, we introduce a class of fractals named homogeneous sets based on some measure versions of homogeneity, uniform perfectness and doubling. This fractal class includes all Ahlfors-David regular sets, but most of them are irregular in the sense that they may have different Hausdorff dimensions and packing dimensions. Using Moran sets as main tool, we study the dimensions, bilipschitz embedding and quasi-Lipschitz equivalence of homogeneous fractals.

  5. Corrosion Monitors for Embedded Evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Robinson, Alex L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Pfeifer, Kent B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Casias, Adrian L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Howell, Stephen W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Sorensen, Neil R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Missert, Nancy A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-05-01

    We have developed and characterized novel in-situ corrosion sensors to monitor and quantify the corrosive potential and history of localized environments. Embedded corrosion sensors can provide information to aid health assessments of internal electrical components including connectors, microelectronics, wires, and other susceptible parts. When combined with other data (e.g. temperature and humidity), theory, and computational simulation, the reliability of monitored systems can be predicted with higher fidelity.

  6. Characterization of Embedded BPM Collimators

    CERN Document Server

    VALENTINO, Gianluca

    2015-01-01

    During LS1, 16 tertiary collimators (TCTs) and 2 secondary collimators (TCSGs) in IR6 were replaced by new embedded BPM collimators. The BPM functionality allows the possibility to align the collimators more quickly and therefore be able to respond faster to machine configuration changes, as well as a direct monitoring of the beam orbit at the collimators. Following an initial commissioning phase, an MD was carried out to test the new collimators and acquisition electronics with beam in the LHC.

  7. Embedded system of image storage based on fiber channel

    Science.gov (United States)

    Chen, Xiaodong; Su, Wanxin; Xing, Zhongbao; Wang, Hualong

    2008-03-01

    In domains of aerospace, aviation, aiming, and optic measure etc., the embedded system of imaging, processing and recording is absolutely necessary, which has small volume, high processing speed and high resolution. But the embedded storage technology becomes system bottleneck because of developing slowly. It is used to use RAID to promote storage speed, but it is unsuitable for the embedded system because of its big volume. Fiber channel (FC) technology offers a new method to develop the high-speed, portable storage system. In order to make storage subsystem meet the needs of high storage rate, make use of powerful Virtex-4 FPGA and high speed fiber channel, advance a project of embedded system of digital image storage based on Xilinx Fiber Channel Arbitrated Loop LogiCORE. This project utilizes Virtex- 4 RocketIO MGT transceivers to transmit the data serially, and connects many Fiber Channel hard drivers by using of Arbitrated Loop optionally. It can achieve 400MBps storage rate, breaks through the bottleneck of PCI interface, and has excellences of high-speed, real-time, portable and massive capacity.

  8. Methods library of embedded R functions at Statistics Norway

    Directory of Open Access Journals (Sweden)

    Øyvind Langsrud

    2017-11-01

    Full Text Available Statistics Norway is modernising the production processes. An important element in this work is a library of functions for statistical computations. In principle, the functions in such a methods library can be programmed in several languages. A modernised production environment demand that these functions can be reused for different statistics products, and that they are embedded within a common IT system. The embedding should be done in such a way that the users of the methods do not need to know the underlying programming language. As a proof of concept, Statistics Norway soon has established a methods library offering a limited number of methods for macro-editing, imputation and confidentiality. This is done within an area of municipal statistics with R as the only programming language. This paper presents the details and experiences from this work. The problem of fitting real word applications to simple and strict standards is discussed and exemplified by the development of solutions to regression imputation and table suppression.

  9. Embedment Effect test on soil-structure interaction

    International Nuclear Information System (INIS)

    Nasuda, Toshiaki; Akino, Kinji; Izumi, Masanori.

    1991-01-01

    A project consisting of laboratory test and field test has been conducted to clarify the embedment effect on soil-structure interaction. The objective of this project is to obtain the data for improving and preparing seismic analysis codes regarding the behavior of embedded reactor buildings during earthquakes. This project was planned to study the effect of soil-structure interaction using small size soil-structure models as well as the large scale models. The project was started in April, 1986, and is scheduled to end in March, 1994. The laboratory test models and field test models, and the measurement with accelerometers and others are described. As the interim results, the natural frequency and damping factor increased, and the amplitude decreased by the embedment of the test models. Some earthquakes were recorded in a soft rock site. The epicenters of the earthquakes occurred in 1989 are shown. The field tests were carried out in three sites. Two sites were used for the dynamic test with four test models having 8 m x 8 m plane size and 10 m height. One site was used for the static test with one concrete block as a specimen. Two models represent BWR type reactor buildings, and two models represent PWR type buildings. (K.I.)

  10. Liquid-Embedded Elastomer Electronics

    Science.gov (United States)

    Kramer, Rebecca; Majidi, Carmel; Park, Yong-Lae; Paik, Jamie; Wood, Robert

    2012-02-01

    Hyperelastic sensors are fabricated by embedding a silicone rubber film with microchannels of conductive liquid. In the case of soft tactile sensors, pressing the surface of the elastomer will deform the cross-section of underlying channels and change their electrical resistance. Soft pressure sensors may be employed in a variety of applications. For example, a network of pressure sensors can serve as artificial skin by yielding detailed information about contact pressures. This concept was demonstrated in a hyperelastic keypad, where perpendicular conductive channels form a quasi-planar network within an elastomeric matrix that registers the location, intensity and duration of applied pressure. In a second demonstration, soft curvature sensors were used for joint angle proprioception. Because the sensors are soft and stretchable, they conform to the host without interfering with the natural mechanics of motion. This marked the first use of liquid-embedded elastomer electronics to monitor human or robotic motion. Finally, liquid-embedded elastomers may be implemented as conductors in applications that call for flexible or stretchable circuitry, such as robotic origami.

  11. Embedding of the radiation cosmos

    International Nuclear Information System (INIS)

    Wang, J.Z.

    1986-01-01

    The embedding of the Friedmann manifold into a higher dimensional Minkowski space is investigated. As solutions of the Friedmann equation with vanishing cosmological term, Friedmann models describe a first expanding, then contracting universe and predict a big bang singularity. For cosmic time t → 0, R(t) → 0, there is an infinite scalar, curvature in the matter cosmos, and an infinite eigenvalue corresponding to the unique timelike eigenvector of the energy-momentum tensor in the radiation cosmos. The big bang, therefore, is an intrinsic singularity of the space time. To investigate the singularity one resorts to the embedding of the Friedmann manifold into a higher dimensional Minkowski space. For the matter cosmos such an investigation has already been done (Lauro and Schucking, 1984). However, the matter cosmos is not a suitable model to discuss the very early universe where the radiation dominates. Geometric properties, such as the Riemann tensor, the Guassian curvature and the global behavior of the geodesics of the embedded manifold, are discussed in detail

  12. Embedding initial data for black hole collisions

    OpenAIRE

    Romano, Joseph D.; Price, Richard H.

    1994-01-01

    We discuss isometric embedding diagrams for the visualization of initial data for the problem of the head-on collision of two black holes. The problem of constructing the embedding diagrams is explicitly presented for the best studied initial data, the Misner geometry. We present a partial solution of the embedding diagrams and discuss issues related to completing the solution.

  13. Autonomous intelligent cars: proof that the EPSRC Principles are future-proof

    NARCIS (Netherlands)

    de Bruin, R.W.; de Cock Buning, M.

    2017-01-01

    Principle 2 of the EPSRC’s principles of robotics (AISB workshop on PrinciplesofRobotics, 2016) proves to be future proof when applied to the current state of the art of law and technology surrounding autonomous intelligent cars (AICs). Humans, not AICS, are responsible agents. AICs should be

  14. Semantic Contamination and Mathematical Proof: Can a Non-Proof Prove?

    Science.gov (United States)

    Mejia-Ramos, Juan Pablo; Inglis, Matthew

    2011-01-01

    The way words are used in natural language can influence how the same words are understood by students in formal educational contexts. Here we argue that this so-called semantic contamination effect plays a role in determining how students engage with mathematical proof, a fundamental aspect of learning mathematics. Analyses of responses to…

  15. Secondary Teachers' Knowledge of Elementary Number Theory Proofs: The Case of General-Cover Proofs

    Science.gov (United States)

    Tabach, Michal; Levenson, Esther; Barkai, Ruthi; Tsamir, Pessia; Tirosh, Dina; Dreyfus, Tommy

    2011-01-01

    In light of recent reform recommendations, teachers are expected to turn proofs and proving into an ongoing component of their classroom practice. Two questions emerging from this requirement are: Is the mathematical knowledge of high school teachers sufficient to prove various kinds of statements? Does teachers' knowledge allow them to determine…

  16. Towards a proof of two conjectures from quantum inference concerning quantum limits of knowledge of states

    International Nuclear Information System (INIS)

    Jones, K.R.W.

    1990-11-01

    A new entropic analogue is given of the recently reported information on theoretic limits to knowledge of states. A natural relationship between the quantum correlation information and the quantum mechanical entropy is thereby revealed. Some progress is made towards a rigorous proof of both results and a complete solution to the problem of asymptotic optimal measurement. In particular the elementary convex analysis was employed to prove that the optimal operator valued measure must be a rank-one projection valued measure. 11 refs

  17. Application Development for Optimizing Patient Placement on Aeromedical Evacuation Flights: Proof-of-Concept

    Science.gov (United States)

    2018-01-12

    PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Brittany Fouts, Jennifer Serres, Ray Hill, Frank Ciarallo 5d. PROJECT NUMBER 5e. TASK NUMBER 5f...APPENDIX A – Flowchart for Graphical Prototype ...................................................................... 9 APPENDIX B – Proof-of-Concept App...would like to thank the programming team at the Department of Operational Analysis at the Air Force Institute of Technology at Wright-Patterson Air

  18. Designing flexible engineering systems utilizing embedded architecture options

    Science.gov (United States)

    Pierce, Jeff G.

    This dissertation develops and applies an integrated framework for embedding flexibility in an engineered system architecture. Systems are constantly faced with unpredictability in the operational environment, threats from competing systems, obsolescence of technology, and general uncertainty in future system demands. Current systems engineering and risk management practices have focused almost exclusively on mitigating or preventing the negative consequences of uncertainty. This research recognizes that high uncertainty also presents an opportunity to design systems that can flexibly respond to changing requirements and capture additional value throughout the design life. There does not exist however a formalized approach to designing appropriately flexible systems. This research develops a three stage integrated flexibility framework based on the concept of architecture options embedded in the system design. Stage One defines an eight step systems engineering process to identify candidate architecture options. This process encapsulates the operational uncertainty though scenario development, traces new functional requirements to the affected design variables, and clusters the variables most sensitive to change. The resulting clusters can generate insight into the most promising regions in the architecture to embed flexibility in the form of architecture options. Stage Two develops a quantitative option valuation technique, grounded in real options theory, which is able to value embedded architecture options that exhibit variable expiration behavior. Stage Three proposes a portfolio optimization algorithm, for both discrete and continuous options, to select the optimal subset of architecture options, subject to budget and risk constraints. Finally, the feasibility, extensibility and limitations of the framework are assessed by its application to a reconnaissance satellite system development problem. Detailed technical data, performance models, and cost estimates

  19. New approach to invariant-embedding methods in reactor physics calculations

    International Nuclear Information System (INIS)

    Forsbacka, M.J.; Rydin, R.A.

    1997-01-01

    Invariant-embedding methods offer an alternative approach to modeling physical phenomena and solving mathematical problems. Invariant embedding allows one to express traditional boundary-value problems as initial-value problems. In doing this, one effectively reformulates a problem to be solved in terms of an embedding parameter. In this paper, a hybrid method that consists of Monte Carlo-generated response functions that describe the neutronic properties of local spatial cells are coupled together in a global reactor model using the invariant embedding methodology, where the system multiplication factor k eff is used as the embedding parameter. Thus, k eff is computed directly rather than as the result of a secondary eigenvalue calculation. Because the response functions can represent any arbitrary material distribution within a local cell, this method shows promise to accurately assess the change in reactivity due to core disruptive accidents and other changes in system configuration such as changing control rod positions. This paper reports a series of proof-of-concept calculations that assess this method

  20. 43 CFR 4.840 - Offer of proof.

    Science.gov (United States)

    2010-10-01

    ... the Interior-Effectuation of Title VI of the Civil Rights Act of 1964 Hearing § 4.840 Offer of proof. An offer of proof made in connection with an objection taken to any ruling of the administrative law... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Offer of proof. 4.840 Section 4.840 Public...

  1. A portable virtual machine target for proof-carrying code

    DEFF Research Database (Denmark)

    Franz, Michael; Chandra, Deepak; Gal, Andreas

    2005-01-01

    Virtual Machines (VMs) and Proof-Carrying Code (PCC) are two techniques that have been used independently to provide safety for (mobile) code. Existing virtual machines, such as the Java VM, have several drawbacks: First, the effort required for safety verification is considerable. Second and mor...... simultaneously providing efficient justin-time compilation and target-machine independence. In particular, our approach reduces the complexity of the required proofs, resulting in fewer proof obligations that need to be discharged at the target machine....

  2. The direct Flow parametric Proof of Gauss' Divergence Theorem revisited

    OpenAIRE

    Markvorsen, Steen

    2006-01-01

    The standard proof of the divergence theorem in undergraduate calculus courses covers the theorem for static domains between two graph surfaces. We show that within first year undergraduate curriculum, the flow proof of the dynamic version of the divergence theorem - which is usually considered only much later in more advanced math courses - is comprehensible with only a little extension of the first year curriculum. Moreover, it is more intuitive than the static proof. We support this intuit...

  3. A String of Pearls: Proofs of Fermat's Little Theorem

    Directory of Open Access Journals (Sweden)

    Hing Lun Chan

    2013-01-01

    Full Text Available We discuss mechanised proofs of Fermat's Little Theorem in a variety of styles, focusing in particular on an elegant combinatorial ``necklace'' proof that has not been mechanised previously.What is elegant in prose turns out to be long-winded mechanically, and so we examine the effect of explicitly appealing to group theory. This has pleasant consequences both for the necklace proof, and also for some of the direct number-theoretic approaches.

  4. Permutation entropy with vector embedding delays

    Science.gov (United States)

    Little, Douglas J.; Kane, Deb M.

    2017-12-01

    Permutation entropy (PE) is a statistic used widely for the detection of structure within a time series. Embedding delay times at which the PE is reduced are characteristic timescales for which such structure exists. Here, a generalized scheme is investigated where embedding delays are represented by vectors rather than scalars, permitting PE to be calculated over a (D -1 ) -dimensional space, where D is the embedding dimension. This scheme is applied to numerically generated noise, sine wave and logistic map series, and experimental data sets taken from a vertical-cavity surface emitting laser exhibiting temporally localized pulse structures within the round-trip time of the laser cavity. Results are visualized as PE maps as a function of embedding delay, with low PE values indicating combinations of embedding delays where correlation structure is present. It is demonstrated that vector embedding delays enable identification of structure that is ambiguous or masked, when the embedding delay is constrained to scalar form.

  5. A Concise and Direct Proof of "Fermat's Last Theorem"

    OpenAIRE

    Ellman, Roger

    1998-01-01

    The recently developed proof of Fermat's Last Theorem is very lengthy and difficult, so much so as to be beyond all but a small body of specialists. While certainly of value in the developments that resulted, that proof could not be, nor was offered as being, possibly the proof Fermat had in mind. The present proof being brief, direct and concise is a candidate for being what Fermat had in mind. It is also completely accessible to any one trained in common algebra. That critical suggestions o...

  6. Reliability analysis of structures under periodic proof tests in service

    Science.gov (United States)

    Yang, J.-N.

    1976-01-01

    A reliability analysis of structures subjected to random service loads and periodic proof tests treats gust loads and maneuver loads as random processes. Crack initiation, crack propagation, and strength degradation are treated as the fatigue process. The time to fatigue crack initiation and ultimate strength are random variables. Residual strength decreases during crack propagation, so that failure rate increases with time. When a structure fails under periodic proof testing, a new structure is built and proof-tested. The probability of structural failure in service is derived from treatment of all the random variables, strength degradations, service loads, proof tests, and the renewal of failed structures. Some numerical examples are worked out.

  7. Embeddings between weighted Copson and Cesaro function spaces

    Czech Academy of Sciences Publication Activity Database

    Gogatishvili, Amiran; Mustafayev, R.Ch.; Ünver, T.

    2017-01-01

    Roč. 67, č. 4 (2017), s. 1005-1132 ISSN 0011-4642 R&D Projects: GA ČR GA13-14743S Institutional support: RVO:67985840 Keywords : Cesaro and Copson function spaces * embedding * iterated Hardy inequalities Subject RIV: BA - General Mathematics OBOR OECD: Pure mathematics Impact factor: 0.364, year: 2016 https://link.springer.com/article/10.21136/CMJ.2017.0424-16

  8. Embeddings of Lorentz-type spaces involving weighted integral means

    Czech Academy of Sciences Publication Activity Database

    Gogatishvili, Amiran; Křepela, M.; Pick, L.; Soudský, F.

    2017-01-01

    Roč. 273, č. 9 (2017), s. 2939-2980 ISSN 0022-1236 R&D Projects: GA ČR GA13-14743S Institutional support: RVO:67985840 Keywords : classical Lorentz spaces * embeddings * iterated operators Subject RIV: BA - General Mathematics OBOR OECD: Pure mathematics Impact factor: 1.254, year: 2016 http://www.sciencedirect.com/science/article/pii/S0022123617302252

  9. Comparison of Component Frameworks for Real-Time Embedded Systems

    Czech Academy of Sciences Publication Activity Database

    Pop, T.; Hnětynka, P.; Hošek, P.; Malohlava, M.; Bureš, Tomáš

    2014-01-01

    Roč. 40, č. 1 (2014), s. 127-170 ISSN 0219-1377 Grant - others:GA AV ČR(CZ) GAP202/11/0312; GA UK(CZ) Project 378111; UK(CZ) SVV-2013- 267312 Keywords : component-based development * component frameworks * real-time and embedded systems Subject RIV: JC - Computer Hardware ; Software Impact factor: 1.782, year: 2014

  10. Laplacian embedded regression for scalable manifold regularization.

    Science.gov (United States)

    Chen, Lin; Tsang, Ivor W; Xu, Dong

    2012-06-01

    Semi-supervised learning (SSL), as a powerful tool to learn from a limited number of labeled data and a large number of unlabeled data, has been attracting increasing attention in the machine learning community. In particular, the manifold regularization framework has laid solid theoretical foundations for a large family of SSL algorithms, such as Laplacian support vector machine (LapSVM) and Laplacian regularized least squares (LapRLS). However, most of these algorithms are limited to small scale problems due to the high computational cost of the matrix inversion operation involved in the optimization problem. In this paper, we propose a novel framework called Laplacian embedded regression by introducing an intermediate decision variable into the manifold regularization framework. By using ∈-insensitive loss, we obtain the Laplacian embedded support vector regression (LapESVR) algorithm, which inherits the sparse solution from SVR. Also, we derive Laplacian embedded RLS (LapERLS) corresponding to RLS under the proposed framework. Both LapESVR and LapERLS possess a simpler form of a transformed kernel, which is the summation of the original kernel and a graph kernel that captures the manifold structure. The benefits of the transformed kernel are two-fold: (1) we can deal with the original kernel matrix and the graph Laplacian matrix in the graph kernel separately and (2) if the graph Laplacian matrix is sparse, we only need to perform the inverse operation for a sparse matrix, which is much more efficient when compared with that for a dense one. Inspired by kernel principal component analysis, we further propose to project the introduced decision variable into a subspace spanned by a few eigenvectors of the graph Laplacian matrix in order to better reflect the data manifold, as well as accelerate the calculation of the graph kernel, allowing our methods to efficiently and effectively cope with large scale SSL problems. Extensive experiments on both toy and real

  11. Habitual Tastes and Embedded Taste

    DEFF Research Database (Denmark)

    Hedegaard, Liselotte

    2016-01-01

    The interest of this paper is to position taste within the framework of time. This might seem peculiar given that taste, in its physical sense, is referred to as an ephemeral experience taking place in the mouth. Taste, however, is more than that. It is the transient experience that infiltrates...... may be bridged by story-telling or other ways of handing over historically embedded practices, but this leaves a more fundamental question unanswered. Namely, that given that all remembrance has individual recollection as the point of departure, then how does individual recollection of tastes...

  12. Professional Windows Embedded Compact 7

    CERN Document Server

    Phung, Samuel; Joubert, Thierry; Hall, Mike

    2011-01-01

    Learn to program an array of customized devices and solutions As a compact, highly efficient, scalable operating system, Windows Embedded Compact 7 (WEC7) is one of the best options for developing a new generation of network-enabled, media-rich, and service-oriented devices. This in-depth resource takes you through the benefits and capabilities of WEC7 so that you can start using this performance development platform today. Divided into several major sections, the book begins with an introduction and then moves on to coverage of OS design, application development, advanced application developm

  13. Potential Functional Embedding Theory at the Correlated Wave Function Level. 2. Error Sources and Performance Tests.

    Science.gov (United States)

    Cheng, Jin; Yu, Kuang; Libisch, Florian; Dieterich, Johannes M; Carter, Emily A

    2017-03-14

    Quantum mechanical embedding theories partition a complex system into multiple spatial regions that can use different electronic structure methods within each, to optimize trade-offs between accuracy and cost. The present work incorporates accurate but expensive correlated wave function (CW) methods for a subsystem containing the phenomenon or feature of greatest interest, while self-consistently capturing quantum effects of the surroundings using fast but less accurate density functional theory (DFT) approximations. We recently proposed two embedding methods [for a review, see: Acc. Chem. Res. 2014 , 47 , 2768 ]: density functional embedding theory (DFET) and potential functional embedding theory (PFET). DFET provides a fast but non-self-consistent density-based embedding scheme, whereas PFET offers a more rigorous theoretical framework to perform fully self-consistent, variational CW/DFT calculations [as defined in part 1, CW/DFT means subsystem 1(2) is treated with CW(DFT) methods]. When originally presented, PFET was only tested at the DFT/DFT level of theory as a proof of principle within a planewave (PW) basis. Part 1 of this two-part series demonstrated that PFET can be made to work well with mixed Gaussian type orbital (GTO)/PW bases, as long as optimized GTO bases and consistent electron-ion potentials are employed throughout. Here in part 2 we conduct the first PFET calculations at the CW/DFT level and compare them to DFET and full CW benchmarks. We test the performance of PFET at the CW/DFT level for a variety of types of interactions (hydrogen bonding, metallic, and ionic). By introducing an intermediate CW/DFT embedding scheme denoted DFET/PFET, we show how PFET remedies different types of errors in DFET, serving as a more robust type of embedding theory.

  14. Climate-proof planning for flood-prone areas : assessing the adaptive capacity of planning institutions in the Netherlands

    NARCIS (Netherlands)

    van den Brink, Margo; Meijerink, Sander; Termeer, Catrien; Gupta, Joyeeta

    It is generally acknowledged that adapting low-lying, flood-prone deltas to the projected impacts of climate change is of great importance. Deltas are densely populated and often subject to high risk. Climate-proof planning is, however, not only a new but also a highly complex task that poses

  15. Climate-proof planning for flood-prone areas: assessing the adaptive capacity of planning institutions in the Netherlands

    NARCIS (Netherlands)

    Brink, van den M.A.; Meijerink, S.; Termeer, C.J.A.M.; Gupta, J.

    2014-01-01

    It is generally acknowledged that adapting lowlying, flood-prone deltas to the projected impacts of climate change is of great importance. Deltas are densely populated and often subject to high risk. Climate-proof planning is, however, not only a new but also a highly complex task that poses

  16. Fracture flow modelling. Proof of evidence

    International Nuclear Information System (INIS)

    Hencher, S.R.

    1996-01-01

    Proof of Evidence by an expert witness is presented in support of the case by Friends of the Earth (FOE) against the proposed construction by UK Nirex Ltd of an underground Rock Characterisation Facility (RCF) at a site in the Sellafield area. The RCF is part of an investigation by Nirex into a suitable site for an underground repository for the disposal of radioactive waste. The objections were raised at a Planning Inquiry in 1995. The evidence points out that current understanding of the factors which control flow through a network of interconnecting fractures, such as that at the Sellafield site, is at a very early stage of development. Neither are the methods of investigation and analysis required for a post-closure performance assessment (PCPA) for a repository well developed. These issues are being investigated in international underground research laboratories but the proposed RCF is intended to be confirmatory rather than experimental. (23 references). (UK)

  17. Tritium proof-of-principle injector experiment

    International Nuclear Information System (INIS)

    Fisher, P.W.; Milora, S.L.; Combs, S.K.; Carlson, R.V.; Coffin, D.O.

    1988-01-01

    The Tritium Proof-of-Principle (TPOP) pellet injector was designed and built by Oak Ridge National Laboratory (ORNL) to evaluate the production and acceleration of tritium pellets for fueling future fision reactors. The injector uses the pipe-gun concept to form pellets directly in a short liquid-helium-cooled section of the barrel. Pellets are accelerated by using high-pressure hydrogen supplied from a fast solenoid valve. A versatile, tritium-compatible gas-handling system provides all of the functions needed to operate the gun, including feed gas pressure control and flow control, plus helium separation and preparation of mixtures. These systems are contained in a glovebox for secondary containment of tritium Systems Test Assembly (TSTA) at Los Alamos National Laboratory (LANL). 18 refs., 3 figs

  18. Complete proof systems for weighted modal logic

    DEFF Research Database (Denmark)

    Larsen, Kim G.; Mardare, Radu

    2014-01-01

    (WML) is a multi-modal logic that expresses qualitative and quantitative properties of WTSs. While WML has been studied in various contexts and for various application domains, no proof system has been developed for it. In this paper we solve this open problem and propose both weak-complete and strong......The weighted transition systems (WTS) considered in this paper are transition systems having both states and transitions labeled with real numbers: the state labels denote quantitative resources, while the transition labels denote costs of transitions in terms of resources. Weighted Modal Logic....... This work emphasizes a series of similarities between WML and the probabilistic/stochastic modal logics for Markov processes and Harsanyi type spaces, such as the use of particular infinitary rules to guarantee the strong-completeness....

  19. Duan's fixed point theorem: proof and generalization

    Directory of Open Access Journals (Sweden)

    2006-01-01

    Full Text Available Let X be an H-space of the homotopy type of a connected, finite CW-complex, f:X→X any map and p k :X→X the k th power map. Duan proved that p k f :X→X has a fixed point if k≥2 . We give a new, short and elementary proof of this. We then use rational homotopy to generalize to spaces X whose rational cohomology is the tensor product of an exterior algebra on odd dimensional generators with the tensor product of truncated polynomial algebras on even dimensional generators. The role of the power map is played by a θ -structure μ θ :X→X as defined by Hemmi-Morisugi-Ooshima. The conclusion is that μ θ f and f μ θ each has a fixed point.

  20. Soft magnetic tweezers: a proof of principle.

    Science.gov (United States)

    Mosconi, Francesco; Allemand, Jean François; Croquette, Vincent

    2011-03-01

    We present here the principle of soft magnetic tweezers which improve the traditional magnetic tweezers allowing the simultaneous application and measurement of an arbitrary torque to a deoxyribonucleic acid (DNA) molecule. They take advantage of a nonlinear coupling regime that appears when a fast rotating magnetic field is applied to a superparamagnetic bead immersed in a viscous fluid. In this work, we present the development of the technique and we compare it with other techniques capable of measuring the torque applied to the DNA molecule. In this proof of principle, we use standard electromagnets to achieve our experiments. Despite technical difficulties related to the present implementation of these electromagnets, the agreement of measurements with previous experiments is remarkable. Finally, we propose a simple way to modify the experimental design of electromagnets that should bring the performances of the device to a competitive level.

  1. Design considerations for prepress color proof measurement

    Science.gov (United States)

    Spooner, David L.

    1993-06-01

    For our purposes, we needed colorimetric measurements or, better yet, spectral reflectance data. Our survey of commercially available instruments identified one spectrocolorimeter, the Hunter PICS (manufactured by Hunter Associates Laboratory, Inc.), which could be programmed to automatically measure the color (and spectral reflectance) of large numbers of samples on a proof sheet. After an evaluation of this instrument, which included measuring over 10,000 exhibits, it was decided that the unit did not fully meet our needs. This resulted in a decision to integrate another instrument, the Byk-Gardner Color Machine (manufactured by Byk-Gardner, Inc.), with an x-y positioning mechanism. This paper describes the design considerations used in the development of our color measurement system.

  2. Proofs and generalizations of the pythagorean theorem

    Directory of Open Access Journals (Sweden)

    Lialda B. Cavalcanti

    2011-01-01

    Full Text Available This article explores a topic developed by a group of researchers of the Science and Technology Teaching School of Instituto Federal de Pernambuco, Brazil (IFPE, in assistance to the development of the Mathematics Practical and Teaching Laboratory of the distance learning Teaching Licensure, financed by the Universidad Abierta de Brasil. In this article, we describe the peculiarities present in the proofs of the Pythagorean theorem with the purpose of illustrating some of these methods. The selection of these peculiarities was founded and based on the comparison of areas by means of the superimposition of geometrical shapes and used several different class resources. Some generalizations of this important theorem in mathematical problem-solving are also shown.

  3. The direct liquefaction proof of concept program

    Energy Technology Data Exchange (ETDEWEB)

    Comolli, A.G.; Lee, L.K.; Pradhan, V.R.; Stalzer, R.H. [New York & Puritan Avenues, Lawrenceville, NJ (United States)

    1995-12-31

    The goal of the Proof of Concept (POC) Program is to develop Direct Coal Liquefaction and associated transitional technologies towards commercial readiness for economically producing premium liquid fuels from coal in an environmentally acceptable manner. The program focuses on developing the two-stage liquefaction (TSL) process by utilizing geographically strategic feedstocks, commercially feasible catalysts, new prototype equipment, and testing co-processing or alternate feedstocks and improved process configurations. Other high priority objectives include dispersed catalyst studies, demonstrating low rank coal liquefaction without solids deposition, improving distillate yields on a unit reactor volume basis, demonstrating ebullated bed operations while obtaining scale-up data, demonstrating optimum catalyst consumption using new concepts (e.g. regeneration, cascading), producing premium products through on-line hydrotreating, demonstrating improved hydrogen utilization for low rank coals using novel heteroatom removal methods, defining and demonstrating two-stage product properties for upgrading; demonstrating efficient and economic solid separation methods, examining the merits of integrated coal cleaning, demonstrating co-processing, studying interactions between the preheater and first and second-stage reactors, improving process operability by testing and incorporating advanced equipment and instrumentation, and demonstrating operation with alternate coal feedstocks. During the past two years major PDU Proof of Concept runs were completed. POC-1 with Illinois No. 6 coal and POC-2 with Black Thunder sub-bituminous coal. Results from these operations are continuing under review and the products are being further refined and upgraded. This paper will update the results from these operations and discuss future plans for the POC program.

  4. Proof testing of an explosion containment vessel

    Energy Technology Data Exchange (ETDEWEB)

    Esparza, E.D. [Esparza (Edward D.), San Antonio, TX (United States); Stacy, H.; Wackerle, J. [Los Alamos National Lab., NM (United States)

    1996-10-01

    A steel containment vessel was fabricated and proof tested for use by the Los Alamos National Laboratory at their M-9 facility. The HY-100 steel vessel was designed to provide total containment for high explosives tests up to 22 lb (10 kg) of TNT equivalent. The vessel was fabricated from an 11.5-ft diameter cylindrical shell, 1.5 in thick, and 2:1 elliptical ends, 2 in thick. Prior to delivery and acceptance, three types of tests were required for proof testing the vessel: a hydrostatic pressure test, air leak tests, and two full design charge explosion tests. The hydrostatic pressure test provided an initial static check on the capacity of the vessel and functioning of the strain instrumentation. The pneumatic air leak tests were performed before, in between, and after the explosion tests. After three smaller preliminary charge tests, the full design charge weight explosion tests demonstrated that no yielding occurred in the vessel at its rated capacity. The blast pressures generated by the explosions and the dynamic response of the vessel were measured and recorded with 33 strain channels, 4 blast pressure channels, 2 gas pressure channels, and 3 displacement channels. This paper presents an overview of the test program, a short summary of the methodology used to predict the design blast loads, a brief description of the transducer locations and measurement systems, some of the hydrostatic test strain and stress results, examples of the explosion pressure and dynamic strain data, and some comparisons of the measured data with the design loads and stresses on the vessel.

  5. Testing framework for embedded languages

    Science.gov (United States)

    Leskó, Dániel; Tejfel, Máté

    2012-09-01

    Embedding a new programming language into an existing one is a widely used technique, because it fastens the development process and gives a part of a language infrastructure for free (e.g. lexical, syntactical analyzers). In this paper we are presenting a new advantage of this development approach regarding to adding testing support for these new languages. Tool support for testing is a crucial point for a newly designed programming language. It could be done in the hard way by creating a testing tool from scratch, or we could try to reuse existing testing tools by extending them with an interface to our new language. The second approach requires less work, and also it fits very well for the embedded approach. The problem is that the creation of such interfaces is not straightforward at all, because the existing testing tools were mostly not designed to be extendable and to be able to deal with new languages. This paper presents an extendable and modular model of a testing framework, in which the most basic design decision was to keep the - previously mentioned - interface creation simple and straightforward. Other important aspects of our model are the test data generation, the oracle problem and the customizability of the whole testing phase.

  6. Drilling azimuth gamma embedded design

    Directory of Open Access Journals (Sweden)

    Zhou Yi Ren

    2016-01-01

    Full Text Available Embedded drilling azimuth gamma design, the use of radioactive measuring principle embedded gamma measurement while drilling a short section analysis. Monte Carlo method, in response to the density of horizontal well logging numerical simulation of 16 orientation, the orientation of horizontal well analysed, calliper, bed boundary location, space, different formation density, formation thickness, and other factors inclined strata dip the impact by simulating 137Cs sources under different formation conditions of the gamma distribution, to determine the orientation of drilling density tool can detect window size and space, draw depth of the logging methods. The data 360° azimuth imaging, image processing method to obtain graph, display density of the formation, dip and strata thickness and other parameters, the logging methods obtain real-time geo-steering. To establish a theoretical basis for the orientation density logging while drilling method implementation and application of numerical simulation in-depth study of the MWD azimuth and density log response factors of horizontal wells.

  7. Nanofluidic Device with Embedded Nanopore

    Science.gov (United States)

    Zhang, Yuning; Reisner, Walter

    2014-03-01

    Nanofluidic based devices are robust methods for biomolecular sensing and single DNA manipulation. Nanopore-based DNA sensing has attractive features that make it a leading candidate as a single-molecule DNA sequencing technology. Nanochannel based extension of DNA, combined with enzymatic or denaturation-based barcoding schemes, is already a powerful approach for genome analysis. We believe that there is revolutionary potential in devices that combine nanochannels with nanpore detectors. In particular, due to the fast translocation of a DNA molecule through a standard nanopore configuration, there is an unfavorable trade-off between signal and sequence resolution. With a combined nanochannel-nanopore device, based on embedding a nanopore inside a nanochannel, we can in principle gain independent control over both DNA translocation speed and sensing signal, solving the key draw-back of the standard nanopore configuration. We demonstrate that we can detect - using fluorescent microscopy - successful translocation of DNA from the nanochannel out through the nanopore, a possible method to 'select' a given barcode for further analysis. We also show that in equilibrium DNA will not escape through an embedded sub-persistence length nanopore until a certain voltage bias is added.

  8. Proof-of-Concept of the Phytoimmobilization Technology for TNX Outfall Delta: Final Report; FINAL

    International Nuclear Information System (INIS)

    Kaplan, D.I.

    2001-01-01

    A series of proof-of-principle studies was initiated to evaluate the soil remediation technology, phytoimmobilization, for application at the TNX Outfall Delta (TNX OD) operable unit. Phytoimmobilization involves two steps. The first step is entitled phytoextraction, and it takes place mostly during the spring and summer. During this step the plants extract contaminants from the sediment into the roots and then translocate the contaminants to the aboveground plant parts. The second step is referred to as sequestration and it takes place largely during the autumn and winter when annual plants senesce or deciduous trees drop their leaves. This step involves the immobilization of the contaminant once it leaches form the fallen leaves into a ''geomat,'' a geotextile embedded with mineral sequestering agents. This final report describes the results to date, including those reported in the status report (Kaplan et al. 2000a), those completed since the report was issued, and the preliminary calculations of the phytoimmobilization effectiveness

  9. ETHERNET BASED EMBEDDED SYSTEM FOR FEL DIAGNOSTICS AND CONTROLS

    International Nuclear Information System (INIS)

    Jianxun Yan; Daniel Sexton; Steven Moore; Albert Grippo; Kevin Jordan

    2006-01-01

    An Ethernet based embedded system has been developed to upgrade the Beam Viewer and Beam Position Monitor (BPM) systems within the free-electron laser (FEL) project at Jefferson Lab. The embedded microcontroller was mounted on the front-end I/O cards with software packages such as Experimental Physics and Industrial Control System (EPICS) and Real Time Executive for Multiprocessor System (RTEMS) running as an Input/Output Controller (IOC). By cross compiling with the EPICS, the RTEMS kernel, IOC device supports, and databases all of these can be downloaded into the microcontroller. The first version of the BPM electronics based on the embedded controller was built and is currently running in our FEL system. The new version of BPM that will use a Single Board IOC (SBIOC), which integrates with an Field Programming Gate Array (FPGA) and a ColdFire embedded microcontroller, is presently under development. The new system has the features of a low cost IOC, an open source real-time operating system, plug and play-like ease of installation and flexibility, and provides a much more localized solution

  10. 14 CFR 13.225 - Offer of proof.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Offer of proof. 13.225 Section 13.225... INVESTIGATIVE AND ENFORCEMENT PROCEDURES Rules of Practice in FAA Civil Penalty Actions § 13.225 Offer of proof. A party whose evidence has been excluded by a ruling of the administrative law judge may offer the...

  11. 14 CFR 406.155 - Offer of proof.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Offer of proof. 406.155 Section 406.155... Transportation Adjudications § 406.155 Offer of proof. A party whose evidence has been excluded by a ruling of the administrative law judge may offer the evidence for the record on appeal. ...

  12. 14 CFR 16.231 - Offer of proof.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Offer of proof. 16.231 Section 16.231... PRACTICE FOR FEDERALLY-ASSISTED AIRPORT ENFORCEMENT PROCEEDINGS Hearings § 16.231 Offer of proof. A party whose evidence has been excluded by a ruling of the hearing officer may offer the evidence on the record...

  13. 49 CFR 1503.641 - Offer of proof.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Offer of proof. 1503.641 Section 1503.641... Rules of Practice in TSA Civil Penalty Actions § 1503.641 Offer of proof. A party whose evidence has been excluded by a ruling of the ALJ may offer the evidence for the record on appeal. ...

  14. Tree Resolution Proofs of the Weak Pigeon-Hole Principle

    DEFF Research Database (Denmark)

    Dantchev, Stefan Stajanov; Riis, Søren

    2001-01-01

    We prove that any optimal tree resolution proof of PHPn m is of size 2&thetas;(n log n), independently from m, even if it is infinity. So far, only a 2Ω(n) lower bound has been known in the general case. We also show that any, not necessarily optimal, regular tree resolution proof PHPn m is bound...

  15. Another proof of Gell-Mann and Low's theorem

    OpenAIRE

    Molinari, Luca Guido

    2006-01-01

    The theorem by Gell-Mann and Low is a cornerstone in QFT and zero-temperature many-body theory. The standard proof is based on Dyson's time-ordered expansion of the propagator; a proof based on exact identities for the time-propagator is here given.

  16. Another proof of Gell-Mann and Low's theorem

    International Nuclear Information System (INIS)

    Molinari, Luca Guido

    2007-01-01

    The theorem by Gell-Mann and Low is a cornerstone in quantum field theory and zero-temperature many-body theory. The standard proof is based on Dyson's time-ordered expansion of the propagator; a proof based on exact identities for the time propagator is here given

  17. A new proof of the positive energy theorem

    International Nuclear Information System (INIS)

    Witten, E.

    1981-01-01

    A new proof is given of the positive energy theorem of classical general relativity. Also, a new proof is given that there are no asymptotically Euclidean gravitational instantons. (These theorems have been proved previously, by a different method, by Schoen and Yau). The relevance of these results to the stability of Minkowski space is discussed. (orig.)

  18. A proof challenge: multiple alignment and information compression

    OpenAIRE

    Wolff, J Gerard

    2014-01-01

    These notes pose a "proof challenge": a proof, or disproof, of the proposition that "For any given body of information, I, expressed as a one-dimensional sequence of atomic symbols, a multiple alignment concept, described in the document, provides a means of encoding all the redundancy that may exist in I. Aspects of the challenge are described.

  19. 34 CFR 34.14 - Burden of proof.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Burden of proof. 34.14 Section 34.14 Education Office of the Secretary, Department of Education ADMINISTRATIVE WAGE GARNISHMENT § 34.14 Burden of proof. (a... those in § 34.24. (d)(1) If you object on the ground that applicable law bars us from collecting the...

  20. Car sequencing is NP-hard: a short proof

    OpenAIRE

    B Estellon; F Gardi

    2013-01-01

    In this note, a new proof is given that the car sequencing (CS) problem is NP-hard. Established from the Hamiltonian Path problem, the reduction is direct while closing some gaps remaining in the previous NP-hardness results. Since CS is studied in many operational research courses, this result and its proof are particularly interesting for teaching purposes.

  1. Security proof for round robin differential phase shift QKD

    NARCIS (Netherlands)

    Leermakers, D.; Skoric, B.

    2017-01-01

    We give the first information-theoretic security proof of the `Round Robin Differential Phase Shift' Quantum Key Distribution scheme. Our proof consists of the following steps. We construct an EPR variant of the scheme. We identify Eve's optimal way of coupling an ancilla to an EPR qudit pair under

  2. Values and Norms of Proof for Mathematicians and Students

    Science.gov (United States)

    Dawkins, Paul Christian; Weber, Keith

    2017-01-01

    In this theoretical paper, we present a framework for conceptualizing proof in terms of mathematical values, as well as the norms that uphold those values. In particular, proofs adhere to the values of establishing a priori truth, employing decontextualized reasoning, increasing mathematical understanding, and maintaining consistent standards for…

  3. Preservice Mathematics Teachers' Metaphorical Perceptions towards Proof and Proving

    Science.gov (United States)

    Ersen, Zeynep Bahar

    2016-01-01

    Since mathematical proof and proving are in the center of mathematics; preservice mathematics teachers' perceptions against these concepts have a great importance. Therefore, the study aimed to determine preservice mathematics teachers' perceptions towards proof and proving through metaphors. The participants consisted of 192 preservice…

  4. A Calculus of Circular Proofs and its Categorical Semantics

    DEFF Research Database (Denmark)

    Santocanale, Luigi

    2002-01-01

    We present a calculus of “circular proofs”: the graph underlying a proof is not a finite tree but instead it is allowed to contain a certain amount of cycles.The main challenge in developing a theory for the calculus is to define the semantics of proofs, since the usual method by induction...

  5. Why prove it again? alternative proofs in mathematical practice

    CERN Document Server

    Dawson, Jr , John W

    2015-01-01

    This monograph considers several well-known mathematical theorems and asks the question, “Why prove it again?” while examining alternative proofs.   It  explores the different rationales mathematicians may have for pursuing and presenting new proofs of previously established results, as well as how they judge whether two proofs of a given result are different.  While a number of books have examined alternative proofs of individual theorems, this is the first that presents comparative case studies of other methods for a variety of different theorems. The author begins by laying out the criteria for distinguishing among proofs and enumerates reasons why new proofs have, for so long, played a prominent role in mathematical practice.  He then outlines various purposes that alternative proofs may serve.  Each chapter that follows provides a detailed case study of alternative proofs for particular theorems, including the Pythagorean Theorem, the Fundamental Theorem of Arithmetic, Desargues’ Theorem, the...

  6. An Examination of Undefined Forms of Proof in Academic Debate.

    Science.gov (United States)

    Underwood, Willard A.

    Although texts on debate and argumentation deal with accepted forms of evidence, reasoning, and logical methods of proof, they do not cover adequately the "undefined" forms of proof. Criteria of evidence found in forensic literature are not always followed strictly by judges, in courtroom or classroom. Many debate judges allow imprecise, vague, or…

  7. Velocity feedback control with a flywheel proof mass actuator

    Science.gov (United States)

    Kras, Aleksander; Gardonio, Paolo

    2017-08-01

    This paper presents four new proof mass actuators to be used in velocity feedback control systems for the control of vibrations of machines and flexible structures. A classical proof mass actuator is formed by a coil-magnet linear motor, with either the magnet or the armature-coil proof mass suspended on soft springs. This arrangement produces a net force effect at frequencies above the fundamental resonance frequency of the springs-proof mass system. Thus, it can be used to implement point velocity feedback loops, although the dynamic response and static deflection of the springs-proof mass system poses some stability and control performance limitations. The four proof mass actuators presented in this study include a flywheel element, which is used to augment the inertia effect of the suspended proof mass. The paper shows that the flywheel element modifies both the dynamic response and static deflection of the springs-proof mass system in such a way as the stability and control performance of velocity feedback loops using these actuators are significantly improved.

  8. A correctness proof of the bakery protocol in $ mu $CRL

    NARCIS (Netherlands)

    J.F. Groote (Jan Friso); H.P. Korver

    1994-01-01

    textabstractA specification of a bakery protocol is given in $mu$CRL. We provide a simple correctness criterion for the protocol. Then the protocol is proven correct using a proof system that has been developed for $mu$CRL. The proof primarily consists of algebraic manipulations based on

  9. Three Styles Characterising Mathematicians' Pedagogical Perspectives on Proof

    Science.gov (United States)

    Hemmi, Kirsti

    2010-01-01

    The article describes mathematicians' pedagogical perspectives on proof in the teaching of first year university students at a mathematics department in Sweden. A conceptual frame that was used in the data analysis combines theories about proof from earlier mathematics education research with a social practice approach of Lave and Wenger. A…

  10. The bounded proof property via step algebras and step frames

    NARCIS (Netherlands)

    Bezhanishvili, N.; Ghilardi, Silvio

    2013-01-01

    We develop a semantic criterion for a specific rule-based calculus Ax axiomatizing a given logic L to have the so-called bounded proof property. This property is a kind of an analytic subformula property limiting the proof search space. Our main tools are one-step frames and one-step algebras. These

  11. 14 CFR 25.307 - Proof of structure.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Proof of structure. 25.307 Section 25.307... STANDARDS: TRANSPORT CATEGORY AIRPLANES Structure General § 25.307 Proof of structure. (a) Compliance with... condition. Structural analysis may be used only if the structure conforms to that for which experience has...

  12. 14 CFR 23.307 - Proof of structure.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Proof of structure. 23.307 Section 23.307... STANDARDS: NORMAL, UTILITY, ACROBATIC, AND COMMUTER CATEGORY AIRPLANES Structure General § 23.307 Proof of structure. (a) Compliance with the strength and deformation requirements of § 23.305 must be shown for each...

  13. A compositional proof system for the modal μ-calculus

    DEFF Research Database (Denmark)

    Andersen, Henrik Reif; Stirling, C.; Winskel,, G.

    1994-01-01

    We present a proof system for determining satisfaction between processes in a fairly general process algebra and assertions of the modal μ-calculus. The proof system is compositional in the structure of processes. It extends earlier work on compositional reasoning within the modal μ-calculus and ...

  14. Sound-proof Sandwich Panel Design via Metamaterial Concept

    Science.gov (United States)

    Sui, Ni

    the core material maintains the mechanical property and yields a sound transmission loss that is consistently greater than 50 dB at low frequencies. Furthermore, the absorption property of the proposed honeycomb sandwich panel was experimentally studied. The honeycomb sandwich panel shows an excellent sound absorbing performance at high frequencies by using reinforced glass fiber without adding too much mass. The effect of the panel size and the stiffness of the grid-like frame effect of the honeycomb sandwich structures on sound transmission are discussed lastly. For the second sound-proof sandwich panel design, each unit cell of the sandwich panel is replaced by a Helmholtz resonator by perforating a small hole on the top face sheet. A perfect sound absorber sandwich panel with coupled Helmholtz resonators is proposed by two types: single identical Helmholtz resonator in each unit cell and dual Helmholtz resonators with different orifices, arranged in each cell arranged periodically. The soundproof sandwich panel is modelled as a panel embedded in rigid panel and assumed as a semiinfinite space with hard boundary condition. The net/mutual impedance model is first proposed and derived by solving Kirchhoff-Helmholtz integral by using the Green's function. The thermal-viscous energy dissipation at the thermal boundary layer dominates the total energy consumed. Two types of perfect sound absorber sandwich panel are designed in the last part. Two theoretical methods: the average energy and the equivalent surface impedance method are used to predict sound absorption performance. The geometry for perfect sound absorber sandwich panel at a target frequency can be obtained when the all the Helmholtz resonators are at resonance and the surface impedance of the sandwich panel matches the air impedance. The bandwidth for the identical sandwich panel mainly depends on the neck radius. The absorptive property of the dual Helmholtz resonators type of sandwich panel is studied by

  15. Two proofs of Fine's theorem

    International Nuclear Information System (INIS)

    Halliwell, J.J.

    2014-01-01

    Fine's theorem concerns the question of determining the conditions under which a certain set of probabilities for pairs of four bivalent quantities may be taken to be the marginals of an underlying probability distribution. The eight CHSH inequalities are well-known to be necessary conditions, but Fine's theorem is the striking result that they are also sufficient conditions. Here two transparent and self-contained proofs of Fine's theorem are presented. The first is a physically motivated proof using an explicit local hidden variables model. The second is an algebraic proof which uses a representation of the probabilities in terms of correlation functions. - Highlights: • A discussion of the various approaches to proving Fine's theorem. • A new physically-motivated proof using a local hidden variables model. • A new algebraic proof. • A new form of the CHSH inequalities

  16. ORION - Crew Module Side Hatch: Proof Pressure Test Anomaly Investigation

    Science.gov (United States)

    Evernden, Brent A.; Guzman, Oscar J.

    2018-01-01

    The Orion Multi-Purpose Crew Vehicle program was performing a proof pressure test on an engineering development unit (EDU) of the Orion Crew Module Side Hatch (CMSH) assembly. The purpose of the proof test was to demonstrate structural capability, with margin, at 1.5 times the maximum design pressure, before integrating the CMSH to the Orion Crew Module structural test article for subsequent pressure testing. The pressure test was performed at lower pressures of 3 psig, 10 psig and 15.75 psig with no apparent abnormal behavior or leaking. During pressurization to proof pressure of 23.32 psig, a loud 'pop' was heard at 21.3 psig. Upon review into the test cell, it was noted that the hatch had prematurely separated from the proof test fixture, thus immediately ending the test. The proof pressure test was expected be a simple verification but has since evolved into a significant joint failure investigation from both Lockheed Martin and NASA.

  17. Recovering an elastic obstacle containing embedded objects by the acoustic far-field measurements

    Science.gov (United States)

    Qu, Fenglong; Yang, Jiaqing; Zhang, Bo

    2018-01-01

    Consider the inverse scattering problem of time-harmonic acoustic waves by a 3D bounded elastic obstacle which may contain embedded impenetrable obstacles inside. We propose a novel and simple technique to show that the elastic obstacle can be uniquely recovered by the acoustic far-field pattern at a fixed frequency, disregarding its contents. Our method is based on constructing a well-posed modified interior transmission problem on a small domain and makes use of an a priori estimate for both the acoustic and elastic wave fields in the usual H 1-norm. In the case when there is no obstacle embedded inside the elastic body, our method gives a much simpler proof for the uniqueness result obtained previously in the literature (Natroshvili et al 2000 Rend. Mat. Serie VII 20 57-92 Monk and Selgas 2009 Inverse Problems Imaging 3 173-98).

  18. Linear embeddings of finite-dimensional subsets of Banach spaces into Euclidean spaces

    International Nuclear Information System (INIS)

    Robinson, James C

    2009-01-01

    This paper treats the embedding of finite-dimensional subsets of a Banach space B into finite-dimensional Euclidean spaces. When the Hausdorff dimension of X − X is finite, d H (X − X) k are injective on X. The proof motivates the definition of the 'dual thickness exponent', which is the key to proving that a prevalent set of such linear maps have Hölder continuous inverse when the box-counting dimension of X is finite and k > 2d B (X). A related argument shows that if the Assouad dimension of X − X is finite and k > d A (X − X), a prevalent set of such maps are bi-Lipschitz with logarithmic corrections. This provides a new result for compact homogeneous metric spaces via the Kuratowksi embedding of (X, d) into L ∞ (X)

  19. In Bed with the Library: A Critical Exploration of Embedded Librarianship at the City University of New York

    Science.gov (United States)

    Pollack, Julia

    2017-01-01

    This project considers the efficacy and scalability of embedded librarianship initiatives within the City University of New York (CUNY) library system and presents findings of an original research study conducted in 2015. Through an analysis of recent LIS literature on embedment, response data from a survey of librarians, and a selection of…

  20. Cross functional organisational embedded system development

    OpenAIRE

    Lennon, Sophie

    2015-01-01

    peer-reviewed Embedded system development is continuing to grow. Medical, automotive and Internet of Things are just some of the market segments. There is a tight coupling between hardware and software when developing an embedded system, often needing to meet strict performance targets, standards requirements and aggressive schedules. Embedded software developers need to consider hardware requirements in far greater detail as they can have a significant impact on the quality and value of t...

  1. Homomorphic embeddings in n-groups

    Directory of Open Access Journals (Sweden)

    Mona Cristescu

    2013-06-01

    Full Text Available We prove that an cancellative n-groupoid A can be homotopic embedded in an n-group if and only if in A are satisfied all n-ary Malcev conditions. Now we shall prove that in the presence of associative law we obtain homomorphic embeddings. Furthermore, if A has a lateral identity a such embeddings is assured by a subset of n-ary Malcev conditions - unary Malcev conditions.

  2. Integrating PROOF Analysis in Cloud and Batch Clusters

    International Nuclear Information System (INIS)

    Rodríguez-Marrero, Ana Y; Fernández-del-Castillo, Enol; López García, Álvaro; Marco de Lucas, Jesús; Matorras Weinig, Francisco; González Caballero, Isidro; Cuesta Noriega, Alberto

    2012-01-01

    High Energy Physics (HEP) analysis are becoming more complex and demanding due to the large amount of data collected by the current experiments. The Parallel ROOT Facility (PROOF) provides researchers with an interactive tool to speed up the analysis of huge volumes of data by exploiting parallel processing on both multicore machines and computing clusters. The typical PROOF deployment scenario is a permanent set of cores configured to run the PROOF daemons. However, this approach is incapable of adapting to the dynamic nature of interactive usage. Several initiatives seek to improve the use of computing resources by integrating PROOF with a batch system, such as Proof on Demand (PoD) or PROOF Cluster. These solutions are currently in production at Universidad de Oviedo and IFCA and are positively evaluated by users. Although they are able to adapt to the computing needs of users, they must comply with the specific configuration, OS and software installed at the batch nodes. Furthermore, they share the machines with other workloads, which may cause disruptions in the interactive service for users. These limitations make PROOF a typical use-case for cloud computing. In this work we take profit from Cloud Infrastructure at IFCA in order to provide a dynamic PROOF environment where users can control the software configuration of the machines. The Proof Analysis Framework (PAF) facilitates the development of new analysis and offers a transparent access to PROOF resources. Several performance measurements are presented for the different scenarios (PoD, SGE and Cloud), showing a speed improvement closely correlated with the number of cores used.

  3. Introduction to Embedded Systems Using ANSI C and the Arduino Development Environment

    CERN Document Server

    Russell, David

    2010-01-01

    Many electrical and computer engineering projects involve some kind of embedded system in which a microcontroller sits at the center as the primary source of control. The recently-developed Arduino development platform includes an inexpensive hardware development board hosting an eight-bit ATMEL ATmega-family processor and a Java-based software-development environment. These features allow an embedded systems beginner the ability to focus their attention on learning how to write embedded software instead of wasting time overcoming the engineering CAD tools learning curve. The goal of this text

  4. Knowledge Engineering for Embedded Configuration

    DEFF Research Database (Denmark)

    Oddsson, Gudmundur Valur

    2008-01-01

    into the system the knowledge needed to achieve them. In order to understand the system, one draws simplified functional streams and identifies archetypes from the product assortment, and then one maps the two together into a system breakdown model. The system model indicates how many encapsulation models (EMs......This thesis presents a way to simplify setup of complex product systems with the help of embedded configuration. To achieve this, one has to focus on what subsystems need to communicate between themselves. The required internal knowledge is then structured at three abstraction levels......, and predefined relation types are suggested. The models are stringent and thought out so they can be implemented in software. They should allow both import and export of product knowledge from the knowledge-based system. The purpose of this work is to simplify the installation process of product systems...

  5. Embedding knowledge in a workstation

    Energy Technology Data Exchange (ETDEWEB)

    Barber, G

    1982-01-01

    This paper describes an approach to supporting work in the office. Using and extending ideas from the field of artificial intelligence (AI) it describes office work as a problem solving activity. A knowledge embedding language called OMEGA is used to embed knowledge of the organization into an office worker's workstation in order to support the office worker in his or her problem solving. A particular approach to reasoning about change and contradiction is discussed. This approach uses OMEGA's viewpoint mechanism. OMEGA's viewpoint mechanism is a general contradiction handling facility. Unlike other knowledge representation systems, when a contradiction is reached the reasons for the contradiction can be analyzed by the reduction mechanism without having to resort to a backtracking mechanism. The viewpoint mechanism is the heart of the problem solving support paradigm. This paradigm is an alternative to the classical view of problem solving in AI. Office workers are supported using the problem solving support paradigm. 16 references.

  6. Embedding Complementarity in HCI Methods and Techniques

    DEFF Research Database (Denmark)

    Nielsen, Janni; Yssing, Carsten; Tweddell Levinsen, Karin

    Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded in the tec......Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded...... the HCI paradigm in system development....

  7. Embedded Fiber Optic Sensors for Integral Armor

    National Research Council Canada - National Science Library

    Fink, Bruce

    2000-01-01

    This report describes the work performed with Production Products Manufacturing & Sales (PPMS), Inc., under the "Liquid Molded Composite Armor Smart Structures Using Embedded Sensors" Small Business Innovative Research...

  8. Graphical Model Debugger Framework for Embedded Systems

    DEFF Research Database (Denmark)

    Zeng, Kebin

    2010-01-01

    Model Driven Software Development has offered a faster way to design and implement embedded real-time software by moving the design to a model level, and by transforming models to code. However, the testing of embedded systems has remained at the code level. This paper presents a Graphical Model...... Debugger Framework, providing an auxiliary avenue of analysis of system models at runtime by executing generated code and updating models synchronously, which allows embedded developers to focus on the model level. With the model debugger, embedded developers can graphically test their design model...

  9. On Kripke-style semantics for the provability logic of Gödel’s proof predicate with quantifiers on proofs

    NARCIS (Netherlands)

    Yavorskiy, R.

    Kripke-style semantics is suggested for the provability logic with quantifiers on proofs corresponding to the standard Gödel proof predicate. It is proved that the set of valid formulas is decidable. The arithmetical completeness is still an open issue.

  10. 28 CFR 79.13 - Proof of physical presence for the requisite period and proof of participation onsite during a...

    Science.gov (United States)

    2010-07-01

    ... participated onsite in the atmospheric detonation of a nuclear device. ... requisite period and proof of participation onsite during a period of atmospheric nuclear testing. 79.13... presence for the requisite period and proof of participation onsite during a period of atmospheric nuclear...

  11. Multichannel analyzer embedded in FPGA

    International Nuclear Information System (INIS)

    Garcia D, A.; Hernandez D, V. M.; Vega C, H. R.; Ordaz G, O. O.; Bravo M, I.

    2017-10-01

    Ionizing radiation has different applications, so it is a very significant and useful tool, which in turn can be dangerous for living beings if they are exposed to uncontrolled doses. However, due to its characteristics, it cannot be perceived by any of the senses of the human being, so that in order to know the presence of it, radiation detectors and additional devices are required to quantify and classify it. A multichannel analyzer is responsible for separating the different pulse heights that are generated in the detectors, in a certain number of channels; according to the number of bits of the analog to digital converter. The objective of the work was to design and implement a multichannel analyzer and its associated virtual instrument, for nuclear spectrometry. The components of the multichannel analyzer were created in VHDL hardware description language and packaged in the Xilinx Vivado design suite, making use of resources such as the ARM processing core that the System on Chip Zynq contains and the virtual instrument was developed on the LabView programming graphics platform. The first phase was to design the hardware architecture to be embedded in the FPGA and for the internal control of the multichannel analyzer the application was generated for the ARM processor in C language. For the second phase, the virtual instrument was developed for the management, control and visualization of the results. The data obtained as a result of the development of the system were observed graphically in a histogram showing the spectrum measured. The design of the multichannel analyzer embedded in FPGA was tested with two different radiation detection systems (hyper-pure germanium and scintillation) which allowed determining that the spectra obtained are similar in comparison with the commercial multichannel analyzers. (Author)

  12. Forensic devices for activism: Metadata tracking and public proof

    Directory of Open Access Journals (Sweden)

    Lonneke van der Velden

    2015-10-01

    Full Text Available The central topic of this paper is a mobile phone application, ‘InformaCam’, which turns metadata from a surveillance risk into a method for the production of public proof. InformaCam allows one to manage and delete metadata from images and videos in order to diminish surveillance risks related to online tracking. Furthermore, it structures and stores the metadata in such a way that the documentary material becomes better accommodated to evidentiary settings, if needed. In this paper I propose InformaCam should be interpreted as a ‘forensic device’. By using the conceptualization of forensics and work on socio-technical devices the paper discusses how InformaCam, through a range of interventions, rearranges metadata into a technology of evidence. InformaCam explicitly recognizes mobile phones as context aware, uses their sensors, and structures metadata in order to facilitate data analysis after images are captured. Through these modifications it invents a form of ‘sensory data forensics'. By treating data in this particular way, surveillance resistance does more than seeking awareness. It becomes engaged with investigatory practices. Considering the extent by which states conduct metadata surveillance, the project can be seen as a timely response to the unequal distribution of power over data.

  13. A Framework for Effective Software Monitoring in Project Management

    African Journals Online (AJOL)

    A Framework for Effective Software Monitoring in Project Management. ... is shown to provide meaningful interpretation of collected metric data by embedding certain quality function. Key words: Project Management, Feedback, project control, metrics, process model, quantitative validity ... AJOL African Journals Online.

  14. Proof of the Wave Nature of Plants

    Science.gov (United States)

    Wagner, Orvin

    2008-03-01

    I assume plants operate with a set of frequencies. These frequencies and the means of these frequencies are equal in all directions. We can then write (vh/λ)avh=(vv/λ)avv where the subscripts h and v represent horizontal and vertical respectively and av is average,. or vv/vh=(1/λh)av/(1/λv)av. I use an internodal spacing as λ/2 or the the distance between adjacent branches, leaves, etc. The ratios, vv/vh, are ratios of small integers for sufficient samplings. For example, for Ponderosa pine the ratio is 3/1 or for delicious apple 4/3. Note that these ratios represent the shape of the tree or other plant and their interactions with gravity. These ratios are derivable by other means such as use the ratio of # of horizontal needles per unit length from a horizontal sample to the # of needles per unit length from a vertical sample from p-pine. Or measure the vertical and horizontal velocities. My literature provides many other proofs of the wave nature of plants. I suggest that the waves in and related waves outside of plants (outside 4.9 m/s) are a dark matter related since they travel at such low velocities. See my present web site at home.budget.net/˜oedphd.

  15. Natural tuning: towards a proof of concept

    Science.gov (United States)

    Dubovsky, Sergei; Gorbenko, Victor; Mirbabayi, Mehrdad

    2013-09-01

    The cosmological constant problem and the absence of new natural physics at the electroweak scale, if confirmed by the LHC, may either indicate that the nature is fine-tuned or that a refined notion of naturalness is required. We construct a family of toy UV complete quantum theories providing a proof of concept for the second possibility. Low energy physics is described by a tuned effective field theory, which exhibits relevant interactions not protected by any symmetries and separated by an arbitrary large mass gap from the new "gravitational" physics, represented by a set of irrelevant operators. Nevertheless, the only available language to describe dynamics at all energy scales does not require any fine-tuning. The interesting novel feature of this construction is that UV physics is not described by a fixed point, but rather exhibits asymptotic fragility. Observation of additional unprotected scalars at the LHC would be a smoking gun for this scenario. Natural tuning also favors TeV scale unification.

  16. Duan's fixed point theorem: Proof and generalization

    Directory of Open Access Journals (Sweden)

    Martin Arkowitz

    2006-02-01

    Full Text Available Let X be an H-space of the homotopy type of a connected, finite CW-complex, f:X→X any map and pk:X→X the kth power map. Duan proved that pkf:X→X has a fixed point if k≥2. We give a new, short and elementary proof of this. We then use rational homotopy to generalize to spaces X whose rational cohomology is the tensor product of an exterior algebra on odd dimensional generators with the tensor product of truncated polynomial algebras on even dimensional generators. The role of the power map is played by a θ-structure μθ:X→X as defined by Hemmi-Morisugi-Ooshima. The conclusion is that μθf and fμθ each has a fixed point.

  17. Tritium proof-of-principle pellet injector

    International Nuclear Information System (INIS)

    Fisher, P.W.

    1991-07-01

    The tritium proof-of-principle (TPOP) experiment was designed and built by Oak Ridge National Laboratory (ORNL) to demonstrate the formation and acceleration of the world's first tritium pellets for fueling of future fusion reactors. The experiment was first used to produce hydrogen and deuterium pellets at ORNL. It was then moved to the Tritium Systems Test Assembly at Los Alamos National Laboratory for the production of tritium pellets. The injector used in situ condensation to produce cylindrical pellets in a 1-m-long, 4-mm-ID barrel. A cryogenic 3 He separator, which was an integral part of the gun assembly, was capable of lowering 3 He levels in the feed gas to <0.005%. The experiment was housed to a glovebox for tritium containment. Nearly 1500 pellets were produced during the course of the experiment, and about a third of these were pure tritium or mixtures of deuterium and tritium. Over 100 kCi of tritium was processed through the experiment without incident. Tritium pellet velocities of 1400 m/s were achieved with high-pressure hydrogen propellant. The design, operation, and results of this experiment are summarized. 34 refs., 44 figs., 3 tabs

  18. Wireless and embedded carbon nanotube networks for damage detection in concrete structures

    International Nuclear Information System (INIS)

    Saafi, Mohamed

    2009-01-01

    Concrete structures undergo an uncontrollable damage process manifesting in the form of cracks due to the coupling of fatigue loading and environmental effects. In order to achieve long-term durability and performance, continuous health monitoring systems are needed to make critical decisions regarding operation, maintenance and repairs. Recent advances in nanostructured materials such as carbon nanotubes have opened the door for new smart and advanced sensing materials that could effectively be used in health monitoring of structures where wireless and real time sensing could provide information on damage development. In this paper, carbon nanotube networks were embedded into a cement matrix to develop an in situ wireless and embedded sensor for damage detection in concrete structures. By wirelessly measuring the change in the electrical resistance of the carbon nanotube networks, the progress of damage can be detected and monitored. As a proof of concept, wireless cement-carbon nanotube sensors were embedded into concrete beams and subjected to monotonic and cyclic loading to evaluate the effect of damage on their response. Experimental results showed that the wireless response of the embedded nanotube sensors changes due to the formation of cracks during loading. In addition, the nanotube sensors were able to detect the initiation of damage at an early stage of loading.

  19. Wireless and embedded carbon nanotube networks for damage detection in concrete structures

    Science.gov (United States)

    Saafi, Mohamed

    2009-09-01

    Concrete structures undergo an uncontrollable damage process manifesting in the form of cracks due to the coupling of fatigue loading and environmental effects. In order to achieve long-term durability and performance, continuous health monitoring systems are needed to make critical decisions regarding operation, maintenance and repairs. Recent advances in nanostructured materials such as carbon nanotubes have opened the door for new smart and advanced sensing materials that could effectively be used in health monitoring of structures where wireless and real time sensing could provide information on damage development. In this paper, carbon nanotube networks were embedded into a cement matrix to develop an in situ wireless and embedded sensor for damage detection in concrete structures. By wirelessly measuring the change in the electrical resistance of the carbon nanotube networks, the progress of damage can be detected and monitored. As a proof of concept, wireless cement-carbon nanotube sensors were embedded into concrete beams and subjected to monotonic and cyclic loading to evaluate the effect of damage on their response. Experimental results showed that the wireless response of the embedded nanotube sensors changes due to the formation of cracks during loading. In addition, the nanotube sensors were able to detect the initiation of damage at an early stage of loading.

  20. Surveys of embedded piping for Shoreham license termination

    International Nuclear Information System (INIS)

    Williams, D.E. Jr.

    2004-01-01

    In planning the decommissioning of the Shoreham Nuclear Power Station (SNPS) in Wading River, N.Y., it was determined that the cost of removing contaminated floor drain piping was prohibitive. The piping is typically embedded approximately four feet deep in reinforced concrete, often below structural I-beams. A decision was made to develop remote survey devices ('pipe crawlers') that would allow SNPS to decontaminate and survey embedded piping within NRC free release limits. Pipe crawlers currently in use at SNPS are able to traverse multiple 45 and 90 degree bends while maintaining all detectors in the required geometry (less than 1 cm detector to surface distance). The following aspects of this project will be presented: 1) System classification and cost-benefit analysis 2) Overview of system decontamination 3) Pipe crawler mechanical and electrical development 4) Detector backgrounds and MDA's 5) Additional devices and techniques 6) NRC position on crawler use. 7) SNPS results to date. (author)

  1. Quality Management techniques embedded in Agile Project Development

    Directory of Open Access Journals (Sweden)

    Dovleac Raluca

    2017-01-01

    Full Text Available It used to be hard to make your dream come true and start a business but now, thanks to the dotcom boom and the rapid development of emerging technologies everybody has the chance to become the next Steve Jobs. Quality management tools and creativity techniques gave birth to the startup trend that transforms a brilliant idea into an innovative product. A common practice amongst startups is Agile development. In this paper, after analyzing the Agile approach and the tools used to ensure quality for every stage of a product’s development life cycle and the results of using the Agile approach looking out for advantages and short comings as well, we proposed a PDCA inspired tool which embeds both quality and creativity techniques to help developers ensure quality for each stage of a product’s life cycle as well as help them better organize their activities to reach the desired goals. We validated this approach by implementing it to the case of the Vitraly startup.

  2. An embedded CAN controller for a vehicle networking course project

    NARCIS (Netherlands)

    Breaban, G.D.; Koedam, M.L.P.J.; Voeten, J.P.M.; Goossens, K.G.W.

    2016-01-01

    The automotive industry advances quickly, with new functionalities continuously being introducted. The Eindhoven University of Technology's Bachelor Automotive Programme prepares students for the subsequent Master education, for industry, and research. In this paper we present the infrastructure and

  3. Multithreading for Embedded Reconfigurable Multicore Systems

    NARCIS (Netherlands)

    Zaykov, P.G.

    2014-01-01

    In this dissertation, we address the problem of performance efficient multithreading execution on heterogeneous multicore embedded systems. By heterogeneous multicore embedded systems we refer to those, which have real-time requirements and consist of processor tiles with General Purpose Processor

  4. Multithreading for embedded reconfigurable multicore systems

    NARCIS (Netherlands)

    Zaykov, P.G.

    2014-01-01

    In this dissertation, we address the problem of performance efficient multithreading execution on heterogeneous multicore embedded systems. By heterogeneous multicore embedded systems we refer to those, which have real-time requirements and consist of processor tiles with General Purpose Processor

  5. TTCN-3 for distributed testing embedded systems

    NARCIS (Netherlands)

    Blom, S.C.C.; Deiß, T.; Ioustinova, N.; Kontio, A.; Pol, van de J.C.; Rennoch, A.; Sidorova, N.; Virbitskaite, I.; Voronkov, A.

    2007-01-01

    Abstract. TTCN-3 is a standardized language for specifying and executing test suites that is particularly popular for testing embedded systems. Prior to testing embedded software in a target environment, the software is usually tested in the host environment. Executing in the host environment often

  6. Verification and Performance Analysis for Embedded Systems

    DEFF Research Database (Denmark)

    Larsen, Kim Guldstrand

    2009-01-01

    This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems.......This talk provides a thorough tutorial of the UPPAAL tool suite for, modeling, simulation, verification, optimal scheduling, synthesis, testing and performance analysis of embedded and real-time systems....

  7. Teaching Embedded System Concepts for Technological Literacy

    Science.gov (United States)

    Winzker, M.; Schwandt, A.

    2011-01-01

    A basic understanding of technology is recognized as important knowledge even for students not connected with engineering and computer science. This paper shows that embedded system concepts can be taught in a technological literacy course. An embedded system teaching block that has been used in an electronics module for non-engineers is…

  8. Embedded Java security security for mobile devices

    CERN Document Server

    Debbabi, Mourad; Talhi, Chamseddine

    2007-01-01

    Java brings more functionality and versatility to the world of mobile devices, but it also introduces new security threats. This book contains a presentation of embedded Java security and presents the main components of embedded Java. It gives an idea of the platform architecture and is useful for researchers and practitioners.

  9. Heterogeneous Embedded Real-Time Systems Environment

    Science.gov (United States)

    2003-12-01

    AFRL-IF-RS-TR-2003-290 Final Technical Report December 2003 HETEROGENEOUS EMBEDDED REAL - TIME SYSTEMS ENVIRONMENT Integrated...HETEROGENEOUS EMBEDDED REAL - TIME SYSTEMS ENVIRONMENT 6. AUTHOR(S) Cosmo Castellano and James Graham 5. FUNDING NUMBERS C - F30602-97-C-0259

  10. Embedded Systems Design with 8051 Microcontrollers

    DEFF Research Database (Denmark)

    Karakahayov, Zdravko; Winther, Ole; Christensen, Knud Smed

    Textbook on embedded microcontrollers. Example microcontroller family: Intel 8051 with special emphasis on Philips 80C552. Structure, design examples and programming in C and assembler. Hardware - software codesign. EProm emulator.......Textbook on embedded microcontrollers. Example microcontroller family: Intel 8051 with special emphasis on Philips 80C552. Structure, design examples and programming in C and assembler. Hardware - software codesign. EProm emulator....

  11. Autonomous intelligent cars: proof that the EPSRC Principles are future-proof

    Science.gov (United States)

    de Cock Buning, Madeleine; de Bruin, Roeland

    2017-07-01

    Principle 2 of the EPSRC's principles of robotics (AISB workshop on Principles of Robotics, 2016) proves to be future proof when applied to the current state of the art of law and technology surrounding autonomous intelligent cars (AICs). Humans, not AICS, are responsible agents. AICs should be designed; operated as far as is practicable to comply with existing laws and fundamental rights and freedoms, including privacy by design. It will show that some legal questions arising from autonomous intelligent driving technology can be answered by the technology itself.

  12. Using Patterns for Multivariate Monitoring and Feedback Control of Linear Accelerator Performance: Proof-of-Concept Research

    International Nuclear Information System (INIS)

    Cordes, Gail Adele; Van Ausdeln, Leo Anthony; Velasquez, Maria Elena

    2002-01-01

    The report discusses preliminary proof-of-concept research for using the Advanced Data Validation and Verification System (ADVVS), a new INEEL software package, to add validation and verification and multivariate feedback control to the operation of non-destructive analysis (NDA) equipment. The software is based on human cognition, the recognition of patterns and changes in patterns in time-related data. The first project applied ADVVS to monitor operations of a selectable energy linear electron accelerator, and showed how the software recognizes in real time any deviations from the optimal tune of the machine. The second project extended the software method to provide model-based multivariate feedback control for the same linear electron accelerator. The projects successfully demonstrated proof-of-concept for the applications and focused attention on the common application of intelligent information processing techniques

  13. Visual Considerations in the Presentation of Mathematical Proofs

    Directory of Open Access Journals (Sweden)

    Lara Alcock

    2010-11-01

    Full Text Available This article is about visual issues in the presentation of mathematics within teaching situations. It focuses particularly on the presentation of proofs to undergraduate students. We describe some of the decisions that a lecturer must make when presenting a written proof, from the layout of individual equations to the layout of a whole argument on the page. We consider the way in which these decisions are made explicit for lecturers who construct electronic learning resources termed e-Proofs, and conclude by discussing the constraints and affordances of this technology.

  14. Is your automated system disaster proof?

    International Nuclear Information System (INIS)

    Baird, P.W.; Priest, S.A.

    1990-01-01

    Disaster-proofing a system has four basic steps: (1) development of a disaster recovery plan; (2) creation and enforcement of procedures for developing and maintaining off-site back-ups for data, vital records, and documentation; (3) a performance test of the disaster recovery plan; and (4) the on-going maintenance of a plans currency and the periodic testing of the plant. The development of a complete disaster recovery plan has many elements: the operating environment for the system; the criteria under which an off-site recovery would be initiated; the back-up schedule and locations of all data; vital records and documentation; the steps required to recover the system; and any modifications necessitated by the off-site operating environment. Creation and enforcement of procedures for developing and maintaining current backups for all data, vital records, and documentation in a designated off-site location represent the second and most crucial step for ensuring an automated system can successfully survive a disaster. To effectively test any plan, a disaster scenario must be developed and performed by a disaster recovery team required to recover and operate the system in the off-site environment using nothing more than the disaster recovery plan and off-site information and data. Finally, the last step for ensuring that a system can survive a disaster is the maintenance of the plans currency and the continued performance of disaster recovery tests. As the environment surrounding a system changes a disaster recovery plan must be updated to reflect these changes. Equally important to the maintenance of currency is the on-going performance of disaster recovery tests on a periodic basis

  15. Skolem and pessimism about proof in mathematics.

    Science.gov (United States)

    Cohen, Paul J

    2005-10-15

    Attitudes towards formalization and proof have gone through large swings during the last 150 years. We sketch the development from Frege's first formalization, to the debates over intuitionism and other schools, through Hilbert's program and the decisive blow of the Gödel Incompleteness Theorem. A critical role is played by the Skolem-Lowenheim Theorem, which showed that no first-order axiom system can characterize a unique infinite model. Skolem himself regarded this as a body blow to the belief that mathematics can be reliably founded only on formal axiomatic systems. In a remarkably prescient paper, he even sketches the possibility of interesting new models for set theory itself, something later realized by the method of forcing. This is in contrast to Hilbert's belief that mathematics could resolve all its questions. We discuss the role of new axioms for set theory, questions in set theory itself, and their relevance for number theory. We then look in detail at what the methods of the predicate calculus, i.e. mathematical reasoning, really entail. The conclusion is that there is no reasonable basis for Hilbert's assumption. The vast majority of questions even in elementary number theory, of reasonable complexity, are beyond the reach of any such reasoning. Of course this cannot be proved and we present only plausibility arguments. The great success of mathematics comes from considering 'natural problems', those which are related to previous work and offer a good chance of being solved. The great glories of human reasoning, beginning with the Greek discovery of geometry, are in no way diminished by this pessimistic view. We end by wishing good health to present-day mathematics and the mathematics of many centuries to come.

  16. Hardware standardization for embedded systems

    International Nuclear Information System (INIS)

    Sharma, M.K.; Kalra, Mohit; Patil, M.B.; Mohanty, Ashutos; Ganesh, G.; Biswas, B.B.

    2010-01-01

    Reactor Control Division (RCnD) has been one of the main designers of safety and safety related systems for power reactors. These systems have been built using in-house developed hardware. Since the present set of hardware was designed long ago, a need was felt to design a new family of hardware boards. A Working Group on Electronics Hardware Standardization (WG-EHS) was formed with an objective to develop a family of boards, which is general purpose enough to meet the requirements of the system designers/end users. RCnD undertook the responsibility of design, fabrication and testing of boards for embedded systems. VME and a proprietary I/O bus were selected as the two system buses. The boards have been designed based on present day technology and components. The intelligence of these boards has been implemented on FPGA/CPLD using VHDL. This paper outlines the various boards that have been developed with a brief description. (author)

  17. Field tests on partial embedment effects (embedment effect tests on soil-structure interaction)

    International Nuclear Information System (INIS)

    Kurimoto, O.; Tsunoda, T.; Inoue, T.; Izumi, M.; Kusakabe, K.; Akino, K.

    1993-01-01

    A series of Model Tests of Embedment Effect on Reactor Buildings has been carried out by the Nuclear Power Engineering Corporation (NUPEC), under the sponsorship of the Ministry of International Trade and lndustry (MITI) of Japan. The nuclear reactor buildings are partially embedded due to conditions for the construction or building arrangement in Japan. It is necessary to verify the partial embedment effects by experiments and analytical studies in order to incorporate the effects in the seismic design. Forced vibration tests, therefore, were performed using a model with several types of embedment. Correlated simulation analyses were also performed and the characteristics of partial embedment effects on soil-structure interaction were evaluated. (author)

  18. RGLite, an interface between ROOT and gLite—proof on the grid

    Science.gov (United States)

    Malzacher, P.; Manafov, A.; Schwarz, K.

    2008-07-01

    Using the gLitePROOF package it is possible to perform PROOF-based distributed data analysis on the gLite Grid. The LHC experiments managed to run globally distributed Monte Carlo productions on the Grid, now the development of tools for data analysis is in the foreground. To grant access interfaces must be provided. The ROOT/PROOF framework is used as a starting point. Using abstract ROOT classes (TGrid, ...) interfaces can be implemented, via which Grid access from ROOT can be accomplished. A concrete implementation exists for the ALICE Grid environment AliEn. Within the D-Grid project an interface to the common Grid middleware of all LHC experiments, gLite, has been created. Therefore it is possible to query Grid File Catalogues from ROOT for the location of the data to be analysed. Grid jobs can be submitted into a gLite based Grid. The status of the jobs can be asked for, and their results can be obtained.

  19. RGLite, an interface between ROOT and gLite-proof on the grid

    International Nuclear Information System (INIS)

    Malzacher, P; Manafov, A; Schwarz, K

    2008-01-01

    Using the gLitePROOF package it is possible to perform PROOF-based distributed data analysis on the gLite Grid. The LHC experiments managed to run globally distributed Monte Carlo productions on the Grid, now the development of tools for data analysis is in the foreground. To grant access interfaces must be provided. The ROOT/PROOF framework is used as a starting point. Using abstract ROOT classes (TGrid, ...) interfaces can be implemented, via which Grid access from ROOT can be accomplished. A concrete implementation exists for the ALICE Grid environment AliEn. Within the D-Grid project an interface to the common Grid middleware of all LHC experiments, gLite, has been created. Therefore it is possible to query Grid File Catalogues from ROOT for the location of the data to be analysed. Grid jobs can be submitted into a gLite based Grid. The status of the jobs can be asked for, and their results can be obtained

  20. A nonperturbative proof of Dijkgraaf-Vafa conjecture

    International Nuclear Information System (INIS)

    Terashima, Seiji

    2016-01-01

    In this note we exactly compute the gaugino condensation of an arbitrary four dimensional N=1 supersymmetric gauge theory in confining phase, using the localization technique. This result gives a nonperturbative proof of the Dijkgraaf-Vafa conjecture.

  1. 27 CFR 19.277 - Measuring devices and proofing instruments.

    Science.gov (United States)

    2010-04-01

    ... proof or volume. (b) Instruments. Hydrometers and thermometers used by proprietors to gauge spirits... made in conjunction with the volumetric measurement of spirits by meter. If a meter does not have a...

  2. The quadratic reciprocity law a collection of classical proofs

    CERN Document Server

    Baumgart, Oswald

    2015-01-01

    This book is the English translation of Baumgart’s thesis on the early proofs of the quadratic reciprocity law (“Über das quadratische Reciprocitätsgesetz. Eine vergleichende Darstellung der Beweise”), first published in 1885. It is divided into two parts. The first part presents a very brief history of the development of number theory up to Legendre, as well as detailed descriptions of several early proofs of the quadratic reciprocity law. The second part highlights Baumgart’s comparisons of the principles behind these proofs. A current list of all known proofs of the quadratic reciprocity law, with complete references, is provided in the appendix. This book will appeal to all readers interested in elementary number theory and the history of number theory.

  3. A Coordinate-Based Proof of the Scallop Theorem

    OpenAIRE

    Ishimoto, Kenta; Yamada, Michio

    2012-01-01

    We reconsider fluid dynamics for a self-propulsive swimmer in Stokes flow. With an exact definition of deformation of a swimmer, a coordinate-based proof is first given to Purcell's scallop theorem including the body rotation.

  4. Construction of state-independent proofs for quantum contextuality

    Science.gov (United States)

    Tang, Weidong; Yu, Sixia

    2017-12-01

    Since the enlightening proofs of quantum contextuality first established by Kochen and Specker, and also by Bell, various simplified proofs have been constructed to exclude the noncontextual hidden variable theory of our nature at the microscopic scale. The conflict between the noncontextual hidden variable theory and quantum mechanics is commonly revealed by Kochen-Specker sets of yes-no tests, represented by projectors (or rays), via either logical contradictions or noncontextuality inequalities in a state-(in)dependent manner. Here we propose a systematic and programmable construction of a state-independent proof from a given set of nonspecific rays in C3 according to their Gram matrix. This approach brings us a greater convenience in the experimental arrangements. Besides, our proofs in C3 can also be generalized to any higher-dimensional systems by a recursive method.

  5. The Standard of Proof in Criminal Proceedings: the Threshold to ...

    African Journals Online (AJOL)

    Hanna_AZ

    The standard of proof, along with other basic notions in the law of evidence, ... testimony. Among the different theories and formulations surrounding the beyond a .... rule, the prosecution are obliged (i) to prove that the accused committed the.

  6. 27 CFR 30.32 - Determination of proof obscuration.

    Science.gov (United States)

    2010-04-01

    ... added to the temperature corrected hydrometer reading will give the true proof. (c) Distillation method... use of a precision hydrometer and thermometer in accordance with the provisions of § 13.23 to the...

  7. Circular, explosion-proof lamp provides uniform illumination

    Science.gov (United States)

    1966-01-01

    Circular explosion-proof fluorescent lamp is fitted around a TV camera lens to provide shadowless illumination with a low radiant heat flux. The lamp is mounted in a transparent acrylic housing sealed with clear silicone rubber.

  8. Litigation-proof patents: avoiding the most common patent mistakes

    National Research Council Canada - National Science Library

    Goldstein, Larry M

    2014-01-01

    "Litigation-Proof Patents: Avoiding the Most Common Patent Mistakes explains the principles of excellent patents, presents the ten most common errors in patents, and details a step-by-step method for avoiding these common errors...

  9. An Elementary Proof of the Polynomial Matrix Spectral Factorization Theorem

    OpenAIRE

    Ephremidze, Lasha

    2010-01-01

    A very simple and short proof of the polynomial matrix spectral factorization theorem (on the unit circle as well as on the real line) is presented, which relies on elementary complex analysis and linear algebra.

  10. Logic Reduced To Bare (Proof-Theoretical) Bones

    Czech Academy of Sciences Publication Activity Database

    Peregrin, Jaroslav

    2015-01-01

    Roč. 24, č. 2 (2015), s. 193-209 ISSN 0925-8531 Institutional support: RVO:67985955 Keywords : inference * incompatibility * proof theory * intuitionistic logic Subject RIV: AA - Philosophy ; Religion Impact factor: 0.450, year: 2015

  11. On the burden of proof in civil procedure

    Directory of Open Access Journals (Sweden)

    Keča Ranko

    2013-01-01

    Full Text Available The appliance of burden of proof rules is conceived of assumption that evidences are taken and that court didn't reach the required degree of conviction of a particular fact, what implies limitation of application of these rules on proceedings in which the judgment is rendered after the plenary proceedings. The Code of Civil Procedure (CCP has no suitable answers for the problems arising from new conception of the principle of party control of facts and means of proof in Serbian litigation legislature, by which the court has no more power to take the evidence ex offo. There is no answer to the question how should court conduct when evidence is not taken because of a lack of parties' indication of the means of proof. In this case courts practice somehow wider conception of burden of proof rules, which however has no explicit legal ground. They are applying them even though evidences are not taken. In any case it would be useful to reformulate basic rule of burden of proof in manner which would correspondent to the new conception of the principle of party presentation. The rule of burden of proof applies when the high degree of conviction of facts is demanded from the court, in order to render the judgment. Consequently this rule loses its' sense when mere probability of factual findings is demanded. The broader conception of parties' representation principle however does not liberate court from his responsibility to clarify facts that should be base for adjudication. Circumstance that CCP does mention the principle of material truth anymore should not be seen as argument for liberation of mentioned responsibility. It is still expected from the court to be active. Only when joint effort of the court and parties is left without of goal, in sense that court doesn't reach the high degree conviction, there would be ground for burden of proof rule's application. In this situation court also must justify why he couldn't reach required degree of

  12. Runtime verification of embedded real-time systems.

    Science.gov (United States)

    Reinbacher, Thomas; Függer, Matthias; Brauer, Jörg

    We present a runtime verification framework that allows on-line monitoring of past-time Metric Temporal Logic (ptMTL) specifications in a discrete time setting. We design observer algorithms for the time-bounded modalities of ptMTL, which take advantage of the highly parallel nature of hardware designs. The algorithms can be translated into efficient hardware blocks, which are designed for reconfigurability, thus, facilitate applications of the framework in both a prototyping and a post-deployment phase of embedded real-time systems. We provide formal correctness proofs for all presented observer algorithms and analyze their time and space complexity. For example, for the most general operator considered, the time-bounded Since operator, we obtain a time complexity that is doubly logarithmic both in the point in time the operator is executed and the operator's time bounds. This result is promising with respect to a self-contained, non-interfering monitoring approach that evaluates real-time specifications in parallel to the system-under-test. We implement our framework on a Field Programmable Gate Array platform and use extensive simulation and logic synthesis runs to assess the benefits of the approach in terms of resource usage and operating frequency.

  13. A short list color proof of Grotzsch's theorem

    DEFF Research Database (Denmark)

    Thomassen, Carsten

    2000-01-01

    We give a short proof of the result that every planar graph of girth $5$is $3$-choosable and hence also of Gr\\"{o}tzsch's theorem saying that everyplanar triangle-free graph is $3$-colorable.......We give a short proof of the result that every planar graph of girth $5$is $3$-choosable and hence also of Gr\\"{o}tzsch's theorem saying that everyplanar triangle-free graph is $3$-colorable....

  14. Structuring Interactive Correctness Proofs by Formalizing Coding Idioms

    OpenAIRE

    Gast, Holger

    2012-01-01

    This paper examines a novel strategy for developing correctness proofs in interactive software verification for C programs. Rather than proceeding backwards from the generated verification conditions, we start by developing a library of the employed data structures and related coding idioms. The application of that library then leads to correctness proofs that reflect informal arguments about the idioms. We apply this strategy to the low-level memory allocator of the L4 microkernel, a case st...

  15. Reversal burden of proof on corruption in Indonesia

    OpenAIRE

    Nugroho, Hibnu

    2018-01-01

    Corruption becomes the greatest enemy most countries face including Indonesia. Commitment to eradicate corruption significantly increases yet it would be meaningless if it is not supported by adequate legislation to implement the law effectively. Reversal burden of proof essentially aims to facilitate law enforcers to seek and disclose assets a suspect owns allegedly as corruption crime. The principle of reversal burden of proof was originated from Anglo-Saxon countries and this still applies...

  16. Collecting standardised oral health data via mobile application: A proof of concept study in the Netherlands.

    Directory of Open Access Journals (Sweden)

    Joost C L den Boer

    Full Text Available FDI World Dental Federation, founded as Fédération Dentaire Internationale, has taken the initiative to develop the Oral Health Observatory, a mobile application to conduct oral health surveys worldwide. The aim is to collect reliable standardized international data on oral health and oral health care via a network of dentists. A proof of concept study project was set up in the Netherlands to test the methodology and to validate the approach. Data about caries, gingivitis, oral self-care and oral health related quality of life were analysed and compared to datasets validated in other studies. The Android app embeds three questionnaires addressing oral health history, status and patient behaviour. One questionnaire was completed by the patient and two by the dentist. The proof of concept study involved two phases: in the first phase, five dentists, regular participants in KNMT-surveys, evaluated the usability of the app; after the first phase, the app was adjusted for a second phase. For this phase an extra 15 dentists were recruited from a group of 20 other dentists: five of them declined to participate. Attention was paid to ensuring there was a proportional representation of gender, age and region. In the second phase the five first and 15 new participants collected data on up to a maximum of 38 patients. Data from this 653 patients correspond with results from previously published surveys on the prevalence of caries and gingivitis in the Netherlands. Hence demonstrating an association between caries and gingivitis with oral self-care, problems eating and experiencing oral pain. This proof of concept study shows that the app makes it possible to collect reliable information on oral health in a short period of time. Both dentists and patients evaluated the methodology as user-friendly. Altogether, the results of this proof of concept study are promising.

  17. Collecting standardised oral health data via mobile application: A proof of concept study in the Netherlands.

    Science.gov (United States)

    den Boer, Joost C L; van Dijk, Ward; Horn, Virginie; Hescot, Patrick; Bruers, Josef J M

    2018-01-01

    FDI World Dental Federation, founded as Fédération Dentaire Internationale, has taken the initiative to develop the Oral Health Observatory, a mobile application to conduct oral health surveys worldwide. The aim is to collect reliable standardized international data on oral health and oral health care via a network of dentists. A proof of concept study project was set up in the Netherlands to test the methodology and to validate the approach. Data about caries, gingivitis, oral self-care and oral health related quality of life were analysed and compared to datasets validated in other studies. The Android app embeds three questionnaires addressing oral health history, status and patient behaviour. One questionnaire was completed by the patient and two by the dentist. The proof of concept study involved two phases: in the first phase, five dentists, regular participants in KNMT-surveys, evaluated the usability of the app; after the first phase, the app was adjusted for a second phase. For this phase an extra 15 dentists were recruited from a group of 20 other dentists: five of them declined to participate. Attention was paid to ensuring there was a proportional representation of gender, age and region. In the second phase the five first and 15 new participants collected data on up to a maximum of 38 patients. Data from this 653 patients correspond with results from previously published surveys on the prevalence of caries and gingivitis in the Netherlands. Hence demonstrating an association between caries and gingivitis with oral self-care, problems eating and experiencing oral pain. This proof of concept study shows that the app makes it possible to collect reliable information on oral health in a short period of time. Both dentists and patients evaluated the methodology as user-friendly. Altogether, the results of this proof of concept study are promising.

  18. Embedding Logics into Product Logic

    Czech Academy of Sciences Publication Activity Database

    Baaz, M.; Hájek, Petr; Krajíček, Jan; Švejda, David

    1998-01-01

    Roč. 61, č. 1 (1998), s. 35-47 ISSN 0039-3215 R&D Projects: GA AV ČR IAA1030601 Grant - others:COST(XE) Action 15 Keywords : fuzzy logic * Lukasiewicz logic * Gödel logic * product logic * computational complexity * arithmetical hierarchy Subject RIV: BA - General Mathematics

  19. Earthquake proof device for nuclear power plant building

    International Nuclear Information System (INIS)

    Okada, Yasuo.

    1991-01-01

    The structure of the present invention enables three dimensional vibration proof, i.e., in horizontal and vertical directions of a reactor container building. That is, each of the reactor container building and a reactor auxiliary building is adapted as an independent structure. The periphery of the reactor container building is surrounded by the reactor auxiliary building. The reactor auxiliary building is supported against the ground by way of a horizontal vibration proof device. The reactor container building is supported against the ground by way of a three-dimensional vibration proof device that prevents vibrations in both of the horizontal directions, and the vertical directions. The reactor container building is connected to the auxiliary building by way of a vertical vibration proof device. With such a constitution, although the reactor container building is vibration proof against both of the horizontal and the vertical vibrations, the vertical vibration proofness is an extension of inherent vertical vibration period. Accordingly, the head of the building undergoes rocking vibrations. However, since the reactor container building is connected to the reactor auxiliary building, the rocking vibrations are prevented by the reactor auxiliary building. As a result, safety upon occurrence of an earthquakes can be ensured. (I.S.)

  20. [Design of an embedded stroke rehabilitation apparatus system based on Linux computer engineering].

    Science.gov (United States)

    Zhuang, Pengfei; Tian, XueLong; Zhu, Lin

    2014-04-01

    A realizaton project of electrical stimulator aimed at motor dysfunction of stroke is proposed in this paper. Based on neurophysiological biofeedback, this system, using an ARM9 S3C2440 as the core processor, integrates collection and display of surface electromyography (sEMG) signal, as well as neuromuscular electrical stimulation (NMES) into one system. By embedding Linux system, the project is able to use Qt/Embedded as a graphical interface design tool to accomplish the design of stroke rehabilitation apparatus. Experiments showed that this system worked well.

  1. Imparting functionality to biocatalysts via embedding enzymes into nanoporous materials by a de novo approach: size-selective sheltering of catalase in metal-organic framework microcrystals.

    Science.gov (United States)

    Shieh, Fa-Kuen; Wang, Shao-Chun; Yen, Chia-I; Wu, Chang-Cheng; Dutta, Saikat; Chou, Lien-Yang; Morabito, Joseph V; Hu, Pan; Hsu, Ming-Hua; Wu, Kevin C-W; Tsung, Chia-Kuang

    2015-04-08

    We develop a new concept to impart new functions to biocatalysts by combining enzymes and metal-organic frameworks (MOFs). The proof-of-concept design is demonstrated by embedding catalase molecules into uniformly sized ZIF-90 crystals via a de novo approach. We have carried out electron microscopy, X-ray diffraction, nitrogen sorption, electrophoresis, thermogravimetric analysis, and confocal microscopy to confirm that the ~10 nm catalase molecules are embedded in 2 μm single-crystalline ZIF-90 crystals with ~5 wt % loading. Because catalase is immobilized and sheltered by the ZIF-90 crystals, the composites show activity in hydrogen peroxide degradation even in the presence of protease proteinase K.

  2. New climate-proof cropping systems in dry areas of the Mediterranean region

    DEFF Research Database (Denmark)

    Jacobsen, Sven-Erik

    2014-01-01

    severe consequences of climate changes, under influence of multiple abiotic stresses. These stresses are becoming even more pronounced under changing climate, resulting in drier conditions, increasing temperatures and greater variability, causing desertification. This topic has been addressed in the EU...... FP7 project entitled 'Sustainable water use securing food production in dry areas of the Mediterranean region (SWUP-MED)' working on climate-proof cropping systems in Morocco, Syria, Turkey and southern Europe, collaborating with UK, Denmark and Australia. The results are valid for other parts...

  3. A novel tri-axis MEMS gyroscope with in-plane tetra-pendulum proof masses and enhanced sensitive springs

    International Nuclear Information System (INIS)

    Wang, M C; Jiao, J W; Yan, P L; Mi, B W; Qin, S

    2014-01-01

    This paper presents a tri-axis MEMS gyroscope design with novel tetra-pendulum proof masses for X-, Y-axis and regular proof masses for Z-axis rate sensing, which are all coupled with and embedded in a conventional tuning fork driving frame. The four pendulum proof masses are suspended via the torsional springs to a common center anchor and can be driven to swing around the anchor via the tilted transforming springs as the driving frame is oscillated in an anti-phase mode. As an X-, Y-axis angular rate is applied, the tetra-pendulum proof masses will rotate around the torsional springs in pairs for X- and Y-axis differential sensing, respectively. In particular, we investigated the relationship between the tilting angle of the transforming spring and its transforming efficiency, i.e. the amplitude ratio of the pendulum's swing to the driving oscillation, which shows a straight impact on the sensitivity. By theoretical analysis and Ansys simulation, we achieved an optimal tilting angle of 22.5°, which extends along the angular bisector of the pendulum's and driving mass’ moving direction and demonstrates a significant increase in transforming efficiency by about 40%, compared with the trivial tilting angle of 45°. By employing an SOI-based bulk micromachining process, the prototype device with the optimal design of the transforming spring (type I) and that with the trivial design (type II) for reference have been successfully fabricated. As expected, the testing results indicate an increase of more than 20% in the X- and Y- sensitivities, which is mainly from the enhanced sensitive transforming springs. (paper)

  4. Model-based design of adaptive embedded systems

    CERN Document Server

    Hamberg, Roelof; Reckers, Frans; Verriet, Jacques

    2013-01-01

    Today’s embedded systems have to operate in a wide variety of dynamically changing environmental circumstances. Adaptivity, the ability of a system to autonomously adapt itself, is a means to optimise a system’s behaviour to accommodate changes in its environment. It involves making in-product trade-offs between system qualities at system level. The main challenge in the development of adaptive systems is keeping control of the intrinsic complexity of such systems while working with multi-disciplinary teams to create different parts of the system. Model-Based Development of Adaptive Embedded Systems focuses on the development of adaptive embedded systems both from an architectural and methodological point of view. It describes architectural solution patterns for adaptive systems and state-of-the-art model-based methods and techniques to support adaptive system development. In particular, the book describes the outcome of the Octopus project, a cooperation of a multi-disciplinary team of academic and indus...

  5. Secure smart embedded devices, platforms and applications

    CERN Document Server

    Markantonakis, Konstantinos

    2013-01-01

    New generations of IT users are increasingly abstracted from the underlying devices and platforms that provide and safeguard their services. As a result they may have little awareness that they are critically dependent on the embedded security devices that are becoming pervasive in daily modern life. Secure Smart Embedded Devices, Platforms and Applications provides a broad overview of the many security and practical issues of embedded devices, tokens, and their operation systems, platforms and main applications. It also addresses a diverse range of industry/government initiatives and consider

  6. Two diverse models of embedding class one

    Science.gov (United States)

    Kuhfittig, Peter K. F.

    2018-05-01

    Embedding theorems have continued to be a topic of interest in the general theory of relativity since these help connect the classical theory to higher-dimensional manifolds. This paper deals with spacetimes of embedding class one, i.e., spacetimes that can be embedded in a five-dimensional flat spacetime. These ideas are applied to two diverse models, a complete solution for a charged wormhole admitting a one-parameter group of conformal motions and a new model to explain the flat rotation curves in spiral galaxies without the need for dark matter.

  7. The art of designing embedded systems

    CERN Document Server

    Ganssle, Jack G

    2000-01-01

    Art of Designing Embedded Systems is apart primer and part reference, aimed at practicing embedded engineers, whether working on the code or the hardware design. Embedded systems suffer from a chaotic, ad hoc development process. This books lays out a very simple seven-step plan to get firmware development under control. There are no formal methodologies to master; the ideas are immediately useful. Most designers are unaware that code complexity grows faster than code size. This book shows a number of ways to linearize the complexity/size curve and get products out faster

  8. Embedded Solenoid Transformer for Power Conversion

    DEFF Research Database (Denmark)

    2015-01-01

    A resonant power converter for operation in the radio frequency range, preferably in the VHF, comprises at least one PCB-embedded transformer. The transformer is configured for radio frequency operation and comprises a printed circuit board defining a horizontal plane, the printed circuit board...... comprising at least two horizontal conductive layers separated by an isolating layer, a first embedded solenoid forming a primary winding of the transformer and a second embedded solenoid being arranged parallel to the first solenoid and forming a secondary winding of the transformer, wherein the first...

  9. AdS2 models in an embedding superspace

    International Nuclear Information System (INIS)

    McKeon, D.G.C.; Sherry, T.N.

    2003-01-01

    An embedding superspace, whose bosonic part is the flat (2+1)-dimensional embedding space for AdS 2 , is introduced. Superfields and several supersymmetric models are examined in the embedded AdS 2 superspace

  10. [Burden of proof in medical cases--presumption of fact and prima facie evidence. 1. Burden of proof].

    Science.gov (United States)

    Sliwka, Marcin

    2004-01-01

    The aim of this paper was to present the main rules concerning the burden of proof in polish civil trials, including medical cases. This paper also describes the subject of evidence were presented and explained. The court influence on evidence procedure was also analysed. The effect of the institution of informed consent on burden of proof in polish civil law is also described. This paper includes numerous High Court sentences on evidential and medical issues.

  11. Embedded system file transfer USB

    International Nuclear Information System (INIS)

    Jaoua, Mehdi

    2008-01-01

    The development of the communication series A emphasized new aspects of data exchange. The transfer of data, subject of my project of end of studies, consists in transferring from the files of a support of mass towards another via port USB. In first phase, I had like stain the realization of an embarked system allowing the communication between a key USB and final of communication such as a Pc. For this fact, I had to include/understand the operation of protocol USB and thus I could programmed a Peak to manage this communication. The second phase, will consist in extending this project towards a transmission de< donnees between two keys USB without intervention of a powerful machine equipped with an operating system pour rant to manage this transaction. (Author)

  12. Embedded Face Detection and Recognition

    Directory of Open Access Journals (Sweden)

    Göksel Günlü

    2012-10-01

    Full Text Available The need to increase security in open or public spaces has in turn given rise to the requirement to monitor these spaces and analyse those images on-site and on-time. At this point, the use of smart cameras – of which the popularity has been increasing – is one step ahead. With sensors and Digital Signal Processors (DSPs, smart cameras generate ad hoc results by analysing the numeric images transmitted from the sensor by means of a variety of image-processing algorithms. Since the images are not transmitted to a distance processing unit but rather are processed inside the camera, it does not necessitate high-bandwidth networks or high processor powered systems; it can instantaneously decide on the required access. Nonetheless, on account of restricted memory, processing power and overall power, image processing algorithms need to be developed and optimized for embedded processors. Among these algorithms, one of the most important is for face detection and recognition. A number of face detection and recognition methods have been proposed recently and many of these methods have been tested on general-purpose processors. In smart cameras – which are real-life applications of such methods – the widest use is on DSPs. In the present study, the Viola-Jones face detection method – which was reported to run faster on PCs – was optimized for DSPs; the face recognition method was combined with the developed sub-region and mask-based DCT (Discrete Cosine Transform. As the employed DSP is a fixed-point processor, the processes were performed with integers insofar as it was possible. To enable face recognition, the image was divided into sub-regions and from each sub-region the robust coefficients against disruptive elements – like face expression, illumination, etc. – were selected as the features. The discrimination of the selected features was enhanced via LDA (Linear Discriminant Analysis and then employed for recognition. Thanks to its

  13. Multidimensional artificial field embedding with spatial sensitivity

    CSIR Research Space (South Africa)

    Lunga, D

    2013-06-01

    Full Text Available Multidimensional embedding is a technique useful for characterizing spectral signature relations in hyperspectral images. However, such images consist of disjoint similar spectral classes that are spatially sensitive, thus presenting challenges...

  14. Time-Scale Invariant Audio Data Embedding

    Directory of Open Access Journals (Sweden)

    Mansour Mohamed F

    2003-01-01

    Full Text Available We propose a novel algorithm for high-quality data embedding in audio. The algorithm is based on changing the relative length of the middle segment between two successive maximum and minimum peaks to embed data. Spline interpolation is used to change the lengths. To ensure smooth monotonic behavior between peaks, a hybrid orthogonal and nonorthogonal wavelet decomposition is used prior to data embedding. The possible data embedding rates are between 20 and 30 bps. However, for practical purposes, we use repetition codes, and the effective embedding data rate is around 5 bps. The algorithm is invariant after time-scale modification, time shift, and time cropping. It gives high-quality output and is robust to mp3 compression.

  15. Embedding Moodle into Ubiquitous Computing Environments

    NARCIS (Netherlands)

    Glahn, Christian; Specht, Marcus

    2010-01-01

    Glahn, C., & Specht, M. (2010). Embedding Moodle into Ubiquitous Computing Environments. In M. Montebello, et al. (Eds.), 9th World Conference on Mobile and Contextual Learning (MLearn2010) (pp. 100-107). October, 19-22, 2010, Valletta, Malta.

  16. Apparatuses And Systems For Embedded Thermoelectric Generators

    KAUST Repository

    Hussain, Muhammad M.

    2013-08-08

    An apparatus and a system for embedded thermoelectric generators are disclosed. In one embodiment, the apparatus is embedded in an interface where the ambient temperatures on two sides of the interface are different. In one embodiment, the apparatus is fabricated with the interface in integrity as a unitary piece. In one embodiment, the apparatus includes a first thermoelectric material embedded through the interface. The apparatus further includes a second thermoelectric material embedded through the interface. The first thermoelectric material is electrically coupled to the second thermoelectric material. In one embodiment, the apparatus further includes an output structure coupled to the first thermoelectric material and the second thermoelectric material and configured to output a voltage.

  17. Apparatuses And Systems For Embedded Thermoelectric Generators

    KAUST Repository

    Hussain, Muhammad M.; Inayat, Salman Bin; Smith, Casey Eben

    2013-01-01

    An apparatus and a system for embedded thermoelectric generators are disclosed. In one embodiment, the apparatus is embedded in an interface where the ambient temperatures on two sides of the interface are different. In one embodiment, the apparatus is fabricated with the interface in integrity as a unitary piece. In one embodiment, the apparatus includes a first thermoelectric material embedded through the interface. The apparatus further includes a second thermoelectric material embedded through the interface. The first thermoelectric material is electrically coupled to the second thermoelectric material. In one embodiment, the apparatus further includes an output structure coupled to the first thermoelectric material and the second thermoelectric material and configured to output a voltage.

  18. Embedded High Performance Scalable Computing Systems

    National Research Council Canada - National Science Library

    Ngo, David

    2003-01-01

    The Embedded High Performance Scalable Computing Systems (EHPSCS) program is a cooperative agreement between Sanders, A Lockheed Martin Company and DARPA that ran for three years, from Apr 1995 - Apr 1998...

  19. Affecting the Flow of a Proof by Creating Presence--A Case Study in Number Theory

    Science.gov (United States)

    Gabel, Mika; Dreyfus, Tommy

    2017-01-01

    The notion of flow of a proof encapsulates mathematical, didactical, and contextual aspects of proof presentation. A proof may have different flows, depending on the lecturer's choices regarding its presentation. Adopting Perelman's New Rhetoric (PNR) as a theoretical framework, we designed methods to assess aspects of the flow of a proof. We…

  20. On Mathematicians' Proof Skimming: A Reply to Inglis and Alcock

    Science.gov (United States)

    Weber, Keith; Mejia-Ramos, Juan Pablo

    2013-01-01

    n a recent article, Inglis and Alcock (2012) contended that their data challenge the claim that when mathematicians validate proofs, they initially skim a proof to grasp its main idea before reading individual parts of the proof more carefully. This result is based on the fact that when mathematicians read proofs in their study, on average their…

  1. Applying a Real-Time PCR Assay for Histoplasma capsulatum to Clinically Relevant Formalin-Fixed Paraffin-Embedded Human Tissue

    Science.gov (United States)

    Koepsell, Scott A.; Hinrichs, Steven H.

    2012-01-01

    A real-time PCR assay to detect Histoplasma capsulatum in formalin-fixed, paraffin-embedded (FFPE) tissue is described. The assay had an analytical sensitivity of 6 pg/μl of fungal DNA, analytical specificity of 100%, and clinical sensitivity of 88.9%. This proof-of-concept study may aid in the diagnosis of histoplasmosis from FFPE tissue. PMID:22855519

  2. Embedded Lattice and Properties of Gram Matrix

    Directory of Open Access Journals (Sweden)

    Futa Yuichi

    2017-03-01

    Full Text Available In this article, we formalize in Mizar [14] the definition of embedding of lattice and its properties. We formally define an inner product on an embedded module. We also formalize properties of Gram matrix. We formally prove that an inverse of Gram matrix for a rational lattice exists. Lattice of Z-module is necessary for lattice problems, LLL (Lenstra, Lenstra and Lov´asz base reduction algorithm [16] and cryptographic systems with lattice [17].

  3. Embedded adhesive connection for laminated glass plates

    DEFF Research Database (Denmark)

    Hansen, Jens Zangenberg; Poulsen, S.H.; Bagger, A.

    2012-01-01

    The structural behavior of a new connection design, the embedded adhesive connection, used for laminated glass plates is investigated. The connection consists of an aluminum plate encapsulated in-between two adjacent triple layered laminated glass plates. Fastening between glass and aluminum...... usage in a design situation. The embedded connection shows promising potential as a future fastening system for load-carrying laminated glass plates....

  4. Operating system concepts for embedded multicores

    OpenAIRE

    Horst, Oliver; Schmidt, Adriaan

    2014-01-01

    Currently we can see an increasing adoption of multi-core platforms in the area of embedded systems. While these new hardware platforms offer the potential to satisfy the ever increasing demand for computational power, they pose considerable challenges with regard to software development. This affects the application software itself, but also the system design and architecture. Here, we address the consequences for operating system architecture in embedded systems. After dis-cussing current a...

  5. Co-constructive Logics for Proofs and Refutations

    Directory of Open Access Journals (Sweden)

    Trafford James

    2015-01-01

    Full Text Available This paper considers logics which are formally dual to intuitionistic logic in order to investigate a co-constructive logic for proofs and refutations. This is philosophically motivated by a set of problems regarding the nature of constructive truth, and its relation to falsity. It is well known both that intuitionism can not deal constructively with negative information, and that defining falsity by means of intuitionistic negation leads, under widely-held assumptions, to a justification of bivalence. For example, we do not want to equate falsity with the non-existence of a proof since this would render a statement such as “pi is transcendental” false prior to 1882. In addition, the intuitionist account of negation as shorthand for the derivation of absurdity is inadequate, particularly outside of purely mathematical contexts. To deal with these issues, I investigate the dual of intuitionistic logic, co-intuitionistic logic, as a logic of refutation, alongside intuitionistic logic of proofs. Direct proof and refutation are dual to each other, and are constructive, whilst there also exist syntactic, weak, negations within both logics. In this respect, the logic of refutation is weakly paraconsistent in the sense that it allows for statements for which, neither they, nor their negation, are refuted. I provide a proof theory for the co-constructive logic, a formal dualizing map between the logics, and a Kripke-style semantics. This is given an intuitive philosophical rendering in a re-interpretation of Kolmogorov's logic of problems.

  6. Reversal burden of proof on corruption in Indonesia

    Directory of Open Access Journals (Sweden)

    Hibnu Nugroho

    2018-03-01

    Full Text Available Corruption becomes the greatest enemy most countries face including Indonesia. Commitment to eradicate corruption significantly increases yet it would be meaningless if it is not supported by adequate legislation to implement the law effectively. Reversal burden of proof essentially aims to facilitate law enforcers to seek and disclose assets a suspect owns allegedly as corruption crime. The principle of reversal burden of proof was originated from Anglo-Saxon countries and this still applies to certain cases such as bribery-related gratifications as Malaysia and Singapore implement. In Indonesia, provisions on the principle of reversal burden of proof have been long recognized even since 1960 on the first law on corruption crimes. Nevertheless, for more than a half of century, the provision on reversal burden of proof has never been implemented. It occurs since articles which govern the issues barely provide clear regulation. It only mentions the principle yet never issues an implemented regulation to support the principle. In regards to this, the research is aimed at investigating, seeking and analyzing the weaknesses in implementing the principle of reversal burden of proof in corruption crimes recently as well as discussing obstacles in law enforcement.

  7. Coiled Brine Recovery Assembly (CoBRA) Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The Coiled Brine Recovery Assembly (CoBRA) project will result in a proof-of-concept demonstration for a lightweight, compact, affordable, regenerable and disposable...

  8. 28 CFR 79.35 - Proof of onset of leukemia at least two years after first exposure, and proof of onset of a...

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Proof of onset of leukemia at least two... Participants § 79.35 Proof of onset of leukemia at least two years after first exposure, and proof of onset of... be the date of first or initial exposure. The date of onset will be the date of diagnosis as...

  9. Low cost infrastructure solutions for small embedded wind generators

    Energy Technology Data Exchange (ETDEWEB)

    Robb, C.

    2003-07-01

    This report gives details of a project to demonstrate novel economic solutions to increase the potential for installing small-scale embedded wind generator systems at many UK sites which have so far been dismissed as too difficult. Details are given of the first phase of the study which examined current solutions to infrastructure problems and potential techniques. The use of drilled rock anchor foundations to minimise the need for delivery of ready-mix concrete to wind turbine sites, and the use of a winch and A-frame system for erecting a wind turbine to avoid the use of cranes are discussed. The demonstration of the installation of a 50kW wind turbine on the Isle of Luing in Scotland where there is no access for cranes or larger vehicles in the second phase of the project is described. The potential for the use of these techniques on larger wind turbines is considered.

  10. NASA Finds Direct Proof of Dark Matter

    Science.gov (United States)

    2006-08-01

    Dark matter and normal matter have been wrenched apart by the tremendous collision of two large clusters of galaxies. The discovery, using NASA's Chandra X-ray Observatory and other telescopes, gives direct evidence for the existence of dark matter. "This is the most energetic cosmic event, besides the Big Bang, which we know about," said team member Maxim Markevitch of the Harvard-Smithsonian Center for Astrophysics in Cambridge, Mass. Lensing Illustration Gravitational Lensing Explanation These observations provide the strongest evidence yet that most of the matter in the universe is dark. Despite considerable evidence for dark matter, some scientists have proposed alternative theories for gravity where it is stronger on intergalactic scales than predicted by Newton and Einstein, removing the need for dark matter. However, such theories cannot explain the observed effects of this collision. "A universe that's dominated by dark stuff seems preposterous, so we wanted to test whether there were any basic flaws in our thinking," said Doug Clowe of the University of Arizona at Tucson, and leader of the study. "These results are direct proof that dark matter exists." Animation of Cluster Collision Animation of Cluster Collision In galaxy clusters, the normal matter, like the atoms that make up the stars, planets, and everything on Earth, is primarily in the form of hot gas and stars. The mass of the hot gas between the galaxies is far greater than the mass of the stars in all of the galaxies. This normal matter is bound in the cluster by the gravity of an even greater mass of dark matter. Without dark matter, which is invisible and can only be detected through its gravity, the fast-moving galaxies and the hot gas would quickly fly apart. The team was granted more than 100 hours on the Chandra telescope to observe the galaxy cluster 1E0657-56. The cluster is also known as the bullet cluster, because it contains a spectacular bullet-shaped cloud of hundred

  11. Computer-aided proofs for multiparty computation with active security

    DEFF Research Database (Denmark)

    Haagh, Helene; Karbyshev, Aleksandr; Oechsner, Sabine

    2018-01-01

    Secure multi-party computation (MPC) is a general cryptographic technique that allows distrusting parties to compute a function of their individual inputs, while only revealing the output of the function. It has found applications in areas such as auctioning, email filtering, and secure...... teleconference. Given its importance, it is crucial that the protocols are specified and implemented correctly. In the programming language community it has become good practice to use computer proof assistants to verify correctness proofs. In the field of cryptography, EasyCrypt is the state of the art proof...... public-key encryption, signatures, garbled circuits and differential privacy. Here we show for the first time that it can also be used to prove security of MPC against a malicious adversary. We formalize additive and replicated secret sharing schemes and apply them to Maurer's MPC protocol for secure...

  12. The Development of Proofs in Analytical Mathematics for Undergraduate Students

    Science.gov (United States)

    Ali, Maselan; Sufahani, Suliadi; Hasim, Nurnazifa; Saifullah Rusiman, Mohd; Roslan, Rozaini; Mohamad, Mahathir; Khalid, Kamil

    2018-04-01

    Proofs in analytical mathematics are essential parts of mathematics, difficult to learn because its underlying concepts are not visible. This research consists of problems involving logic and proofs. In this study, a short overview was provided on how proofs in analytical mathematics were used by university students. From the results obtained, excellent students obtained better scores compared to average and poor students. The research instruments used in this study consisted of two parts: test and interview. In this way, analysis of students’ actual performances can be obtained. The result of this study showed that the less able students have fragile conceptual and cognitive linkages but the more able students use their strong conceptual linkages to produce effective solutions

  13. Factors and factorizations of graphs proof techniques in factor theory

    CERN Document Server

    Akiyama, Jin

    2011-01-01

    This book chronicles the development of graph factors and factorizations. It pursues a comprehensive approach, addressing most of the important results from hundreds of findings over the last century. One of the main themes is the observation that many theorems can be proved using only a few standard proof techniques. This stands in marked contrast to the seemingly countless, complex proof techniques offered by the extant body of papers and books. In addition to covering the history and development of this area, the book offers conjectures and discusses open problems. It also includes numerous explanatory figures that enable readers to progressively and intuitively understand the most important notions and proofs in the area of factors and factorization.

  14. On mathematicians' different standards when evaluating elementary proofs.

    Science.gov (United States)

    Inglis, Matthew; Mejia-Ramos, Juan Pablo; Weber, Keith; Alcock, Lara

    2013-04-01

    In this article, we report a study in which 109 research-active mathematicians were asked to judge the validity of a purported proof in undergraduate calculus. Significant results from our study were as follows: (a) there was substantial disagreement among mathematicians regarding whether the argument was a valid proof, (b) applied mathematicians were more likely than pure mathematicians to judge the argument valid, (c) participants who judged the argument invalid were more confident in their judgments than those who judged it valid, and (d) participants who judged the argument valid usually did not change their judgment when presented with a reason raised by other mathematicians for why the proof should be judged invalid. These findings suggest that, contrary to some claims in the literature, there is not a single standard of validity among contemporary mathematicians. Copyright © 2013 Cognitive Science Society, Inc.

  15. Proofs of the Cantor-Bernstein theorem a mathematical excursion

    CERN Document Server

    Hinkis, Arie

    2013-01-01

    This book offers an excursion through the developmental area of research mathematics. It presents some 40 papers, published between the 1870s and the 1970s, on proofs of the Cantor-Bernstein theorem and the related Bernstein division theorem. While the emphasis is placed on providing accurate proofs, similar to the originals, the discussion is broadened to include aspects that pertain to the methodology of the development of mathematics and to the philosophy of mathematics. Works of prominent mathematicians and logicians are reviewed, including Cantor, Dedekind, Schröder, Bernstein, Borel, Zermelo, Poincaré, Russell, Peano, the Königs, Hausdorff, Sierpinski, Tarski, Banach, Brouwer and several others mainly of the Polish and the Dutch schools. In its attempt to present a diachronic narrative of one mathematical topic, the book resembles Lakatos’ celebrated book Proofs and Refutations. Indeed, some of the observations made by Lakatos are corroborated herein. The analogy between the two books is clearly an...

  16. Towards Verification of Constituent Systems through Automated Proof

    DEFF Research Database (Denmark)

    Couto, Luis Diogo Monteiro Duarte; Foster, Simon; Payne, R

    2014-01-01

    This paper explores verification of constituent systems within the context of the Symphony tool platform for Systems of Systems (SoS). Our SoS modelling language, CML, supports various contractual specification elements, such as state invariants and operation preconditions, which can be used...... to specify contractual obligations on the constituent systems of a SoS. To support verification of these obligations we have developed a proof obligation generator and theorem prover plugin for Symphony. The latter uses the Isabelle/HOL theorem prover to automatically discharge the proof obligations arising...... from a CML model. Our hope is that the resulting proofs can then be used to formally verify the conformance of each constituent system, which is turn would result in a dependable SoS....

  17. "You're just one of the group when you're embedded": report from a mixed-method investigation of the research-embedded health librarian experience.

    Science.gov (United States)

    Greyson, Devon; Surette, Soleil; Dennett, Liz; Chatterley, Trish

    2013-10-01

    Embedded librarianship has received much attention in recent years. A model of embeddedness rarely discussed to date is that of research-embedded health librarians (REHLs). This study explores the characteristics of Canadian REHLs and the situations in which they are employed. The authors employed a sequential, mixed-method design. An online survey provided descriptive statistics about REHLs' positions and work experiences. This informed a series of focus group interviews that expanded upon the survey. Through constant comparison, we conducted qualitative descriptive analysis of the interviews. Based on twenty-nine survey responses and four group interviews, we created a portrait of a "typical" REHL and discovered themes relevant to REHL work. REHLs may identify more strongly as researchers than as librarians, with corresponding professional needs and rewards. REHLs value "belonging" to the research team, involvement in full project lifecycles, and in-depth relationships with nonlibrarian colleagues. Despite widely expressed job satisfaction, many REHLs struggle with isolation from library and information science peers and relative lack of job security. REHLs differ from non-embedded health librarians, as well as from other types of embedded librarians. REHLs' work also differs from just a decade or two ago, prior to widespread Internet access to digital resources. Given that research-embedded librarianship appears to be a distinct and growing subset of health librarianship, libraries, master's of library and information science programs, and professional associations will need to respond to the support and education needs of REHLs or risk losing them to the health research field.

  18. Embedding of ESD in Engineering Education: Experiences from Chalmers University of Technology

    Science.gov (United States)

    Svanstrom, Magdalena; Palme, Ulrika; Wedel, Maria Knutson; Carlson, Ola; Nystrom, Thomas; Eden, Michael

    2012-01-01

    Purpose: The purpose of this paper is to report on methods developed, within a three-year Education for Sustainable Development (ESD) project at Chalmers University of Technology in Gothenburg, Sweden, to achieve a higher degree of embedding of ESD in engineering programmes. The major emphasis is on methods used, results achieved and lessons…

  19. The Bright Side and Dark Side of Embedded Ties In Business-to-Business Innovation

    NARCIS (Netherlands)

    C.S. Noordhoff (Corine); K. Kyriakopoulos (Kyriakos); C. Moorman (Christina); P. Pauwels (Pieter); B.G.C. Dellaert (Benedict)

    2011-01-01

    textabstractWhile the number and importance of joint innovation projects between suppliers and their customers continue to rise, the literature has yet to resolve a key question—do embedded ties with customers help or hurt supplier innovation? Drawing on both the tie strength and knowledge

  20. The bright side and dark side of embedded ties in business-to-business innovation

    NARCIS (Netherlands)

    C.S. Noordhoff (Corine); K. Kyriakopoulos (Kyriakos); C. Moorman (Christina); P. Pauwels (Pieter); B.G.C. Dellaert (Benedict)

    2011-01-01

    textabstractAlthough the number and importance of joint innovation projects between suppliers and their customers continue to rise, the literature has yet to resolve a key question: Do embedded ties with customers help or hurt supplier innovation? Drawing on both the tie strength and knowledge