WorldWideScience

Sample records for projective embedding proof

  1. A direct proof of Sobolev embeddings for Triebel-Lizorkin spaces, including mixed norms and quasi-homogeneity

    DEFF Research Database (Denmark)

    Johnsen, Jon

    The article deals with a simplified proof of the Sobolev embedding theorem for Triebel-Lizorkin spaces (that contain the $L_p$-Sobolev spaces $H^s_p$ as special cases). The method extends to a proof of the corresponding fact for general Triebel–Lizorkin spaces based on mixed $L_p$-norms...

  2. Embedded Linux projects using Yocto project cookbook

    CERN Document Server

    González, Alex

    2015-01-01

    If you are an embedded developer learning about embedded Linux with some experience with the Yocto project, this book is the ideal way to become proficient and broaden your knowledge with examples that are immediately applicable to your embedded developments. Experienced embedded Yocto developers will find new insight into working methodologies and ARM specific development competence.

  3. Proof-of-concept experimental study of damage detection of concrete piles using embedded piezoceramic transducers

    International Nuclear Information System (INIS)

    Wang, R L; Gu, H; Song, G; Mo, Y L

    2013-01-01

    This paper presents a proof-of-concept experimental study of an innovative active-sensing approach for damage detection of concrete piles by using embedded piezoceramic transducers. In the proposed active-sensing approach, one piezoceramic transducer is used as an actuator to generate a stress wave to propagate through the concrete pile and the other distributed piezoceramic transducers are used as sensors to detect the wave response. Cracks or damage inside the concrete structure act as stress relief in the wave propagation path. The amplitude of the wave and the transmission energy will decrease due to the existence of cracks or damage. Experiments were performed on two bored piles instrumented with embedded piezoceramic transducers. The experimental results demonstrate the effectiveness of the proposed approach for pile damage detection. (fast track communication)

  4. Projective embeddings of homogeneous spaces with small boundary

    International Nuclear Information System (INIS)

    Arzhantsev, Ivan V

    2009-01-01

    We study open equivariant projective embeddings of homogeneous spaces such that the complement of the open orbit has codimension at least 2. We establish a criterion for the existence of such an embedding, prove that the set of isomorphism classes of such embeddings is finite, and give a construction of the embeddings in terms of Geometric Invariant Theory. A generalization of Cox's construction and the theory of bunched rings enable us to describe in combinatorial terms the basic geometric properties of embeddings with small boundary

  5. Evaluation of Embedded System Component Utilized in Delivery Integrated Design Project Course

    Science.gov (United States)

    Junid, Syed Abdul Mutalib Al; Hussaini, Yusnira; Nazmie Osman, Fairul; Razak, Abdul Hadi Abdul; Idros, Mohd Faizul Md; Karimi Halim, Abdul

    2018-03-01

    This paper reports the evaluation of the embedded system component utilized in delivering the integrated electronic engineering design project course. The evaluation is conducted based on the report project submitted as to fulfil the assessment criteria for the integrated electronic engineering design project course named; engineering system design. Six projects were assessed in this evaluation. The evaluation covers the type of controller, programming language and the number of embedded component utilization as well. From the evaluation, the C-programming based language is the best solution preferred by the students which provide them flexibility in the programming. Moreover, the Analog to Digital converter is intensively used in the projects which include sensors in their proposed design. As a conclusion, in delivering the integrated design project course, the knowledge over the embedded system solution is very important since the high density of the knowledge acquired in accomplishing the project assigned.

  6. Isometric embeddings of 2-spheres by embedding flow for applications in numerical relativity

    International Nuclear Information System (INIS)

    Jasiulek, Michael; Korzyński, Mikołaj

    2012-01-01

    We present a numerical method for solving Weyl's embedding problem which consists in finding a global isometric embedding of a positively curved and positive-definite spherical 2-metric into the Euclidean 3-space. The method is based on a construction introduced by Weingarten and was used in Nirenberg's proof of Weyl's conjecture. The target embedding results as the endpoint of an embedding flow in R 3 beginning at the unit sphere's embedding. We employ spectral methods to handle functions on the surface and to solve various (non)linear elliptic PDEs. The code requires no additional input or steering from the operator and its convergence is guaranteed by the Nirenberg arguments. Possible applications in 3 + 1 numerical relativity range from quasi-local mass and momentum measures to coarse-graining in inhomogeneous cosmological models. (paper)

  7. A Project-Based Laboratory for Learning Embedded System Design with Industry Support

    Science.gov (United States)

    Lee, Chyi-Shyong; Su, Juing-Huei; Lin, Kuo-En; Chang, Jia-Hao; Lin, Gu-Hong

    2010-01-01

    A project-based laboratory for learning embedded system design with support from industry is presented in this paper. The aim of this laboratory is to motivate students to learn the building blocks of embedded systems and practical control algorithms by constructing a line-following robot using the quadratic interpolation technique to predict the…

  8. On the geometry of some special projective varieties

    CERN Document Server

    Russo, Francesco

    2016-01-01

    Providing an introduction to both classical and modern techniques in projective algebraic geometry, this monograph treats the geometrical properties of varieties embedded in projective spaces, their secant and tangent lines, the behavior of tangent linear spaces, the algebro-geometric and topological obstructions to their embedding into smaller projective spaces, and the classification of extremal cases. It also provides a solution of Hartshorne’s Conjecture on Complete Intersections for the class of quadratic manifolds and new short proofs of previously known results, using the modern tools of Mori Theory and of rationally connected manifolds. The new approach to some of the problems considered can be resumed in the principle that, instead of studying a special embedded manifold uniruled by lines, one passes to analyze the original geometrical property on the manifold of lines passing through a general point and contained in the manifold. Once this embedded manifold, usually of lower codimension, is classi...

  9. Flood-proof motors

    Energy Technology Data Exchange (ETDEWEB)

    Schmitt, Marcus [AREVA NP GmbH, Erlangen (Germany)

    2013-07-01

    Even before the Fukushima event occurred some German nuclear power plants (NPP) have considered flooding scenarios. As a result of one of these studies, AREVA performed an upgrade project in NPP Isar 1 with flood-proof motors as a replacement of existing air-cooled low-voltage and high-voltage motors of the emergency cooling chain. After the Fukushima event, in which the cooling chains failed, the topic flood-proof equipment gets more and more into focus. This compact will introduce different kinds of flood-proof electrical motors which are currently installed or planned for installation into NPPs over the world. Moreover the process of qualification, as it was performed during the project in NPP Isar 1, will be shown. (orig.)

  10. Flood-proof motors

    International Nuclear Information System (INIS)

    Schmitt, Marcus

    2013-01-01

    Even before the Fukushima event occurred some German nuclear power plants (NPP) have considered flooding scenarios. As a result of one of these studies, AREVA performed an upgrade project in NPP Isar 1 with flood-proof motors as a replacement of existing air-cooled low-voltage and high-voltage motors of the emergency cooling chain. After the Fukushima event, in which the cooling chains failed, the topic flood-proof equipment gets more and more into focus. This compact will introduce different kinds of flood-proof electrical motors which are currently installed or planned for installation into NPPs over the world. Moreover the process of qualification, as it was performed during the project in NPP Isar 1, will be shown. (orig.)

  11. Algebraic proofs over noncommutative formulas

    Czech Academy of Sciences Publication Activity Database

    Tzameret, Iddo

    2011-01-01

    Roč. 209, č. 10 (2011), s. 1269-1292 ISSN 0890-5401 R&D Projects: GA MŠk LC505 Institutional research plan: CEZ:AV0Z10190503 Keywords : proof complexity * algebraic proof system s * frege proofs Subject RIV: BA - General Mathematics Impact factor: 0.560, year: 2011 http://www.sciencedirect.com/science/article/pii/S089054011100109X

  12. Evaluation of predator-proof fenced biodiversity projects

    OpenAIRE

    Doelle, Sebastian

    2012-01-01

    There has been recent debate over the role of predator-proof fences in the management of New Zealand’s biodiversity. The debate has arisen due to concern that investments in fenced sanctuaries are less productive than are alternative ways to manage biodiversity. Predator-proof fences are costly and budget constraints limit the area of habitat that can be fenced. The area of habitat enclosed within fences, and number of individuals of species supported, determines project’s ability to contribu...

  13. Stack monitor for the Proof-of-Breeding Project

    International Nuclear Information System (INIS)

    Fergus, R.W.

    1985-01-01

    This stack monitor system is a coordinated arrangement of hardware and software to monitor four hot cells (8 stacks) during the fuel dissection for the Proof-of-Breeding Project. The cell monitors, which are located in fan lofts, contain a microprocessor, radiation detectors, air flow sensors, and air flow control equipment. Design criteria included maximizing microprocessor control while minimizing the hardware complexity. The monitors have been programmed to produce concentration and total activity release data based on several detector measurements and flow rates. Although each monitor can function independently, a microcomputer can also be used to control each cell monitor including reprogramming if necessary. All programming is software, as opposed to firmware, with machine language for compactness in the cell monitors and Basic language for adaptability in the microcomputer controller

  14. Pre-service proof pressure and leak rate tests for the Qinshan CANDU project reactor buildings

    International Nuclear Information System (INIS)

    Petrunik, K.J.; Khan, A.; Ricciuti, R.; Ivanov, A.; Chen, S.

    2003-01-01

    The Qinshan CANDU Project Reactor Buildings (Units 1 and 2) have been successfully tested for the Pre-Service Proof Pressure and Integrated Leak Rate Tests. The Unit 1 tests took place from May 3 to May 9, 2002 and from May 22 to May 25, 2002, and the Unit 2 tests took place from January 21 to January 27, 2003. This paper discusses the significant steps taken at minimum cost on the Qinshan CANDU Project, which has resulted in a) very good leak rate (0.21%) for Unit 1 and excellent leak rate (0.130%) for Unit 2; b) continuous monitoring of the structural behaviour during the Proof Pressure Test, thus eliminating any repeat of the structural test due to lack of data; and c) significant schedule reduction achieved for these tests in Unit 2. (author)

  15. Final report SmartProofS. Results of projects of the SmartProofS program; Eindrapport SmartProofS. Projectresultaten van het SmartProofS programma

    Energy Technology Data Exchange (ETDEWEB)

    Van Hoorik, P.; Westerga, R. [Energy Valley, Groningen (Netherlands)

    2011-05-15

    The SmartProofs program aims to develop tools which must show that the principle of a Smart Power System (SPS) works and how. An SPS can ensure that the supply and demand of electricity in the grid is balanced, even in case more decentralized energy techniques will be put into use. This final report summarizes the main results and conclusions of the SmartProofs program. As part of the SPS program attention is paid to the impacts on the girds, the effects of centralized and decentralized management, disaster resilience, pricing models, potential benefits of control and new business models [Dutch] Het SmartProofs programma heeft tot doel om een concept van een Smart Power System (SPS) te ontwikkelen waarmee kan worden aangetoond dat het principe van een SPS werkt en op welke manier. Een SPS kan zorgen dat het aanbod van elektriciteit op het net op elk moment van de dag overeenkomt met de vraag, ook als er straks veel meer decentrale energietechnieken gebruikt worden waarmee zowel de vraag als het aanbod van elektriciteit onvoorspelbaar wordt. Dit eindrapport geeft een overzicht van de belangrijkste resultaten en conclusies van het SmartProofs programma. Het programma heeft in de werkpakketten deelvraagstukken rondom SmartProofS onderzocht rondom de effecten op onze energienetten, de effecten van zowel centrale- als decentrale aansturing, disaster resilience, prijsmodellen, mogelijke baten van aansturing en nieuwe business modellen.

  16. Embedded engineering education

    CERN Document Server

    Kaštelan, Ivan; Temerinac, Miodrag; Barak, Moshe; Sruk, Vlado

    2016-01-01

    This book focuses on the outcome of the European research project “FP7-ICT-2011-8 / 317882: Embedded Engineering Learning Platform” E2LP. Additionally, some experiences and researches outside this project have been included. This book provides information about the achieved results of the E2LP project as well as some broader views about the embedded engineering education. It captures project results and applications, methodologies, and evaluations. It leads to the history of computer architectures, brings a touch of the future in education tools and provides a valuable resource for anyone interested in embedded engineering education concepts, experiences and material. The book contents 12 original contributions and will open a broader discussion about the necessary knowledge and appropriate learning methods for the new profile of embedded engineers. As a result, the proposed Embedded Computer Engineering Learning Platform will help to educate a sufficient number of future engineers in Europe, capable of d...

  17. Embedding the Finite Sampling Process at a Rate

    OpenAIRE

    Shorack, Galen R.

    1991-01-01

    A huge body of if and only if theorems can be obtained based on certain strong embedding theorems for the partial sum process $\\mathbb{S}_n$ and the uniform empirical and quantile processes $\\mathbb{U}_n$ and $\\mathbb{V}_n$. This embedding was accomplished in 1986 by M. Csorgo, S. Csorgo, L. Horvath and D. Mason. Their embedding is beautifully formulated so that many necessary and sufficient type results can be established using it. It is worthwhile to have an accessible proof. Indeed, these ...

  18. Proof Auditing Formalised Mathematics

    Directory of Open Access Journals (Sweden)

    Mark Miles Adams

    2016-01-01

    Full Text Available The first three formalisations of major mathematical proofs have heralded a new age in formalised mathematics, establishing that informal proofs at the limits of what can be understood by humans can be checked by machine. However, formalisation itself can be subject to error, and yet there is currently no accepted process in checking, or even much concern that such checks have not been performed. In this paper, we motivate why we should be concerned about correctness, and argue the need for proof auditing, to rigorously and independently check a formalisation. We discuss the issues involved in performing an audit, and propose an effective and efficient auditing process. Throughout we use the Flyspeck Project, that formalises the Kepler Conjecture proof, to illustrate our point.

  19. Applying Gödel's Dialectica Interpretation to Obtain a Constructive Proof of Higman's Lemma

    Directory of Open Access Journals (Sweden)

    Thomas Powell

    2012-10-01

    Full Text Available We use Gödel's Dialectica interpretation to analyse Nash-Williams' elegant but non-constructive "minimal bad sequence" proof of Higman's Lemma. The result is a concise constructive proof of the lemma (for arbitrary decidable well-quasi-orders in which Nash-Williams' combinatorial idea is clearly present, along with an explicit program for finding an embedded pair in sequences of words.

  20. EOS: A project to investigate the design and construction of real-time distributed Embedded Operating Systems

    Science.gov (United States)

    Campbell, R. H.; Essick, Ray B.; Johnston, Gary; Kenny, Kevin; Russo, Vince

    1987-01-01

    Project EOS is studying the problems of building adaptable real-time embedded operating systems for the scientific missions of NASA. Choices (A Class Hierarchical Open Interface for Custom Embedded Systems) is an operating system designed and built by Project EOS to address the following specific issues: the software architecture for adaptable embedded parallel operating systems, the achievement of high-performance and real-time operation, the simplification of interprocess communications, the isolation of operating system mechanisms from one another, and the separation of mechanisms from policy decisions. Choices is written in C++ and runs on a ten processor Encore Multimax. The system is intended for use in constructing specialized computer applications and research on advanced operating system features including fault tolerance and parallelism.

  1. Proof Mining in L1-Approximation

    DEFF Research Database (Denmark)

    Oliva, Paulo Borges; Kohlenbach, Ulrich

    2001-01-01

    In this paper, we present another case study in the general project of proof mining which means the logical analysis of prima facie non-effective proofs with the aim of extracting new computationally relevant data. We use techniques based on monotone functional interpretation developed...

  2. Proof Mining in L1-Approximation

    DEFF Research Database (Denmark)

    Kohlenbach, Ulrich; Oliva, Paulo Borges

    2003-01-01

    n this paper, we present another case study in the general project of proof mining which means the logical analysis of prima facie non-effective proofs with the aim of extracting new computationally relevant data. We use techniques based on monotone functional interpretation developed in Kohlenbach...

  3. Implicit proofs

    Czech Academy of Sciences Publication Activity Database

    Krajíček, Jan

    2004-01-01

    Roč. 69, č. 2 (2004), s. 387-397 ISSN 0022-4812 R&D Projects: GA AV ČR IAA1019901; GA MŠk LN00A056 Institutional research plan: CEZ:AV0Z1019905 Keywords : propositional proof system s * circuits * polynomial simulation Subject RIV: BA - General Mathematics Impact factor: 0.331, year: 2004

  4. A Prototype Embedding of Bluespec System Verilog in the PVS Theorem Prover

    Science.gov (United States)

    Richards, Dominic; Lester, David

    2010-01-01

    Bluespec SystemVerilog (BSV) is a Hardware Description Language based on the guarded action model of concurrency. It has an elegant semantics, which makes it well suited for formal reasoning. To date, a number of BSV designs have been verified with hand proofs, but little work has been conducted on the application of automated reasoning. We present a prototype shallow embedding of BSV in the PVS theorem prover. Our embedding is compatible with the PVS model checker, which can automatically prove an important class of theorems, and can also be used in conjunction with the powerful proof strategies of PVS to verify a broader class of properties than can be achieved with model checking alone.

  5. Coqoon - An IDE for Interactive Proof Development in Coq

    OpenAIRE

    Faithfull, Alexander; Bengtson, Jesper; Tassi, Enrico

    2016-01-01

    User interfaces for interactive proof assistants have always lagged behind those for mainstream programming languages. Whereas integrated development environments—IDEs—have support for features like project management, version control, dependency analysis and incremental project compilation, “IDE”s for proof assistants typically only operate on files in isolation, relying on external tools to integrate those files into larger projects. In this paper we present Coqoon, an IDE for Coq developme...

  6. Climatescan.nl: the development of a web-based map application to encourage knowledge-sharing of climate-proofing and urban resilient projects

    NARCIS (Netherlands)

    Tipping, Jonathan; Boogaard, Floris; Jaeger, R.; Duffy, A.; Klomp, T.; Manenschijn, M.

    2015-01-01

    Over recent years, there has been an explosion in the number and diversity of projects undertaken to address urban resilience and climate proofing. Sharing the knowledge gained from these projects demands increasingly innovative and accessible methods. This paper details the outcomes of one such

  7. The embedded operating system project

    Science.gov (United States)

    Campbell, R. H.

    1984-01-01

    This progress report describes research towards the design and construction of embedded operating systems for real-time advanced aerospace applications. The applications concerned require reliable operating system support that must accommodate networks of computers. The report addresses the problems of constructing such operating systems, the communications media, reconfiguration, consistency and recovery in a distributed system, and the issues of realtime processing. A discussion is included on suitable theoretical foundations for the use of atomic actions to support fault tolerance and data consistency in real-time object-based systems. In particular, this report addresses: atomic actions, fault tolerance, operating system structure, program development, reliability and availability, and networking issues. This document reports the status of various experiments designed and conducted to investigate embedded operating system design issues.

  8. Coqoon - An IDE for Interactive Proof Development in Coq

    DEFF Research Database (Denmark)

    Faithfull, Alexander; Bengtson, Jesper; Tassi, Enrico

    2016-01-01

    User interfaces for interactive proof assistants have always lagged behind those for mainstream programming languages. Whereas integrated development environments—IDEs—have support for features like project management, version control, dependency analysis and incremental project compilation, “IDE...... these projects using the Eclipse common build system. Coqoon takes advantage of the latest features of Coq, including asynchronous and parallel processing of proofs, and—when used together with a third-party OCaml extension for Eclipse—can even be used to work on large developments containing Coq plugins....

  9. A New Small Emendation of Gödel's Ontological Proof

    Czech Academy of Sciences Publication Activity Database

    Hájek, Petr

    2002-01-01

    Roč. 71, č. 2 (2002), s. 149-164 ISSN 0039-3215 R&D Projects: GA MŠk LN00A056 Keywords : ontological proof * Gödel proof * modal logic * comprehension * positive properties Subject RIV: BA - General Mathematics

  10. Parallel embedded systems: where real-time and low-power meet

    DEFF Research Database (Denmark)

    Karakehayov, Zdravko; Guo, Yu

    2008-01-01

    This paper introduces a combination of models and proofs for optimal power management via Dynamic Frequency Scaling and Dynamic Voltage Scaling. The approach is suitable for systems on a chip or microcontrollers where processors run in parallel with embedded peripherals. We have developed...... a software tool, called CASTLE, to provide computer assistance in the design process of energy-aware embedded systems. The tool considers single processor and parallel architectures. An example shows an energy reduction of 23% when the tool allocates two microcontrollers for parallel execution....

  11. An embedded system developed for hand held assay used in water monitoring

    Science.gov (United States)

    Wu, Lin; Wang, Jianwei; Ramakrishna, Bharath; Hsueh, Mingkai; Liu, Jonathan; Wu, Qufei; Wu, Chao-Cheng; Cao, Mang; Chang, Chein-I.; Jensen, Janet L.; Jensen, James O.; Knapp, Harlan; Daniel, Robert; Yin, Ray

    2005-11-01

    The US Army Joint Service Agent Water Monitor (JSAWM) program is currently interested in an approach that can implement a hardware- designed device in ticket-based hand-held assay (currently being developed) used for chemical/biological agent detection. This paper presents a preliminary investigation of the proof of concept. Three components are envisioned to accomplish the task. One is the ticket development which has been undertaken by the ANP, Inc. Another component is the software development which has been carried out by the Remote Sensing Signal and Image Processing Laboratory (RSSIPL) at the University of Maryland, Baltimore County (UMBC). A third component is an embedded system development which can be used to drive the UMBC-developed software to analyze the ANP-developed HHA tickets on a small pocket-size device like a PDA. The main focus of this paper is to investigate the third component that is viable and is yet to be explored. In order to facilitate to prove the concept, a flatbed scanner is used to replace a ticket reader to serve as an input device. The Stargate processor board is used as the embedded System with Embedded Linux installed. It is connected to an input device such as scanner as well as output devices such as LCD display or laptop etc. It executes the C-Coded processing program developed for this embedded system and outputs its findings on a display device. The embedded system to be developed and investigated in this paper is the core of a future hardware device. Several issues arising in such an embedded system will be addressed. Finally, the proof-of-concept pilot embedded system will be demonstrated.

  12. Embeddings of model subspaces of the Hardy space: compactness and Schatten-von Neumann ideals

    International Nuclear Information System (INIS)

    Baranov, Anton D

    2009-01-01

    We study properties of the embedding operators of model subspaces K p Θ (defined by inner functions) in the Hardy space H p (coinvariant subspaces of the shift operator). We find a criterion for the embedding of K p Θ in L p (μ) to be compact similar to the Volberg-Treil theorem on bounded embeddings, and give a positive answer to a question of Cima and Matheson. The proof is based on Bernstein-type inequalities for functions in K p Θ . We investigate measures μ such that the embedding operator belongs to some Schatten-von Neumann ideal.

  13. Can openEHR archetypes be used in a national context? The Danish archetype proof-of-concept project.

    Science.gov (United States)

    Bernstein, Knut; Tvede, Ida; Petersen, Jan; Bredegaard, Kirsten

    2009-01-01

    Semantic interoperability and secondary use of data are important informatics challenges in modern healthcare. Connected Digital Health Denmark is investigating if the openEHR reference model, archetypes and templates could be used for representing and exchanging clinical content specification and could become a candidate for a national logical infrastructure for semantic interoperability. The Danish archetype proof-of-concept project has tried out some elements of the openEHR methodology in cooperation with regions and vendors. The project has pointed out benefits and challenges using archetypes, and has identified barriers that need to be addressed in the next steps.

  14. New approach to invariant-embedding methods in reactor physics calculations

    International Nuclear Information System (INIS)

    Forsbacka, M.J.; Rydin, R.A.

    1997-01-01

    Invariant-embedding methods offer an alternative approach to modeling physical phenomena and solving mathematical problems. Invariant embedding allows one to express traditional boundary-value problems as initial-value problems. In doing this, one effectively reformulates a problem to be solved in terms of an embedding parameter. In this paper, a hybrid method that consists of Monte Carlo-generated response functions that describe the neutronic properties of local spatial cells are coupled together in a global reactor model using the invariant embedding methodology, where the system multiplication factor k eff is used as the embedding parameter. Thus, k eff is computed directly rather than as the result of a secondary eigenvalue calculation. Because the response functions can represent any arbitrary material distribution within a local cell, this method shows promise to accurately assess the change in reactivity due to core disruptive accidents and other changes in system configuration such as changing control rod positions. This paper reports a series of proof-of-concept calculations that assess this method

  15. Time-dependent potential-functional embedding theory

    International Nuclear Information System (INIS)

    Huang, Chen; Libisch, Florian; Peng, Qing; Carter, Emily A.

    2014-01-01

    We introduce a time-dependent potential-functional embedding theory (TD-PFET), in which atoms are grouped into subsystems. In TD-PFET, subsystems can be propagated by different suitable time-dependent quantum mechanical methods and their interactions can be treated in a seamless, first-principles manner. TD-PFET is formulated based on the time-dependent quantum mechanics variational principle. The action of the total quantum system is written as a functional of the time-dependent embedding potential, i.e., a potential-functional formulation. By exploiting the Runge-Gross theorem, we prove the uniqueness of the time-dependent embedding potential under the constraint that all subsystems share a common embedding potential. We derive the integral equation that such an embedding potential needs to satisfy. As proof-of-principle, we demonstrate TD-PFET for a Na 4 cluster, in which each Na atom is treated as one subsystem and propagated by time-dependent Kohn-Sham density functional theory (TDDFT) using the adiabatic local density approximation (ALDA). Our results agree well with a direct TDDFT calculation on the whole Na 4 cluster using ALDA. We envision that TD-PFET will ultimately be useful for studying ultrafast quantum dynamics in condensed matter, where key regions are solved by highly accurate time-dependent quantum mechanics methods, and unimportant regions are solved by faster, less accurate methods

  16. Methodology and Supporting Toolset Advancing Embedded Systems Quality

    DEFF Research Database (Denmark)

    Berger, Michael Stübert; Soler, José; Brewka, Lukasz Jerzy

    2013-01-01

    Software quality is of primary importance in the development of embedded systems that are often used in safety-critical applications. Moreover, as the life cycle of embedded products becomes increasingly tighter, productivity and quality are simultaneously required and closely interrelated towards...... delivering competitive products. In this context, the MODUS (Methodology and supporting toolset advancing embedded systems quality) project aims to provide a pragmatic and viable solution that will allow SMEs to substantially improve their positioning in the embedded-systems development market. This paper...... will describe the MODUS project with focus on the technical methodologies that will be developed advancing embedded system quality....

  17. Proofs with monotone cuts

    Czech Academy of Sciences Publication Activity Database

    Jeřábek, Emil

    2012-01-01

    Roč. 58, č. 3 (2012), s. 177-187 ISSN 0942-5616 R&D Projects: GA AV ČR IAA100190902; GA MŠk(CZ) 1M0545 Institutional support: RVO:67985840 Keywords : proof complexity * monotone sequent calculus Subject RIV: BA - General Mathematics Impact factor: 0.376, year: 2012 http://onlinelibrary.wiley.com/doi/10.1002/malq.201020071/full

  18. A device for heat-proofing the closing slab of a fast neutron nuclear reactor

    International Nuclear Information System (INIS)

    Lemercier, Guy.

    1973-01-01

    A device proofing the closing-slab comprising a metal-shoe against which is applied said device, the latter being constituted by a plurality of panels, each of which is formed by a padding of superimposed metal-cloths arranged in parallel relationship to the slab to be heat-proofed. Said device is characterized in that each panel is contained in a casing applied against the slab, constituted by two metal half-boxes of parallelepipedic shape embedded into each other. This can be applied to high-power reactors for protecting the slab against the aerosols of the coolant liquid-metal [fr

  19. A RFID grouping proof protocol for medication safety of inpatient.

    Science.gov (United States)

    Huang, Hsieh-Hong; Ku, Cheng-Yuan

    2009-12-01

    In order to provide enhanced medication safety for inpatients, the medical mechanism which adopts the modified grouping proof protocol is proposed in this paper. By using the grouping proof protocol, the medical staffs could confirm the authentication and integrity of a group of Radio-Frequency Identification (RFID) tags which are embedded on inpatient bracelets and the containers of drugs. This mechanism is designed to be compatible with EPCglobal Class-1 Generation-2 standard which is the most popular specification of RFID tags. Due to the light-weight computational capacity of passive tags, only the pseudo-random number generator (PRNG) and cyclic redundancy code (CRC) are allowed to be used in the communication protocol. Furthermore, a practical scenario of using this proposed mechanism in hospital to examine the medication safety is also presented.

  20. The random projection method

    CERN Document Server

    Vempala, Santosh S

    2005-01-01

    Random projection is a simple geometric technique for reducing the dimensionality of a set of points in Euclidean space while preserving pairwise distances approximately. The technique plays a key role in several breakthrough developments in the field of algorithms. In other cases, it provides elegant alternative proofs. The book begins with an elementary description of the technique and its basic properties. Then it develops the method in the context of applications, which are divided into three groups. The first group consists of combinatorial optimization problems such as maxcut, graph coloring, minimum multicut, graph bandwidth and VLSI layout. Presented in this context is the theory of Euclidean embeddings of graphs. The next group is machine learning problems, specifically, learning intersections of halfspaces and learning large margin hypotheses. The projection method is further refined for the latter application. The last set consists of problems inspired by information retrieval, namely, nearest neig...

  1. A Short Proof of Klee's Theorem

    OpenAIRE

    Zanazzi, John J.

    2013-01-01

    In 1959, Klee proved that a convex body $K$ is a polyhedron if and only if all of its projections are polygons. In this paper, a new proof of this theorem is given for convex bodies in $\\mathbb{R}^3$.

  2. Combinatorial Proofs and Algebraic Proofs

    Indian Academy of Sciences (India)

    Permanent link: https://www.ias.ac.in/article/fulltext/reso/018/07/0630-0645. Keywords. Combinatorial proof; algebraic proof; binomial identity; recurrence relation; composition; Fibonacci number; Fibonacci identity; Pascal triangle. Author Affiliations. Shailesh A Shirali1. Sahyadri School Tiwai Hill, Rajgurunagar Pune 410 ...

  3. Gödel, Truth and Proof

    Czech Academy of Sciences Publication Activity Database

    Peregrin, Jaroslav

    -, č. 82 (2007), s. 1-10 E-ISSN 1742-6596 R&D Projects: GA ČR(CZ) GA401/04/0117 Institutional research plan: CEZ:AV0Z90090514 Keywords : Gödel * incompleteness of arithmetic * proof vs. truth Subject RIV: AA - Philosophy ; Religion http://www.iop.org/EJ/ toc /1742-6596/82/1

  4. Valuation of investment projects by an international oil company: a new proof of a straightforward, rigorous method

    International Nuclear Information System (INIS)

    Pierru, A.; Babusiaux, D.

    2009-02-01

    The problem studied is that of valuing investment projects of an international oil company subject to tax schemes that vary from one country to another. The existing disparities in the tax treatment of interest paid can lead the firm to seek an optimal allocation of its debt capacity among the various projects. In this context, the generalized ATWACC (After-Tax Weighted Average Cost of Capital) method presents numerous advantages over standard methods and is particularly well suited to the valuation of oil-field development projects where debt financing differs from the amount that would correspond to the debt ratio targeted by the firm at the corporate scale. In this paper, we discuss adapting the generalized ATWACC method to the specificities of the oil industry and offer new proof of its validity, based on a model that maximizes, under constraints, the firm's equity value. (authors)

  5. Using Software Architectures for Designing Distributed Embedded Systems

    DEFF Research Database (Denmark)

    Christensen, Henrik Bærbak

    In this paper, we outline an on-going project of designing distributed embedded systems for closed-loop process control. The project is a joint effort between software architecture researchers and developers from two companies that produce commercial embedded process control systems. The project...... has a strong emphasis on software architectural issues and terminology in order to envision, design and analyze design alternatives. We present two results. First, we outline how focusing on software architecture, architectural issues and qualities are beneficial in designing distributed, embedded......, systems. Second, we present two different architectures for closed-loop process control and discuss benefits and reliabilities....

  6. Understanding mathematical proof

    CERN Document Server

    Taylor, John

    2014-01-01

    Introduction The need for proof The language of mathematics Reasoning Deductive reasoning and truth Example proofs Logic and ReasoningIntroduction Propositions, connectives, and truth tables Logical equivalence and logical implication Predicates and quantification Logical reasoning Sets and Functions Introduction Sets and membership Operations on setsThe Cartesian product Functions and composite functions Properties of functions The Structure of Mathematical ProofsIntroduction Some proofs dissected An informal framework for proofs Direct proof A more formal framework Finding Proofs Direct proo

  7. Student Teachers’ Proof Schemes on Proof Tasks Involving Inequality: Deductive or Inductive?

    Science.gov (United States)

    Rosyidi, A. H.; Kohar, A. W.

    2018-01-01

    Exploring student teachers’ proof ability is crucial as it is important for improving the quality of their learning process and help their future students learn how to construct a proof. Hence, this study aims at exploring at the proof schemes of student teachers in the beginning of their studies. Data were collected from 130 proofs resulted by 65 Indonesian student teachers on two proof tasks involving algebraic inequality. To analyse, the proofs were classified into the refined proof schemes level proposed by Lee (2016) ranging from inductive, which only provides irrelevant inferences, to deductive proofs, which consider addressing formal representation. Findings present several examples of each of Lee’s level on the student teachers’ proofs spanning from irrelevant inferences, novice use of examples or logical reasoning, strategic use examples for reasoning, deductive inferences with major and minor logical coherence, and deductive proof with informal and formal representation. Besides, it was also found that more than half of the students’ proofs coded as inductive schemes, which does not meet the requirement for doing the proof for the proof tasks examined in this study. This study suggests teacher educators in teacher colleges to reform the curriculum regarding proof learning which can accommodate the improvement of student teachers’ proving ability from inductive to deductive proof as well from informal to formal proof.

  8. Completing the proof of “Generic quantum nonlocality”

    Energy Technology Data Exchange (ETDEWEB)

    Gachechiladze, Mariami; Gühne, Otfried, E-mail: otfried.guehne@uni-siegen.de

    2017-04-18

    In a paper by Popescu and Rohrlich a proof has been presented showing that any pure entangled multiparticle quantum state violates some Bell inequality. We point out a gap in this proof, but we also give a construction to close this gap. It turns out that with some extra effort all the results from the aforementioned publication can be proven. Our construction shows how two-particle entanglement can be generated via performing local projections on a multiparticle state. - Highlights: • A proof is completed, showing that any pure entangled multiparticle quantum state violates some Bell inequality. • The results demonstrate how an multi-qubit state can be transformed by local measurements to a two-qubit entangled state. • The extension to higher dimensions is discussed.

  9. Completing the proof of “Generic quantum nonlocality”

    International Nuclear Information System (INIS)

    Gachechiladze, Mariami; Gühne, Otfried

    2017-01-01

    In a paper by Popescu and Rohrlich a proof has been presented showing that any pure entangled multiparticle quantum state violates some Bell inequality. We point out a gap in this proof, but we also give a construction to close this gap. It turns out that with some extra effort all the results from the aforementioned publication can be proven. Our construction shows how two-particle entanglement can be generated via performing local projections on a multiparticle state. - Highlights: • A proof is completed, showing that any pure entangled multiparticle quantum state violates some Bell inequality. • The results demonstrate how an multi-qubit state can be transformed by local measurements to a two-qubit entangled state. • The extension to higher dimensions is discussed.

  10. Short proofs for the determinant identities

    Czech Academy of Sciences Publication Activity Database

    Hrubeš, Pavel; Tzameret, I.

    2015-01-01

    Roč. 44, č. 2 (2015), s. 340-383 ISSN 0097-5397 EU Projects: European Commission(XE) 339691 - FEALORA Program:FP7 Institutional support: RVO:67985840 Keywords : proof complexity * arithmetic circuits Subject RIV: BA - General Mathematics Impact factor: 0.841, year: 2015 http://epubs.siam.org/doi/abs/10.1137/130917788

  11. Ontological Proofs of Existence and Non-Existence

    Czech Academy of Sciences Publication Activity Database

    Hájek, Petr

    2008-01-01

    Roč. 90, č. 2 (2008), s. 257-262 ISSN 0039-3215 R&D Projects: GA AV ČR IAA100300503 Institutional research plan: CEZ:AV0Z10300504 Keywords : ontological proofs * existence * non-existence * Gödel * Caramuel Subject RIV: BA - General Mathematics

  12. Writing proofs in analysis

    CERN Document Server

    Kane, Jonathan M

    2016-01-01

    This is a textbook on proof writing in the area of analysis, balancing a survey of the core concepts of mathematical proof with a tight, rigorous examination of the specific tools needed for an understanding of analysis. Instead of the standard "transition" approach to teaching proofs, wherein students are taught fundamentals of logic, given some common proof strategies such as mathematical induction, and presented with a series of well-written proofs to mimic, this textbook teaches what a student needs to be thinking about when trying to construct a proof. Covering the fundamentals of analysis sufficient for a typical beginning Real Analysis course, it never loses sight of the fact that its primary focus is about proof writing skills. This book aims to give the student precise training in the writing of proofs by explaining exactly what elements make up a correct proof, how one goes about constructing an acceptable proof, and, by learning to recognize a correct proof, how to avoid writing incorrect proofs. T...

  13. US NDC Modernization: Service Oriented Architecture Proof of Concept

    Energy Technology Data Exchange (ETDEWEB)

    Hamlet, Benjamin R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Encarnacao, Andre Villanova [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Jackson, Keilan R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hays, Ian A. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Barron, Nathan E. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Simon, Luke B. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Harris, James M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Young, Christopher J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-12-01

    This report is a progress update on the US NDC Modernization Service Oriented Architecture (SOA) study describing results from a proof of concept project completed from May through September 2013. Goals for this proof of concept are 1) gain experience configuring, using, and running an Enterprise Service Bus (ESB), 2) understand the implications of wrapping existing software in standardized interfaces for use as web services, and 3) gather performance metrics for a notional seismic event monitoring pipeline implemented using services with various data access and communication patterns. The proof of concept is a follow on to a previous SOA performance study. Work was performed by four undergraduate summer student interns under the guidance of Sandia staff.

  14. Proof complexity of intuitionistic implicational formulas

    Czech Academy of Sciences Publication Activity Database

    Jeřábek, Emil

    2017-01-01

    Roč. 168, č. 1 (2017), s. 150-190 ISSN 0168-0072 EU Projects: European Commission(XE) 339691 - FEALORA Institutional support: RVO:67985840 Keywords : proof complexity * intuitionistic logic * implicational fragment Subject RIV: BA - General Mathematics OBOR OECD: Pure mathematics Impact factor: 0.647, year: 2016 http://www.sciencedirect.com/science/article/pii/S0168007216301154

  15. Future-proofing nursing education.

    Science.gov (United States)

    Keighley, Tom

    2014-12-01

    The origin of future-proofing seems lost in the mists of recent history. Dictionaries date its use from about 1991, referring to the prevention of obsolescence in information technology manufacturing and occasionally in organizational systems. However, closer analysis in healthcare demonstrates it can be traced back to the Rand Corporation and the studies commissioned there in the 1960s. These aimed at identifying the predictive factors in planning healthcare, including development of the workforce. It is a managerial concept that helps to project a vision of change that is not simply reactive or short-term. It permits a focus on leadership and the maximising of learning opportunities and includes analysis of the policy horizon. It held within it an assumption about the importance of establishing the cognitive frameworks that would influence long-term behaviours and not focus simply on short-term gains. This paper utilises this approach to explore options for future-proofing of nurse education.

  16. PROOF on Demand

    International Nuclear Information System (INIS)

    Malzacher, Peter; Manafov, Anar

    2010-01-01

    PROOF on Demand (PoD) is a set of utilities, which allows starting a PROOF cluster at user request, on any resource management system. It provides a plug-in based system, which allows to use different job submission frontends, such as LSF or gLite WMS. Main components of PoD are the PROOFAgent and the PAConsole. PROOFAgent provides the communication layer between the PROOF master on the local machine and the PROOF workers on the remote resources, possibly behind a firewall. PAConsole provides a user-friendly GUI, which is used to setup, manage, and shutdown the dynamic PROOF cluster. Installation is simple and doesn't require administrator privileges, and all the processes run in user space. PoD gives users, who don't have a centrally-administrated static PROOF cluster at their institute, the possibility to enjoy the full power of interactive analysis with PROOF.

  17. Proof in geometry with "mistakes in geometric proofs"

    CERN Document Server

    Fetisov, A I

    2006-01-01

    This single-volume compilation of 2 books explores the construction of geometric proofs. It offers useful criteria for determining correctness and presents examples of faulty proofs that illustrate common errors. 1963 editions.

  18. A Simple Proof of Cauchy's Surface Area Formula

    OpenAIRE

    Tsukerman, Emmanuel; Veomett, Ellen

    2016-01-01

    We give a short and simple proof of Cauchy's surface area formula, which states that the average area of a projection of a convex body is equal to its surface area up to a multiplicative constant in the dimension.

  19. The embedded operating system project

    Science.gov (United States)

    Campbell, R. H.

    1985-01-01

    The design and construction of embedded operating systems for real-time advanced aerospace applications was investigated. The applications require reliable operating system support that must accommodate computer networks. Problems that arise in the construction of such operating systems, reconfiguration, consistency and recovery in a distributed system, and the issues of real-time processing are reported. A thesis that provides theoretical foundations for the use of atomic actions to support fault tolerance and data consistency in real-time object-based system is included. The following items are addressed: (1) atomic actions and fault-tolerance issues; (2) operating system structure; (3) program development; (4) a reliable compiler for path Pascal; and (5) mediators, a mechanism for scheduling distributed system processes.

  20. Proofs without Words: A Visual Application of Reasoning and Proof

    Science.gov (United States)

    Bell, Carol J.

    2011-01-01

    Reasoning and Proof is one of the Process Standards set forth in National Council of Teachers of Mathematics' (NCTM) "Principles and Standards for School Mathematics." Thus, it is important to give students opportunities to build their reasoning skills and aid their understanding of the proof process. Teaching students how to do proofs is a…

  1. Embedding methods for phi4-interaction

    International Nuclear Information System (INIS)

    Hanckowiak, J.

    1985-01-01

    The idea of embedding a given theory in a class of similar theories is applied to quantum field theory in the case of phi 4 -interaction to derive different equations for the generating functional. The number of possible embeddings has been restricted by demanding that for the defined projections of the generating functional a closed system of equations be obtained

  2. Innovation in POPBL teaching and learning methods by embedding individual activities as an integrated part of project work

    DEFF Research Database (Denmark)

    Moesby, Egon; W., Hans Henrik; Kørnøv, Lone

    2005-01-01

    activity embedded as an integrated part of the project work. Students work in the solution phase of the project on an individual activity that is separately assessed. The results of these individual activities form the platform for students’ final work with the project as a team. They have to evaluate......In this paper, the authors describe a way to increase student learning through social constructed teamwork by adding an individual activity to the project work. This can be achieved not just by adding an individual activity outside or parallel to the project work, but by having the individual...... the individual solutions and find the one solution to work on in the final phases of the project. On top of that, it helps train students’ abilities to make evaluations among various solutions of which one is their own, thereby learning how to evaluate their personal solutions against another person’s solutions...

  3. A Domain Specific Embedded Language in C++ for Automatic Differentiation, Projection, Integration and Variational Formulations

    Directory of Open Access Journals (Sweden)

    Christophe Prud'homme

    2006-01-01

    Full Text Available In this article, we present a domain specific embedded language in C++ that can be used in various contexts such as numerical projection onto a functional space, numerical integration, variational formulations and automatic differentiation. Albeit these tools operate in different ways, the language overcomes this difficulty by decoupling expression constructions from evaluation. The language is implemented using expression templates and meta-programming techniques and uses various Boost libraries. The language is exercised on a number of non-trivial examples and a benchmark presents the performance behavior on a few test problems.

  4. Proof Problems with Diagrams: An Opportunity for Experiencing Proofs and Refutations

    Science.gov (United States)

    Komatsu, Kotaro; Tsujiyama, Yosuke; Sakamaki, Aruta; Koike, Norio

    2014-01-01

    It has become gradually accepted that proof and proving are essential at all grades of mathematical learning. Among the various aspects of proof and proving, this study addresses proofs and refutations described by Lakatos, in particular a part of increasing content by deductive guessing, to introduce an authentic process into mathematics…

  5. Proof Pad: A New Development Environment for ACL2

    Directory of Open Access Journals (Sweden)

    Caleb Eggensperger

    2013-04-01

    Full Text Available Most software development projects rely on Integrated Development Environments (IDEs based on the desktop paradigm, with an interactive, mouse-driven user interface. The standard installation of ACL2, on the other hand, is designed to work closely with Emacs. ACL2 experts, on the whole, like this mode of operation, but students and other new programmers who have learned to program with desktop IDEs often react negatively to the process of adapting to an unfamiliar form of interaction. This paper discusses Proof Pad, a new IDE for ACL2. Proof Pad is not the only attempt to provide ACL2 IDEs catering to students and beginning programmers. The ACL2 Sedan and DrACuLa systems arose from similar motivations. Proof Pad builds on the work of those systems, while also taking into account the unique workflow of the ACL2 theorem proving system. The design of Proof Pad incorporated user feedback from the outset, and that process continued through all stages of development. Feedback took the form of direct observation of users interacting with the IDE as well as questionnaires completed by users of Proof Pad and other ACL2 IDEs. The result is a streamlined interface and fast, responsive system that supports using ACL2 as a programming language and a theorem proving system. Proof Pad also provides a property-based testing environment with random data generation and automated interpretation of properties as ACL2 theorem definitions.

  6. Embedment Effect test on soil-structure interaction

    International Nuclear Information System (INIS)

    Nasuda, Toshiaki; Akino, Kinji; Izumi, Masanori.

    1991-01-01

    A project consisting of laboratory test and field test has been conducted to clarify the embedment effect on soil-structure interaction. The objective of this project is to obtain the data for improving and preparing seismic analysis codes regarding the behavior of embedded reactor buildings during earthquakes. This project was planned to study the effect of soil-structure interaction using small size soil-structure models as well as the large scale models. The project was started in April, 1986, and is scheduled to end in March, 1994. The laboratory test models and field test models, and the measurement with accelerometers and others are described. As the interim results, the natural frequency and damping factor increased, and the amplitude decreased by the embedment of the test models. Some earthquakes were recorded in a soft rock site. The epicenters of the earthquakes occurred in 1989 are shown. The field tests were carried out in three sites. Two sites were used for the dynamic test with four test models having 8 m x 8 m plane size and 10 m height. One site was used for the static test with one concrete block as a specimen. Two models represent BWR type reactor buildings, and two models represent PWR type buildings. (K.I.)

  7. Costs and benefits of embedded generation

    International Nuclear Information System (INIS)

    1999-11-01

    This project sought to evaluate the costs and benefits of embedded generation in the light of the UK government's consultation paper on the future of green generation, the government's aim to increase the levels of generation from renewable energy sources and cogeneration, the current Review of the Electricity Trading Arrangements, and the form of the Distribution Price Control. Definitions are given for embedded, centrally dispatched, and pooled generation, and licensed suppliers, and commercial and economic values. The commercial and economic value of embedded generation is examined in terms of generation prices, costs to electrical suppliers, losses (electrical, transmission, distribution), and effects on the national grid and distribution network. Diagrams showing the cost elements of trading through the Pool and the elements that are avoided by non-Pool embedded generator trading are presented

  8. Eigenvalues, embeddings and generalised trigonometric functions

    CERN Document Server

    Lang, Jan

    2011-01-01

    The main theme of the book is the study, from the standpoint of s-numbers, of integral operators of Hardy type and related Sobolev embeddings. In the theory of s-numbers the idea is to attach to every bounded linear map between Banach spaces a monotone decreasing sequence of non-negative numbers with a view to the classification of operators according to the way in which these numbers approach a limit: approximation numbers provide an especially important example of such numbers. The asymptotic behavior of the s-numbers of Hardy operators acting between Lebesgue spaces is determined here in a wide variety of cases. The proof methods involve the geometry of Banach spaces and generalized trigonometric functions; there are connections with the theory of the p-Laplacian.

  9. A PROOF Analysis Framework

    International Nuclear Information System (INIS)

    González Caballero, I; Cuesta Noriega, A; Rodríguez Marrero, A; Fernández del Castillo, E

    2012-01-01

    The analysis of the complex LHC data usually follows a standard path that aims at minimizing not only the amount of data but also the number of observables used. After a number of steps of slimming and skimming the data, the remaining few terabytes of ROOT files hold a selection of the events and a flat structure for the variables needed that can be more easily inspected and traversed in the final stages of the analysis. PROOF arises at this point as an efficient mechanism to distribute the analysis load by taking advantage of all the cores in modern CPUs through PROOF Lite, or by using PROOF Cluster or PROOF on Demand tools to build dynamic PROOF cluster on computing facilities with spare CPUs. However using PROOF at the level required for a serious analysis introduces some difficulties that may scare new adopters. We have developed the PROOF Analysis Framework (PAF) to facilitate the development of new analysis by uniformly exposing the PROOF related configurations across technologies and by taking care of the routine tasks as much as possible. We describe the details of the PAF implementation as well as how we succeeded in engaging a group of CMS physicists to use PAF as their daily analysis framework.

  10. Methods library of embedded R functions at Statistics Norway

    Directory of Open Access Journals (Sweden)

    Øyvind Langsrud

    2017-11-01

    Full Text Available Statistics Norway is modernising the production processes. An important element in this work is a library of functions for statistical computations. In principle, the functions in such a methods library can be programmed in several languages. A modernised production environment demand that these functions can be reused for different statistics products, and that they are embedded within a common IT system. The embedding should be done in such a way that the users of the methods do not need to know the underlying programming language. As a proof of concept, Statistics Norway soon has established a methods library offering a limited number of methods for macro-editing, imputation and confidentiality. This is done within an area of municipal statistics with R as the only programming language. This paper presents the details and experiences from this work. The problem of fitting real word applications to simple and strict standards is discussed and exemplified by the development of solutions to regression imputation and table suppression.

  11. Independent Study Workbooks for Proofs in Group Theory

    Science.gov (United States)

    Alcock, Lara; Brown, Gavin; Dunning, Clare

    2015-01-01

    This paper describes a small-scale research project based on workbooks designed to support independent study of proofs in a first course on abstract algebra. We discuss the lecturers' aims in designing the workbooks, and set these against a background of research on students' learning of group theory and on epistemological beliefs and study habits…

  12. Homogeneous Spaces and Equivariant Embeddings

    CERN Document Server

    Timashev, DA

    2011-01-01

    Homogeneous spaces of linear algebraic groups lie at the crossroads of algebraic geometry, theory of algebraic groups, classical projective and enumerative geometry, harmonic analysis, and representation theory. By standard reasons of algebraic geometry, in order to solve various problems on a homogeneous space it is natural and helpful to compactify it keeping track of the group action, i.e. to consider equivariant completions or, more generally, open embeddings of a given homogeneous space. Such equivariant embeddings are the subject of this book. We focus on classification of equivariant em

  13. Certifiable Java for Embedded Systems

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Dalsgaard, Andreas Engelbredt; Hansen, Rene Rydhof

    2014-01-01

    The Certifiable Java for Embedded Systems (CJ4ES) project aimed to develop a prototype development environment and platform for safety-critical software for embedded applications. There are three core constituents: A profile of the Java programming language that is tailored for safety......-critical applications, a predictable Java processor built with FPGA technology, and an Eclipse based application development environment that binds the profile and the platform together and provides analyses that help to provide evidence that can be used as part of a safety case. This paper summarizes key contributions...

  14. Project-Based Learning to Enhance Teaching Embedded Systems

    Science.gov (United States)

    Sababha, Belal H.; Alqudah, Yazan A.; Abualbasal, Abdelraheem; AlQaralleh, Esam A.

    2016-01-01

    Exposing engineering students during their education to real-world problems and giving them the chance to apply what they learn in the classroom is a vital element of engineering education. The Embedded Systems course at Princess Sumaya University for Technology (PSUT) is one of the main courses that bridge the gap between theoretical electrical…

  15. From statistical proofs of the Kochen-Specker theorem to noise-robust noncontextuality inequalities

    Science.gov (United States)

    Kunjwal, Ravi; Spekkens, Robert W.

    2018-05-01

    The Kochen-Specker theorem rules out models of quantum theory wherein projective measurements are assigned outcomes deterministically and independently of context. This notion of noncontextuality is not applicable to experimental measurements because these are never free of noise and thus never truly projective. For nonprojective measurements, therefore, one must drop the requirement that an outcome be assigned deterministically in the model and merely require that it be assigned a distribution over outcomes in a manner that is context-independent. By demanding context independence in the representation of preparations as well, one obtains a generalized principle of noncontextuality that also supports a quantum no-go theorem. Several recent works have shown how to derive inequalities on experimental data which, if violated, demonstrate the impossibility of finding a generalized-noncontextual model of this data. That is, these inequalities do not presume quantum theory and, in particular, they make sense without requiring an operational analog of the quantum notion of projectiveness. We here describe a technique for deriving such inequalities starting from arbitrary proofs of the Kochen-Specker theorem. It extends significantly previous techniques that worked only for logical proofs, which are based on sets of projective measurements that fail to admit of any deterministic noncontextual assignment, to the case of statistical proofs, which are based on sets of projective measurements that d o admit of some deterministic noncontextual assignments, but not enough to explain the quantum statistics.

  16. Advances in proof theory

    CERN Document Server

    Strahm, Thomas; Studer, Thomas

    2016-01-01

    The aim of this volume is to collect original contributions by the best specialists from the area of proof theory, constructivity, and computation and discuss recent trends and results in these areas. Some emphasis will be put on ordinal analysis, reductive proof theory, explicit mathematics and type-theoretic formalisms, and abstract computations. The volume is dedicated to the 60th birthday of Professor Gerhard Jäger, who has been instrumental in shaping and promoting logic in Switzerland for the last 25 years. It comprises contributions from the symposium “Advances in Proof Theory”, which was held in Bern in December 2013. Proof theory came into being in the twenties of the last century, when it was inaugurated by David Hilbert in order to secure the foundations of mathematics. It was substantially influenced by Gödel's famous incompleteness theorems of 1930 and Gentzen's new consistency proof for the axiom system of first order number theory in 1936. Today, proof theory is a well-established branch ...

  17. Proof Nets for Lambek Calculus

    NARCIS (Netherlands)

    Roorda, Dirk

    1992-01-01

    The proof nets of linear logic are adapted to the non-commutative Lambek calculus. A different criterion for soundness of proof nets is given, which gives rise to new algorithms for proof search. The order sensitiveness of the Lambek calculus is reflected by the planarity condition on proof nets;

  18. Societal embedding of climate-friendly innovations

    International Nuclear Information System (INIS)

    Vaeyrynen, E.; Kivisaari, Sirkku; Lovio, R.

    2002-01-01

    This project assesses the possibilities of constructing a market for climate-friendly energy technologies by applying the process of 'societal embedding of innovations'. The term refers to an interactive learning process amongst three groups of key actors: producers, users and societal actors. Their co-operation shapes the innovation to fit the needs of the market and contributes to creation of conditions in which the innovation can be adopted. The project consists of two case studies: (1) Shaping of the ESCO energy service concept in Finnish municipalities and (2) Increasing the use of wood pellets in single-family houses. The case studies have illustrated the possibilities and limitations concerning the application of societal embedding in the energy sector. The project indicates that societal embedding may promote the implementation of climate-friendly energy technologies in at least three ways. Firstly, the process mobilises key actors to cooperation. This generates interactive learning on the problem and its solving. Market construction is forged ahead by mutual adaptation of the innovation and its environment. Secondly, this approach offers a tool to examine the societal quality of the innovation, a question related vitally to climate change. Thirdly, by producing new knowledge of the needs on the market this approach supports the societal actors in choosing different instruments to induce the intended transition to sustainability. (orig.)

  19. The selection of embedded computer using in the nuclear physics instruments

    International Nuclear Information System (INIS)

    Zhang Jianchuan; Nan Gangyang; Wang Yanyu; Su Hong

    2010-01-01

    It introduces the requirement for embedded PC and the benefits of using it in the experimental nuclear physics instrument developing and improving project. A cording to the specific requirements in the project of improving laboratory instruments. several kinds of embedded computer are compared and specifically tested. Thus, a x86 architecture embedded computer, which have ultra-low-power consumption and a small in size, is selected to be the main component of the controller using in the nuclear physics instrument, and this will be used in the high-speed data acquisition and electronic control system. (authors)

  20. Normal Forms for Fuzzy Logics: A Proof-Theoretic Approach

    Czech Academy of Sciences Publication Activity Database

    Cintula, Petr; Metcalfe, G.

    2007-01-01

    Roč. 46, č. 5-6 (2007), s. 347-363 ISSN 1432-0665 R&D Projects: GA MŠk(CZ) 1M0545 Institutional research plan: CEZ:AV0Z10300504 Keywords : fuzzy logic * normal form * proof theory * hypersequents Subject RIV: BA - General Mathematics Impact factor: 0.620, year: 2007

  1. Embedded mechatronic systems 1 analysis of failures, predictive reliability

    CERN Document Server

    El Hami, Abdelkhalak

    2015-01-01

    In operation, mechatronics embedded systems are stressed by loads of different causes: climate (temperature, humidity), vibration, electrical and electromagnetic. These stresses in components which induce failure mechanisms should be identified and modeled for better control. AUDACE is a collaborative project of the cluster Mov'eo that address issues specific to mechatronic reliability embedded systems. AUDACE means analyzing the causes of failure of components of mechatronic systems onboard. The goal of the project is to optimize the design of mechatronic devices by reliability. The projec

  2. Prospective Teachers' Conceptions of Proof Comprehension: Revisiting a Proof of the Pythagorean Theorem

    Science.gov (United States)

    Zazkis, Dov; Zazkis, Rina

    2016-01-01

    A significant body of research literature in mathematics education attends to mathematical proofs. However, scant research attends to proof comprehension, which is the focus of this study. We examine perspective secondary teachers' conceptions of what constitutes comprehension of a given proof and their ideas of how students' comprehension can be…

  3. Proofs, Upside Down

    DEFF Research Database (Denmark)

    Puech, Matthias

    2013-01-01

    this correspondence by applying a series of off-the-shelf program transformations à la Danvy et al. on a type checker for the bidirectional λ-calculus, and get a type checker for the λ¯ -calculus, the proof term assignment of LJT. This functional correspondence revisits the relationship between natural deduction......It is well known in proof theory that sequent-calculus proofs differ from natural deduction proofs by “reversing” elimination rules upside down into left introduction rules. It is also well known that to each recursive, functional program corresponds an equivalent iterative, accumulator......-passing program, where the accumulator stores the continuation of the iteration, in “reversed” order. Here, we compose these remarks and show that a restriction of the intuitionistic sequent calculus, LJT, is exactly an accumulator-passing version of intuitionistic natural deduction NJ. More precisely, we obtain...

  4. Tamper proofing of safeguards monitors

    International Nuclear Information System (INIS)

    Riley, R.J.

    1982-11-01

    The tamper proofing of safeguards monitors is essential if the data they produce is, and can be seen to be, reliable. This report discusses the problem of tamper proofing and gives guidance on when and how to apply tamper proofing techniques. The report is split into two parts. The first concerns the fundamental problem of how much tamper proofing to apply and the second describes methods of tamper proofing and discusses their usefulness. Both sections are applicable to all safeguards monitors although particular reference will be made to doorway monitors in some cases. The phrase 'tamper proofing' is somewhat misleading as it is impossible to completely tamper proof any device. Given enough time and resources, even the most elaborate tamper proofing can be overcome. In safeguards applications we are more interested in making the device tamper resistant and tamper indicating. That is, it should be able to resist a certain amount of tampering, and if tampering proves successful, that fact should be immediately obvious. Techniques of making a device tamper indicating and tamper resistant will be described below. The phrase tamper proofing will be used throughout this report as a generic term, including both tamper resistance and tamper indicating. (author)

  5. Programming Windows® Embedded CE 60 Developer Reference

    CERN Document Server

    Boling, Douglas

    2010-01-01

    Get the popular, practical reference to developing small footprint applications-now updated for the Windows Embedded CE 6.0 kernel. Written by an authority on embedded application development, this book focuses in on core operating concepts and the Win32 API. It delivers extensive code samples and sample projects-helping you build proficiency creating innovative Windows applications for a new generation of devices. Discover how to: Create complex applications designed for the unique requirements of embedded devicesManage virtual memory, heaps, and the stack to minimize your memory footprintC

  6. Proof patterns

    CERN Document Server

    Joshi, Mark

    2015-01-01

    This innovative textbook introduces a new pattern-based approach to learning proof methods in the mathematical sciences. Readers will discover techniques that will enable them to learn new proofs across different areas of pure mathematics with ease. The patterns in proofs from diverse fields such as algebra, analysis, topology and number theory are explored. Specific topics examined include game theory, combinatorics, and Euclidean geometry, enabling a broad familiarity. The author, an experienced lecturer and researcher renowned for his innovative view and intuitive style, illuminates a wide range of techniques and examples from duplicating the cube to triangulating polygons to the infinitude of primes to the fundamental theorem of algebra. Intended as a companion for undergraduate students, this text is an essential addition to every aspiring mathematician’s toolkit.

  7. Wireless and embedded carbon nanotube networks for damage detection in concrete structures

    International Nuclear Information System (INIS)

    Saafi, Mohamed

    2009-01-01

    Concrete structures undergo an uncontrollable damage process manifesting in the form of cracks due to the coupling of fatigue loading and environmental effects. In order to achieve long-term durability and performance, continuous health monitoring systems are needed to make critical decisions regarding operation, maintenance and repairs. Recent advances in nanostructured materials such as carbon nanotubes have opened the door for new smart and advanced sensing materials that could effectively be used in health monitoring of structures where wireless and real time sensing could provide information on damage development. In this paper, carbon nanotube networks were embedded into a cement matrix to develop an in situ wireless and embedded sensor for damage detection in concrete structures. By wirelessly measuring the change in the electrical resistance of the carbon nanotube networks, the progress of damage can be detected and monitored. As a proof of concept, wireless cement-carbon nanotube sensors were embedded into concrete beams and subjected to monotonic and cyclic loading to evaluate the effect of damage on their response. Experimental results showed that the wireless response of the embedded nanotube sensors changes due to the formation of cracks during loading. In addition, the nanotube sensors were able to detect the initiation of damage at an early stage of loading.

  8. Wireless and embedded carbon nanotube networks for damage detection in concrete structures

    Science.gov (United States)

    Saafi, Mohamed

    2009-09-01

    Concrete structures undergo an uncontrollable damage process manifesting in the form of cracks due to the coupling of fatigue loading and environmental effects. In order to achieve long-term durability and performance, continuous health monitoring systems are needed to make critical decisions regarding operation, maintenance and repairs. Recent advances in nanostructured materials such as carbon nanotubes have opened the door for new smart and advanced sensing materials that could effectively be used in health monitoring of structures where wireless and real time sensing could provide information on damage development. In this paper, carbon nanotube networks were embedded into a cement matrix to develop an in situ wireless and embedded sensor for damage detection in concrete structures. By wirelessly measuring the change in the electrical resistance of the carbon nanotube networks, the progress of damage can be detected and monitored. As a proof of concept, wireless cement-carbon nanotube sensors were embedded into concrete beams and subjected to monotonic and cyclic loading to evaluate the effect of damage on their response. Experimental results showed that the wireless response of the embedded nanotube sensors changes due to the formation of cracks during loading. In addition, the nanotube sensors were able to detect the initiation of damage at an early stage of loading.

  9. Applying a Real-Time PCR Assay for Histoplasma capsulatum to Clinically Relevant Formalin-Fixed Paraffin-Embedded Human Tissue

    Science.gov (United States)

    Koepsell, Scott A.; Hinrichs, Steven H.

    2012-01-01

    A real-time PCR assay to detect Histoplasma capsulatum in formalin-fixed, paraffin-embedded (FFPE) tissue is described. The assay had an analytical sensitivity of 6 pg/μl of fungal DNA, analytical specificity of 100%, and clinical sensitivity of 88.9%. This proof-of-concept study may aid in the diagnosis of histoplasmosis from FFPE tissue. PMID:22855519

  10. Linear embeddings of finite-dimensional subsets of Banach spaces into Euclidean spaces

    International Nuclear Information System (INIS)

    Robinson, James C

    2009-01-01

    This paper treats the embedding of finite-dimensional subsets of a Banach space B into finite-dimensional Euclidean spaces. When the Hausdorff dimension of X − X is finite, d H (X − X) k are injective on X. The proof motivates the definition of the 'dual thickness exponent', which is the key to proving that a prevalent set of such linear maps have Hölder continuous inverse when the box-counting dimension of X is finite and k > 2d B (X). A related argument shows that if the Assouad dimension of X − X is finite and k > d A (X − X), a prevalent set of such maps are bi-Lipschitz with logarithmic corrections. This provides a new result for compact homogeneous metric spaces via the Kuratowksi embedding of (X, d) into L ∞ (X)

  11. Embedded Librarians: Just-in-Time or Just-in-Case? A Research Study

    Science.gov (United States)

    Heathcock, Kristin

    2015-01-01

    Embedded librarians in online courses provide a wealth of service and information to students. Though students indicate that these services are valuable, the librarians providing embedded services frequently note that these projects are very time consuming. This study examines the provision of a less time-intensive model of embedded librarianship…

  12. PROOF on a Batch System

    International Nuclear Information System (INIS)

    Behrenhoff, W; Ehrenfeld, W; Samson, J; Stadie, H

    2011-01-01

    The 'parallel ROOT facility' (PROOF) from the ROOT framework provides a mechanism to distribute the load of interactive and non-interactive ROOT sessions on a set of worker nodes optimising the overall execution time. While PROOF is designed to work on a dedicated PROOF cluster, the benefits of PROOF can also be used on top of another batch scheduling system with the help of temporary per user PROOF clusters. We will present a lightweight tool which starts a temporary PROOF cluster on a SGE based batch cluster or, via a plugin mechanism, e.g. on a set of bare desktops via ssh. Further, we will present the result of benchmarks which compare the data throughput for different data storage back ends available at the German National Analysis Facility (NAF) at DESY.

  13. Timing Sunsets with Smartphones: Proof of Concept for a Citizen Science Project that Quantifies the Atmosphere and Supports Astronomical Observations

    Science.gov (United States)

    Wilson, Teresa; Kantamneni, A.; Bartlett, J. L.; Nemiroff, R. J.

    2014-01-01

    Current models that predict the times of sunrise and sunset are only accurate, typically, to a few minutes. Variations in atmospheric refraction contribute to the differences between computed and observed times. At high latitudes, slight changes in refraction can cause the Sun to remain continuously above the horizon instead of appearing to set. A substantial collection of observations would help constrain atmospheric models, which should, in turn, complement astronomical observations through improved understanding of air stability, refraction, and transparency. We report on a small project recording data from a few smartphones as a proof of concept for a possible larger scale citizen science effort.

  14. Lakatos and Hersh on Mathematical Proof

    Directory of Open Access Journals (Sweden)

    Hossein Bayat

    2015-12-01

    Full Text Available The concept of Mathematical Proof has been controversial for the past few decades. Different philosophers have offered different theories about the nature of Mathematical Proof, among which theories presented by Lakatos and Hersh have had significant similarities and differences with each other. It seems that a comparison and critical review of these two theories will lead to a better understanding of the concept of mathematical proof and will be a big step towards solving many related problems. Lakatos and Hersh argue that, firstly, “mathematical proof” has two different meanings, formal and informal; and, secondly, informal proofs are affected by human factors, such as individual decisions and collective agreements. I call these two thesis, respectively, “proof dualism” and “humanism”. But on the other hand, their theories have significant dissimilarities and are by no means equivalent. Lakatos is committed to linear proof dualism and methodological humanism, while Hersh’s theory involves some sort of parallel proof dualism and sociological humanism. According to linear proof dualism, the two main types of proofs are provided in order to achieve a common goal: incarnation of mathematical concepts and methods and truth. However, according to the parallel proof dualism, two main types of proofs are provided in order to achieve two different types of purposes: production of a valid sequence of signs (the goal of the formal proof and persuasion of the audience (the goal of the informal proof. Hersh’s humanism is informative and indicates pluralism; whereas, Lakatos’ version of humanism is normative and monistic.

  15. Embedded system of image storage based on fiber channel

    Science.gov (United States)

    Chen, Xiaodong; Su, Wanxin; Xing, Zhongbao; Wang, Hualong

    2008-03-01

    In domains of aerospace, aviation, aiming, and optic measure etc., the embedded system of imaging, processing and recording is absolutely necessary, which has small volume, high processing speed and high resolution. But the embedded storage technology becomes system bottleneck because of developing slowly. It is used to use RAID to promote storage speed, but it is unsuitable for the embedded system because of its big volume. Fiber channel (FC) technology offers a new method to develop the high-speed, portable storage system. In order to make storage subsystem meet the needs of high storage rate, make use of powerful Virtex-4 FPGA and high speed fiber channel, advance a project of embedded system of digital image storage based on Xilinx Fiber Channel Arbitrated Loop LogiCORE. This project utilizes Virtex- 4 RocketIO MGT transceivers to transmit the data serially, and connects many Fiber Channel hard drivers by using of Arbitrated Loop optionally. It can achieve 400MBps storage rate, breaks through the bottleneck of PCI interface, and has excellences of high-speed, real-time, portable and massive capacity.

  16. Embedded Systems Development Tools: A MODUS-oriented Market Overview

    Directory of Open Access Journals (Sweden)

    Loupis Michalis

    2014-03-01

    Full Text Available Background: The embedded systems technology has perhaps been the most dominating technology in high-tech industries, in the past decade. The industry has correctly identified the potential of this technology and has put its efforts into exploring its full potential. Objectives: The goal of the paper is to explore the versatility of the application in the embedded system development based on one FP7-SME project. Methods/Approach: Embedded applications normally demand high resilience and quality, as well as conformity to quality standards and rigid performance. As a result embedded system developers have adopted software methods that yield high quality. The qualitative approach to examining embedded systems development tools has been applied in this work. Results: This paper presents a MODUS-oriented market analysis in the domains of Formal Verification tools, HW/SW co-simulation tools, Software Performance Optimization tools and Code Generation tools. Conclusions: The versatility of applications this technology serves is amazing. With all this performance potential, the technology has carried with itself a large number of issues which the industry essentially needs to resolve to be able to harness the full potential contained. The MODUS project toolset addressed four discrete domains of the ESD Software Market, in which corresponding open tools were developed

  17. Technical solutions to enable embedded generation growth

    Energy Technology Data Exchange (ETDEWEB)

    Lynch, C.A.; Todd, S.; Millar, W.; Wood, H.S.

    2003-07-01

    This report describes the results of one of a series of studies commissioned by the UK Department of Trade and Industry into various aspects of embedded generation with the aim of supporting the development and deployment of electrical sources (particularly their ease of connection to the network) to deliver power to consumers. The first phase of the project involved a literature review and meetings with embedded generation developers and planning engineers from distribution network operators (DNOs). The second phase investigated embedded generation at different levels of the distribution network and included modelling a representative network. Technologies that could facilitate a significant increase in embedded generation were identified and estimates made of when and where significant development would be needed. Technical problems identified by DNOs were concerned with thermal loading, voltage regulation, fault levels, protection and network operation. A number of non-technical (commercial and regulatory) problems were also identified. The report describes the UK regulatory framework, the present situation, the British power system, the accommodation of embedded generation by established means, the representative model and technical innovations.

  18. Recovering an elastic obstacle containing embedded objects by the acoustic far-field measurements

    Science.gov (United States)

    Qu, Fenglong; Yang, Jiaqing; Zhang, Bo

    2018-01-01

    Consider the inverse scattering problem of time-harmonic acoustic waves by a 3D bounded elastic obstacle which may contain embedded impenetrable obstacles inside. We propose a novel and simple technique to show that the elastic obstacle can be uniquely recovered by the acoustic far-field pattern at a fixed frequency, disregarding its contents. Our method is based on constructing a well-posed modified interior transmission problem on a small domain and makes use of an a priori estimate for both the acoustic and elastic wave fields in the usual H 1-norm. In the case when there is no obstacle embedded inside the elastic body, our method gives a much simpler proof for the uniqueness result obtained previously in the literature (Natroshvili et al 2000 Rend. Mat. Serie VII 20 57-92 Monk and Selgas 2009 Inverse Problems Imaging 3 173-98).

  19. Dynamic temperature measurements with embedded optical sensors.

    Energy Technology Data Exchange (ETDEWEB)

    Dolan, Daniel H.,; Seagle, Christopher T; Ao, Tommy

    2013-10-01

    This report summarizes LDRD project number 151365, \\Dynamic Temperature Measurements with Embedded Optical Sensors". The purpose of this project was to develop an optical sensor capable of detecting modest temperature states (<1000 K) with nanosecond time resolution, a recurring diagnostic need in dynamic compression experiments at the Sandia Z machine. Gold sensors were selected because the visible re ectance spectrum of gold varies strongly with temperature. A variety of static and dynamic measurements were performed to assess re ectance changes at di erent temperatures and pressures. Using a minimal optical model for gold, a plausible connection between static calibrations and dynamic measurements was found. With re nements to the model and diagnostic upgrades, embedded gold sensors seem capable of detecting minor (<50 K) temperature changes under dynamic compression.

  20. ROPE: Recoverable Order-Preserving Embedding of Natural Language

    Energy Technology Data Exchange (ETDEWEB)

    Widemann, David P. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Wang, Eric X. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Thiagarajan, Jayaraman J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2016-02-11

    We present a novel Recoverable Order-Preserving Embedding (ROPE) of natural language. ROPE maps natural language passages from sparse concatenated one-hot representations to distributed vector representations of predetermined fixed length. We use Euclidean distance to return search results that are both grammatically and semantically similar. ROPE is based on a series of random projections of distributed word embeddings. We show that our technique typically forms a dictionary with sufficient incoherence such that sparse recovery of the original text is possible. We then show how our embedding allows for efficient and meaningful natural search and retrieval on Microsoft’s COCO dataset and the IMDB Movie Review dataset.

  1. Perturbation Theory of Embedded Eigenvalues

    DEFF Research Database (Denmark)

    Engelmann, Matthias

    project gives a general and systematic approach to analytic perturbation theory of embedded eigenvalues. The spectral deformation technique originally developed in the theory of dilation analytic potentials in the context of Schrödinger operators is systematized by the use of Mourre theory. The group...... of dilations is thereby replaced by the unitary group generated y the conjugate operator. This then allows to treat the perturbation problem with the usual Kato theory.......We study problems connected to perturbation theory of embedded eigenvalues in two different setups. The first part deals with second order perturbation theory of mass shells in massive translation invariant Nelson type models. To this end an expansion of the eigenvalues w.r.t. fiber parameter up...

  2. High School Students' Reasons for Their Science Dispositions: Community-Based Innovative Technology-Embedded Environmental Research Projects

    Science.gov (United States)

    Ebenezer, Jazlin; Kaya, Osman Nafiz; Kasab, Dimma

    2018-05-01

    The purpose of this investigation was to qualitatively describe high school students' reasons for their science dispositions (attitude, perception, and self-confidence) based on their long-term experience with innovative technology-embedded environmental research projects. Students in small groups conducted research projects in and out of school with the help of their teachers and community experts (scientists and engineers). During the 3-year period of this nationally funded project, a total of 135 students from five schools in a mid-west State participated in research activities. Of the 135 students, 53 students were individually interviewed to explore reasons for their science dispositions. Students' reasons for each disposition were grouped into categories, and corresponding frequency was converted to a percentage. The categories of reasons were not only attributed to the use of innovative technologies in environmental research but also the contexts and events that surrounded it. The reasons that influenced students' science dispositions positively were because engaging in environmental research projects with technology contributed to easing fear and difficulty, building a research team, disseminating findings, communicating with the community, researching with scientists, training by teachers, and acknowledging teachers' knowledge. These results advanced how and why students develop science dispositions in the positive direction, which are as follows: building science teacher capacity, developing a community of inquirers, and committing to improve pedagogical practices.

  3. Substitution Frege and extended Frege proof systems in non-classical logics

    Czech Academy of Sciences Publication Activity Database

    Jeřábek, Emil

    2009-01-01

    Roč. 159, č. 2 (2009), s. 1-48 ISSN 0168-0072 R&D Projects: GA AV ČR IAA1019401 Institutional research plan: CEZ:AV0Z10190503 Keywords : propositional proof complexity * Frege system * model logic Subject RIV: BA - General Mathematics Impact factor: 0.667, year: 2009

  4. Stork Color Proofing Technology

    Science.gov (United States)

    Ekman, C. Frederick

    1989-04-01

    For the past few years, Stork Colorproofing B.V. has been marketing an analog color proofing system in Europe based on electrophoto-graphic technology it pioneered for the purpose of high resolution, high fidelity color imaging in the field of the Graphic Arts. Based in part on this technology, it will make available on a commercial basis a digital color proofing system in 1989. Proofs from both machines will provide an exact reference for the user and will look, feel, and behave in a reproduction sense like the printed press sheet.

  5. Using Patterns for Multivariate Monitoring and Feedback Control of Linear Accelerator Performance: Proof-of-Concept Research

    International Nuclear Information System (INIS)

    Cordes, Gail Adele; Van Ausdeln, Leo Anthony; Velasquez, Maria Elena

    2002-01-01

    The report discusses preliminary proof-of-concept research for using the Advanced Data Validation and Verification System (ADVVS), a new INEEL software package, to add validation and verification and multivariate feedback control to the operation of non-destructive analysis (NDA) equipment. The software is based on human cognition, the recognition of patterns and changes in patterns in time-related data. The first project applied ADVVS to monitor operations of a selectable energy linear electron accelerator, and showed how the software recognizes in real time any deviations from the optimal tune of the machine. The second project extended the software method to provide model-based multivariate feedback control for the same linear electron accelerator. The projects successfully demonstrated proof-of-concept for the applications and focused attention on the common application of intelligent information processing techniques

  6. The Proof by Cases Property and its Variants in Structural Consequence Relations

    Czech Academy of Sciences Publication Activity Database

    Cintula, Petr; Noguera, Carles

    2013-01-01

    Roč. 101, č. 4 (2013), s. 713-747 ISSN 0039-3215 R&D Project s: GA MŠk(CZ) 1M0545 EU Project s: European Commission(XE) 247584 - MATOMUVI Institutional research plan: CEZ:AV0Z1030915 Institutional support: RVO:67985556 Keywords : Abstract Algebraic Logic * Generalized disjunction * Proof by cases properties * Consequence relations * Filter-distributive logics * Protoalgebraic logics Subject RIV: BA - General Mathematics Impact factor: 0.330, year: 2013

  7. The Proof by Cases Property and its Variants in Structural Consequence Relations

    Czech Academy of Sciences Publication Activity Database

    Cintula, Petr; Noguera, Carles

    2013-01-01

    Roč. 101, č. 4 (2013), s. 713-747 ISSN 0039-3215 R&D Projects: GA MŠk(CZ) 1M0545 EU Projects: European Commission(XE) 247584 - MATOMUVI Institutional research plan: CEZ:AV0Z1030915 Institutional support: RVO:67985556 Keywords : Abstract Algebraic Logic * Generalized disjunction * Proof by cases properties * Consequence relations * Filter-distributive logics * Protoalgebraic logics Subject RIV: BA - General Mathematics Impact factor: 0.330, year: 2013

  8. Proof assistants: History, ideas and future

    Indian Academy of Sciences (India)

    application is and will be in computer supported modelling and verification of sys- tems. But there is still ... Introduction ... compute with them, but their main focus is on doing proofs. ..... Proof development in a type theory based proof assistant.

  9. Prediction of breast cancer risk using a machine learning approach embedded with a locality preserving projection algorithm

    Science.gov (United States)

    Heidari, Morteza; Zargari Khuzani, Abolfazl; Hollingsworth, Alan B.; Danala, Gopichandh; Mirniaharikandehei, Seyedehnafiseh; Qiu, Yuchen; Liu, Hong; Zheng, Bin

    2018-02-01

    In order to automatically identify a set of effective mammographic image features and build an optimal breast cancer risk stratification model, this study aims to investigate advantages of applying a machine learning approach embedded with a locally preserving projection (LPP) based feature combination and regeneration algorithm to predict short-term breast cancer risk. A dataset involving negative mammograms acquired from 500 women was assembled. This dataset was divided into two age-matched classes of 250 high risk cases in which cancer was detected in the next subsequent mammography screening and 250 low risk cases, which remained negative. First, a computer-aided image processing scheme was applied to segment fibro-glandular tissue depicted on mammograms and initially compute 44 features related to the bilateral asymmetry of mammographic tissue density distribution between left and right breasts. Next, a multi-feature fusion based machine learning classifier was built to predict the risk of cancer detection in the next mammography screening. A leave-one-case-out (LOCO) cross-validation method was applied to train and test the machine learning classifier embedded with a LLP algorithm, which generated a new operational vector with 4 features using a maximal variance approach in each LOCO process. Results showed a 9.7% increase in risk prediction accuracy when using this LPP-embedded machine learning approach. An increased trend of adjusted odds ratios was also detected in which odds ratios increased from 1.0 to 11.2. This study demonstrated that applying the LPP algorithm effectively reduced feature dimensionality, and yielded higher and potentially more robust performance in predicting short-term breast cancer risk.

  10. Embedded Leverage

    DEFF Research Database (Denmark)

    Frazzini, Andrea; Heje Pedersen, Lasse

    find that asset classes with embedded leverage offer low risk-adjusted returns and, in the cross-section, higher embedded leverage is associated with lower returns. A portfolio which is long low-embedded-leverage securities and short high-embedded-leverage securities earns large abnormal returns...

  11. Safety-critical Java for embedded systems

    DEFF Research Database (Denmark)

    Schoeberl, Martin; Dalsgaard, Andreas Engelbredt; Hansen, René Rydhof

    2016-01-01

    This paper presents the motivation for and outcomes of an engineering research project on certifiable Javafor embedded systems. The project supports the upcoming standard for safety-critical Java, which defines asubset of Java and libraries aiming for development of high criticality systems....... The outcome of this projectinclude prototype safety-critical Java implementations, a time-predictable Java processor, analysis tools formemory safety, and example applications to explore the usability of safety-critical Java for this applicationarea. The text summarizes developments and key contributions...

  12. 46 CFR 201.144 - Offer of proof.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 8 2010-10-01 2010-10-01 false Offer of proof. 201.144 Section 201.144 Shipping... PROCEDURE Evidence (Rule 14) § 201.144 Offer of proof. An offer of proof made in connection with an... accompany the record as the offer of proof. ...

  13. Embedding potentials for excited states of embedded species

    International Nuclear Information System (INIS)

    Wesolowski, Tomasz A.

    2014-01-01

    Frozen-Density-Embedding Theory (FDET) is a formalism to obtain the upper bound of the ground-state energy of the total system and the corresponding embedded wavefunction by means of Euler-Lagrange equations [T. A. Wesolowski, Phys. Rev. A 77(1), 012504 (2008)]. FDET provides the expression for the embedding potential as a functional of the electron density of the embedded species, electron density of the environment, and the field generated by other charges in the environment. Under certain conditions, FDET leads to the exact ground-state energy and density of the whole system. Following Perdew-Levy theorem on stationary states of the ground-state energy functional, the other-than-ground-state stationary states of the FDET energy functional correspond to excited states. In the present work, we analyze such use of other-than-ground-state embedded wavefunctions obtained in practical calculations, i.e., when the FDET embedding potential is approximated. Three computational approaches based on FDET, that assure self-consistent excitation energy and embedded wavefunction dealing with the issue of orthogonality of embedded wavefunctions for different states in a different manner, are proposed and discussed

  14. Photothermal heating in metal-embedded microtools for material transport

    DEFF Research Database (Denmark)

    Villangca, Mark Jayson; Palima, Darwin; Banas, Andrew Rafael

    2016-01-01

    Material transport is an important mechanism in microfluidics and drug delivery. The methods and solutions found in literature involve passively diffusing structures, microneedles and chemically fueled structures. In this work, we make use of optically actuated microtools with embedded metal layer...... as heating element for controlled loading and release. The new microtools take advantage of the photothermal-induced convection current to load and unload cargo. We also discuss some challenges encountered in realizing a self-contained polymerized microtool. Microfluidic mixing, fluid flow control...... and convection currents have been demonstrated both experimentally and numerically for static metal thin films or passively floating nanoparticles. Here we show an integration of aforementioned functionalities in an opticallyfabricated and actuated microtool. As proof of concept, we demonstrate loading...

  15. Involving users in the development of embedded technology in construction

    DEFF Research Database (Denmark)

    Storgaard, Kresten; Buch-Hansen, Thomas Cornelius; Ærenlund, Lærke

    2011-01-01

    Based on a project about user driven innovation and embedded technology in construction (BIIB), the paper discusses methodological issues on user involvement. In the paper especially focus is on the experiences on involving users in collaborative development of scenarios, in the validation...... of scenarios and in developing innovative solutions on a conceptual level. The project discusses 1) concepts of users and 2) methods for collaborative involvement. The first discussion involves presentation of an extended user concept and a discussion of differences between lead users and need-advanced users....... The second discussion on collaborative involvement, discuss experiences with methods for communication across cultural and professional competences with reference to boundary objects, tangible systems and visualization. In the project four segments of situations for use of embedded technology in construction...

  16. RGLite, an interface between ROOT and gLite—proof on the grid

    Science.gov (United States)

    Malzacher, P.; Manafov, A.; Schwarz, K.

    2008-07-01

    Using the gLitePROOF package it is possible to perform PROOF-based distributed data analysis on the gLite Grid. The LHC experiments managed to run globally distributed Monte Carlo productions on the Grid, now the development of tools for data analysis is in the foreground. To grant access interfaces must be provided. The ROOT/PROOF framework is used as a starting point. Using abstract ROOT classes (TGrid, ...) interfaces can be implemented, via which Grid access from ROOT can be accomplished. A concrete implementation exists for the ALICE Grid environment AliEn. Within the D-Grid project an interface to the common Grid middleware of all LHC experiments, gLite, has been created. Therefore it is possible to query Grid File Catalogues from ROOT for the location of the data to be analysed. Grid jobs can be submitted into a gLite based Grid. The status of the jobs can be asked for, and their results can be obtained.

  17. RGLite, an interface between ROOT and gLite-proof on the grid

    International Nuclear Information System (INIS)

    Malzacher, P; Manafov, A; Schwarz, K

    2008-01-01

    Using the gLitePROOF package it is possible to perform PROOF-based distributed data analysis on the gLite Grid. The LHC experiments managed to run globally distributed Monte Carlo productions on the Grid, now the development of tools for data analysis is in the foreground. To grant access interfaces must be provided. The ROOT/PROOF framework is used as a starting point. Using abstract ROOT classes (TGrid, ...) interfaces can be implemented, via which Grid access from ROOT can be accomplished. A concrete implementation exists for the ALICE Grid environment AliEn. Within the D-Grid project an interface to the common Grid middleware of all LHC experiments, gLite, has been created. Therefore it is possible to query Grid File Catalogues from ROOT for the location of the data to be analysed. Grid jobs can be submitted into a gLite based Grid. The status of the jobs can be asked for, and their results can be obtained

  18. Final Technical Report for Quantum Embedding for Correlated Electronic Structure in Large Systems and the Condensed Phase

    Energy Technology Data Exchange (ETDEWEB)

    Chan, Garnet Kin-Lic [Princeton Univ., NJ (United States)

    2017-04-30

    This is the final technical report. We briefly describe some selected results below. Developments in density matrix embedding. DMET is a quantum embedding theory that we introduced at the beginning of the last funding period, around 2012-2013. Since the first DMET papers, which demonstrated proof-of- principle calculations on the Hubbard model and hydrogen rings, we have carried out a number of different developments, including: Extending the DMET technology to compute broken symmetry phases, including magnetic phases and super- conductivity (Pub. 13); Calibrating the accuracy of DMET and its cluster size convergence against other methods, and formulation of a dynamical cluster analog (Pubs. 4, 10) (see Fig. 1); Implementing DMET for ab-initio molecular calculations, and exploring different self-consistency criteria (Pubs. 9, 14); Using embedding to defi ne quantum classical interfaces Pub. 2; Formulating DMET for spectral functions (Pub. 7) (see Fig. 1); Extending DMET to coupled fermion-boson problems (Pub. 12). Together with these embedding developments, we have also implemented a wide variety of impurity solvers within our DMET framework, including DMRG (Pub. 3), AFQMC (Pub. 10), and coupled cluster theory (CC) (Pub. 9).

  19. 45 CFR 81.85 - Offer of proof.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Offer of proof. 81.85 Section 81.85 Public Welfare... 80 OF THIS TITLE Hearing Procedures § 81.85 Offer of proof. An offer of proof made in connection with... identification and shall accompany the record as the offer of proof. ...

  20. Introduction to proof in abstract mathematics

    CERN Document Server

    Wohlgemuth, Andrew

    2011-01-01

    The primary purpose of this undergraduate text is to teach students to do mathematical proofs. It enables readers to recognize the elements that constitute an acceptable proof, and it develops their ability to do proofs of routine problems as well as those requiring creative insights. The self-contained treatment features many exercises, problems, and selected answers, including worked-out solutions. Starting with sets and rules of inference, this text covers functions, relations, operation, and the integers. Additional topics include proofs in analysis, cardinality, and groups. Six appendixe

  1. Toward a Proof of Concept Cloud Framework for Physics Applications on Blue Gene Supercomputers

    International Nuclear Information System (INIS)

    Dreher, Patrick; Scullin, William; Vouk, Mladen

    2015-01-01

    Traditional high performance supercomputers are capable of delivering large sustained state-of-the-art computational resources to physics applications over extended periods of time using batch processing mode operating environments. However, today there is an increasing demand for more complex workflows that involve large fluctuations in the levels of HPC physics computational requirements during the simulations. Some of the workflow components may also require a richer set of operating system features and schedulers than normally found in a batch oriented HPC environment. This paper reports on progress toward a proof of concept design that implements a cloud framework onto BG/P and BG/Q platforms at the Argonne Leadership Computing Facility. The BG/P implementation utilizes the Kittyhawk utility and the BG/Q platform uses an experimental heterogeneous FusedOS operating system environment. Both platforms use the Virtual Computing Laboratory as the cloud computing system embedded within the supercomputer. This proof of concept design allows a cloud to be configured so that it can capitalize on the specialized infrastructure capabilities of a supercomputer and the flexible cloud configurations without resorting to virtualization. Initial testing of the proof of concept system is done using the lattice QCD MILC code. These types of user reconfigurable environments have the potential to deliver experimental schedulers and operating systems within a working HPC environment for physics computations that may be different from the native OS and schedulers on production HPC supercomputers. (paper)

  2. Impact- and earthquake- proof roof structure

    International Nuclear Information System (INIS)

    Shohara, Ryoichi.

    1990-01-01

    Building roofs are constituted with roof slabs, an earthquake proof layer at the upper surface thereof and an impact proof layer made of iron-reinforced concrete disposed further thereover. Since the roofs constitute an earthquake proof structure loading building dampers on the upper surface of the slabs by the concrete layer, seismic inputs of earthquakes to the buildings can be moderated and the impact-proof layer is formed, to ensure the safety to external conditions such as earthquakes or falling accidents of airplane in important facilities such as reactor buildings. (T.M.)

  3. GIS embedded hydrological modeling: the SID&GRID project

    Science.gov (United States)

    Borsi, I.; Rossetto, R.; Schifani, C.

    2012-04-01

    The SID&GRID research project, started April 2010 and funded by Regione Toscana (Italy) under the POR FSE 2007-2013, aims to develop a Decision Support System (DSS) for water resource management and planning based on open source and public domain solutions. In order to quantitatively assess water availability in space and time and to support the planning decision processes, the SID&GRID solution consists of hydrological models (coupling 3D existing and newly developed surface- and ground-water and unsaturated zone modeling codes) embedded in a GIS interface, applications and library, where all the input and output data are managed by means of DataBase Management System (DBMS). A graphical user interface (GUI) to manage, analyze and run the SID&GRID hydrological models based on open source gvSIG GIS framework (Asociación gvSIG, 2011) and a Spatial Data Infrastructure to share and interoperate with distributed geographical data is being developed. Such a GUI is thought as a "master control panel" able to guide the user from pre-processing spatial and temporal data, running the hydrological models, and analyzing the outputs. To achieve the above-mentioned goals, the following codes have been selected and are being integrated: 1. Postgresql/PostGIS (PostGIS, 2011) for the Geo Data base Management System; 2. gvSIG with Sextante (Olaya, 2011) geo-algorithm library capabilities and Grass tools (GRASS Development Team, 2011) for the desktop GIS; 3. Geoserver and Geonetwork to share and discover spatial data on the web according to Open Geospatial Consortium; 4. new tools based on the Sextante GeoAlgorithm framework; 5. MODFLOW-2005 (Harbaugh, 2005) groundwater modeling code; 6. MODFLOW-LGR (Mehl and Hill 2005) for local grid refinement; 7. VSF (Thoms et al., 2006) for the variable saturated flow component; 8. new developed routines for overland flow; 9. new algorithms in Jython integrated in gvSIG to compute the net rainfall rate reaching the soil surface, as input for

  4. Integrated Design Tools for Embedded Control Systems

    NARCIS (Netherlands)

    Jovanovic, D.S.; Hilderink, G.H.; Broenink, Johannes F.; Karelse, F.

    2001-01-01

    Currently, computer-based control systems are still being implemented using the same techniques as 10 years ago. The purpose of this project is the development of a design framework, consisting of tools and libraries, which allows the designer to build high reliable heterogeneous real-time embedded

  5. Embedded Systems

    Indian Academy of Sciences (India)

    Embedded system, micro-con- troller ... Embedded systems differ from general purpose computers in many ... Low cost: As embedded systems are extensively used in con- .... operating systems for the desktop computers where scheduling.

  6. ProofJudge: Automated Proof Judging Tool for Learning Mathematical Logic

    DEFF Research Database (Denmark)

    Villadsen, Jørgen

    2015-01-01

    Today we have software in many artefacts, from medical devices to cars and airplanes, and the software must not only be efficient and intelligent but also reliable and secure. Tests can show the presence of bugs but cannot guarantee their absence. A machine-checked proof using mathematical logic...... pen and paper because no adequate tool was available. The learning problem is how to make abstract concepts of logic as concrete as possible. ProofJudge is a computer system and teaching approach for teaching mathematical logic and automated reasoning which augments the e-learning tool NaDeA (Natural...

  7. ProofJudge: Automated Proof Judging Tool for Learning Mathematical Logic

    DEFF Research Database (Denmark)

    Villadsen, Jørgen

    2016-01-01

    Today we have software in many artefacts, from medical devices to cars and airplanes, and the software must not only be efficient and intelligent but also reliable and secure. Tests can show the presence of bugs but cannot guarantee their absence. A machine-checked proof using mathematical logic...... using pen and paper because no adequate tool was available. The learning problem is how to make abstract concepts of logic as concrete as possible. ProofJudge is a computer system and teaching approach for teaching mathematical logic and automated reasoning which augments the e-learning tool Na...

  8. Conceptualizing Embedded Configuration

    DEFF Research Database (Denmark)

    Oddsson, Gudmundur Valur; Hvam, Lars; Lysgaard, Ole

    2006-01-01

    and services. The general idea can be named embedded configuration. In this article we intend to conceptualize embedded configuration, what it is and is not. The difference between embedded configuration, sales configuration and embedded software is explained. We will look at what is needed to make embedded...... configuration systems. That will include requirements to product modelling techniques. An example with consumer electronics will illuminate the elements of embedded configuration in settings that most can relate to. The question of where embedded configuration would be relevant is discussed, and the current...

  9. Vibration-proof FBR type reactor

    International Nuclear Information System (INIS)

    Kawamura, Yutaka.

    1992-01-01

    In a reactor container in an FBR type reactor, an outer building and upper and lower portions of a reactor container are connected by a load transmission device made of a laminated material of rubber and steel plates. Each of the reactor container and the outer building is disposed on a lower raft disposed on a rock by way of a vibration-proof device made of a laminated material of rubber and steel plates. Vibration-proof elements for providing vertical eigen frequency of the vibration-proof system comprising the reactor building and the vibration-proof device within a range of 3Hz to 5Hz are used. That is, the peak of designed acceleration for response spectrum in the horizontal direction of the reactor structural portions is shifted to side of shorter period from the main frequency region of the reactor structure. Alternatively, rigidity of the vibration-proof elements is decreased to shift the peak to the side of long period from the main frequency region. Designed seismic force can be greatly reduced both horizontally and vertically, to reduce the wall thickness of the structural members, improve the plant economy and to ensure the safety against earthquakes. (N.H.)

  10. Web-based international knowledge exchange tool on urban resilience and climate proofing cities : climatescan

    NARCIS (Netherlands)

    Boogaard, Floris; Tipping, Jonathan; Muthanna, T.; Duffy, A.; Bendall, Barry; Kluck, Jeroen

    There is a wide diversity of projects undertaken to address urban resillience and climate proofing in the world. International knowledge exchange tools are evaluated with result: stakeholders demand tools that are interactive, open source and provide more detailed information (location, free photo

  11. HAMLET: HPCN Technology for Real-Time, Embedded Applications

    NARCIS (Netherlands)

    Mager, J.W.L.J.; Dam, A. ten

    1995-01-01

    Building an application by using HPCN technology makes the solution scalable and therefore more flexible. The uptake of HPCN technology for real-time, embedded applications, however, is severely hampered by the lack of real application development support. Within the Esprit project HAMLET,

  12. 38 CFR 18b.64 - Offer of proof.

    Science.gov (United States)

    2010-07-01

    ... 38 Pensions, Bonuses, and Veterans' Relief 2 2010-07-01 2010-07-01 false Offer of proof. 18b.64... Procedures § 18b.64 Offer of proof. An offer of proof made in connection with an objection taken to any... record as the offer of proof. ...

  13. Focused labeled proof systems for modal logic

    OpenAIRE

    Miller , Dale; Volpe , Marco

    2015-01-01

    International audience; Focused proofs are sequent calculus proofs that group inference rules into alternating positive and negative phases. These phases can then be used to define macro-level inference rules from Gentzen's original and tiny introduction and structural rules. We show here that the inference rules of labeled proof systems for modal logics can similarly be described as pairs of such phases within the LKF focused proof system for first-order classical logic. We consider the syst...

  14. Proust: A Nano Proof Assistant

    Directory of Open Access Journals (Sweden)

    Prabhakar Ragde

    2016-11-01

    Full Text Available Proust is a small Racket program offering rudimentary interactive assistance in the development of verified proofs for propositional and predicate logic. It is constructed in stages, some of which are done by students before using it to complete proof exercises, and in parallel with the study of its theoretical underpinnings, including elements of Martin-Lof type theory. The goal is twofold: to demystify some of the machinery behind full-featured proof assistants such as Coq and Agda, and to better integrate the study of formal logic with other core elements of an undergraduate computer science curriculum.

  15. Model-based design of adaptive embedded systems

    CERN Document Server

    Hamberg, Roelof; Reckers, Frans; Verriet, Jacques

    2013-01-01

    Today’s embedded systems have to operate in a wide variety of dynamically changing environmental circumstances. Adaptivity, the ability of a system to autonomously adapt itself, is a means to optimise a system’s behaviour to accommodate changes in its environment. It involves making in-product trade-offs between system qualities at system level. The main challenge in the development of adaptive systems is keeping control of the intrinsic complexity of such systems while working with multi-disciplinary teams to create different parts of the system. Model-Based Development of Adaptive Embedded Systems focuses on the development of adaptive embedded systems both from an architectural and methodological point of view. It describes architectural solution patterns for adaptive systems and state-of-the-art model-based methods and techniques to support adaptive system development. In particular, the book describes the outcome of the Octopus project, a cooperation of a multi-disciplinary team of academic and indus...

  16. Proof of the holographic formula for entanglement entropy

    International Nuclear Information System (INIS)

    Fursaev, Dmitri V.

    2006-01-01

    Entanglement entropy for a spatial partition of a quantum system is studied in theories which admit a dual description in terms of the anti-de Sitter (AdS) gravity one dimension higher. A general proof of the holographic formula which relates the entropy to the area of a codimension 2 minimal hypersurface embedded in the bulk AdS space is given. The entanglement entropy is determined by a partition function which is defined as a path integral over Riemannian AdS geometries with non-trivial boundary conditions. The topology of the Riemannian spaces puts restrictions on the choice of the minimal hypersurface for a given boundary conditions. The entanglement entropy is also considered in Randall-Sundrum braneworld models where its asymptotic expansion is derived when the curvature radius of the brane is much larger than the AdS radius. Special attention is paid to the geometrical structure of anomalous terms in the entropy in four dimensions. Modification of the holographic formula by the higher curvature terms in the bulk is briefly discussed

  17. Embedded Sensors and Controls to Improve Component Performance and Reliability: Conceptual Design Report

    Energy Technology Data Exchange (ETDEWEB)

    Kisner, Roger A [ORNL; Melin, Alexander M [ORNL; Burress, Timothy A [ORNL; Fugate, David L [ORNL; Holcomb, David Eugene [ORNL; Wilgen, John B [ORNL; Miller, John M [ORNL; Wilson, Dane F [ORNL; Silva, Pamela C [ORNL; Whitlow, Lynsie J [ORNL; Peretz, Fred J [ORNL

    2012-10-01

    The overall project objective is to demonstrate improved reliability and increased performance made possible by deeply embedding instrumentation and controls (I&C) in nuclear power plant components. The project is employing a highly instrumented canned rotor, magnetic bearing, fluoride salt pump as its I&C technology demonstration vehicle. The project s focus is not primarily on pump design, but instead is on methods to deeply embed I&C within a pump system. However, because the I&C is intimately part of the basic millisecond-by-millisecond functioning of the pump, the I&C design cannot proceed in isolation from the other aspects of the pump. The pump will not function if the characteristics of the I&C are not embedded within the design because the I&C enables performance of the basic function rather than merely monitoring quasi-stable performance. Traditionally, I&C has been incorporated in nuclear power plant (NPP) components after their design is nearly complete; adequate performance was obtained through over-design. This report describes the progress and status of the project and provides a conceptual design overview for the embedded I&C pump.

  18. Distributed analysis with PROOF in ATLAS collaboration

    International Nuclear Information System (INIS)

    Panitkin, S Y; Ernst, M; Ito, H; Maeno, T; Majewski, S; Rind, O; Tarrade, F; Wenaus, T; Ye, S; Benjamin, D; Montoya, G Carillo; Guan, W; Mellado, B; Xu, N; Cranmer, K; Shibata, A

    2010-01-01

    The Parallel ROOT Facility - PROOF is a distributed analysis system which allows to exploit inherent event level parallelism of high energy physics data. PROOF can be configured to work with centralized storage systems, but it is especially effective together with distributed local storage systems - like Xrootd, when data are distributed over computing nodes. It works efficiently on different types of hardware and scales well from a multi-core laptop to large computing farms. From that point of view it is well suited for both large central analysis facilities and Tier 3 type analysis farms. PROOF can be used in interactive or batch like regimes. The interactive regime allows the user to work with typically distributed data from the ROOT command prompt and get a real time feedback on analysis progress and intermediate results. We will discuss our experience with PROOF in the context of ATLAS Collaboration distributed analysis. In particular we will discuss PROOF performance in various analysis scenarios and in multi-user, multi-session environments. We will also describe PROOF integration with the ATLAS distributed data management system and prospects of running PROOF on geographically distributed analysis farms.

  19. Distributed analysis with PROOF in ATLAS collaboration

    Energy Technology Data Exchange (ETDEWEB)

    Panitkin, S Y; Ernst, M; Ito, H; Maeno, T; Majewski, S; Rind, O; Tarrade, F; Wenaus, T; Ye, S [Brookhaven National Laboratory, Upton, NY 11973 (United States); Benjamin, D [Duke University, Durham, NC 27708 (United States); Montoya, G Carillo; Guan, W; Mellado, B; Xu, N [University of Wisconsin-Madison, Madison, WI 53706 (United States); Cranmer, K; Shibata, A [New York University, New York, NY 10003 (United States)

    2010-04-01

    The Parallel ROOT Facility - PROOF is a distributed analysis system which allows to exploit inherent event level parallelism of high energy physics data. PROOF can be configured to work with centralized storage systems, but it is especially effective together with distributed local storage systems - like Xrootd, when data are distributed over computing nodes. It works efficiently on different types of hardware and scales well from a multi-core laptop to large computing farms. From that point of view it is well suited for both large central analysis facilities and Tier 3 type analysis farms. PROOF can be used in interactive or batch like regimes. The interactive regime allows the user to work with typically distributed data from the ROOT command prompt and get a real time feedback on analysis progress and intermediate results. We will discuss our experience with PROOF in the context of ATLAS Collaboration distributed analysis. In particular we will discuss PROOF performance in various analysis scenarios and in multi-user, multi-session environments. We will also describe PROOF integration with the ATLAS distributed data management system and prospects of running PROOF on geographically distributed analysis farms.

  20. Complex proofs of real theorems

    CERN Document Server

    Lax, Peter D

    2011-01-01

    Complex Proofs of Real Theorems is an extended meditation on Hadamard's famous dictum, "The shortest and best way between two truths of the real domain often passes through the imaginary one." Directed at an audience acquainted with analysis at the first year graduate level, it aims at illustrating how complex variables can be used to provide quick and efficient proofs of a wide variety of important results in such areas of analysis as approximation theory, operator theory, harmonic analysis, and complex dynamics. Topics discussed include weighted approximation on the line, Müntz's theorem, Toeplitz operators, Beurling's theorem on the invariant spaces of the shift operator, prediction theory, the Riesz convexity theorem, the Paley-Wiener theorem, the Titchmarsh convolution theorem, the Gleason-Kahane-Żelazko theorem, and the Fatou-Julia-Baker theorem. The discussion begins with the world's shortest proof of the fundamental theorem of algebra and concludes with Newman's almost effortless proof of the prime ...

  1. [Design of an embedded stroke rehabilitation apparatus system based on Linux computer engineering].

    Science.gov (United States)

    Zhuang, Pengfei; Tian, XueLong; Zhu, Lin

    2014-04-01

    A realizaton project of electrical stimulator aimed at motor dysfunction of stroke is proposed in this paper. Based on neurophysiological biofeedback, this system, using an ARM9 S3C2440 as the core processor, integrates collection and display of surface electromyography (sEMG) signal, as well as neuromuscular electrical stimulation (NMES) into one system. By embedding Linux system, the project is able to use Qt/Embedded as a graphical interface design tool to accomplish the design of stroke rehabilitation apparatus. Experiments showed that this system worked well.

  2. Introduction to Embedded Systems Using ANSI C and the Arduino Development Environment

    CERN Document Server

    Russell, David

    2010-01-01

    Many electrical and computer engineering projects involve some kind of embedded system in which a microcontroller sits at the center as the primary source of control. The recently-developed Arduino development platform includes an inexpensive hardware development board hosting an eight-bit ATMEL ATmega-family processor and a Java-based software-development environment. These features allow an embedded systems beginner the ability to focus their attention on learning how to write embedded software instead of wasting time overcoming the engineering CAD tools learning curve. The goal of this text

  3. From Inductive Reasoning to Proof

    Science.gov (United States)

    Yopp, David A.

    2009-01-01

    Mathematical proof is an expression of deductive reasoning (drawing conclusions from previous assertions). However, it is often inductive reasoning (conclusions drawn on the basis of examples) that helps learners form their deductive arguments, or proof. In addition, not all inductive arguments generate more formal arguments. This article draws a…

  4. Designing flexible engineering systems utilizing embedded architecture options

    Science.gov (United States)

    Pierce, Jeff G.

    This dissertation develops and applies an integrated framework for embedding flexibility in an engineered system architecture. Systems are constantly faced with unpredictability in the operational environment, threats from competing systems, obsolescence of technology, and general uncertainty in future system demands. Current systems engineering and risk management practices have focused almost exclusively on mitigating or preventing the negative consequences of uncertainty. This research recognizes that high uncertainty also presents an opportunity to design systems that can flexibly respond to changing requirements and capture additional value throughout the design life. There does not exist however a formalized approach to designing appropriately flexible systems. This research develops a three stage integrated flexibility framework based on the concept of architecture options embedded in the system design. Stage One defines an eight step systems engineering process to identify candidate architecture options. This process encapsulates the operational uncertainty though scenario development, traces new functional requirements to the affected design variables, and clusters the variables most sensitive to change. The resulting clusters can generate insight into the most promising regions in the architecture to embed flexibility in the form of architecture options. Stage Two develops a quantitative option valuation technique, grounded in real options theory, which is able to value embedded architecture options that exhibit variable expiration behavior. Stage Three proposes a portfolio optimization algorithm, for both discrete and continuous options, to select the optimal subset of architecture options, subject to budget and risk constraints. Finally, the feasibility, extensibility and limitations of the framework are assessed by its application to a reconnaissance satellite system development problem. Detailed technical data, performance models, and cost estimates

  5. Potential Functional Embedding Theory at the Correlated Wave Function Level. 2. Error Sources and Performance Tests.

    Science.gov (United States)

    Cheng, Jin; Yu, Kuang; Libisch, Florian; Dieterich, Johannes M; Carter, Emily A

    2017-03-14

    Quantum mechanical embedding theories partition a complex system into multiple spatial regions that can use different electronic structure methods within each, to optimize trade-offs between accuracy and cost. The present work incorporates accurate but expensive correlated wave function (CW) methods for a subsystem containing the phenomenon or feature of greatest interest, while self-consistently capturing quantum effects of the surroundings using fast but less accurate density functional theory (DFT) approximations. We recently proposed two embedding methods [for a review, see: Acc. Chem. Res. 2014 , 47 , 2768 ]: density functional embedding theory (DFET) and potential functional embedding theory (PFET). DFET provides a fast but non-self-consistent density-based embedding scheme, whereas PFET offers a more rigorous theoretical framework to perform fully self-consistent, variational CW/DFT calculations [as defined in part 1, CW/DFT means subsystem 1(2) is treated with CW(DFT) methods]. When originally presented, PFET was only tested at the DFT/DFT level of theory as a proof of principle within a planewave (PW) basis. Part 1 of this two-part series demonstrated that PFET can be made to work well with mixed Gaussian type orbital (GTO)/PW bases, as long as optimized GTO bases and consistent electron-ion potentials are employed throughout. Here in part 2 we conduct the first PFET calculations at the CW/DFT level and compare them to DFET and full CW benchmarks. We test the performance of PFET at the CW/DFT level for a variety of types of interactions (hydrogen bonding, metallic, and ionic). By introducing an intermediate CW/DFT embedding scheme denoted DFET/PFET, we show how PFET remedies different types of errors in DFET, serving as a more robust type of embedding theory.

  6. 2nd International Conference on Proof-Theoretic Semantics

    CERN Document Server

    Schroeder-Heister, Peter

    2016-01-01

    This volume is the first ever collection devoted to the field of proof-theoretic semantics. Contributions address topics including the systematics of introduction and elimination rules and proofs of normalization, the categorial characterization of deductions, the relation between Heyting's and Gentzen's approaches to meaning, knowability paradoxes, proof-theoretic foundations of set theory, Dummett's justification of logical laws, Kreisel's theory of constructions, paradoxical reasoning, and the defence of model theory. The field of proof-theoretic semantics has existed for almost 50 years, but the term itself was proposed by Schroeder-Heister in the 1980s. Proof-theoretic semantics explains the meaning of linguistic expressions in general and of logical constants in particular in terms of the notion of proof. This volume emerges from presentations at the Second International Conference on Proof-Theoretic Semantics in Tübingen in 2013, where contributing authors were asked to provide a self-contained descri...

  7. Proviola: a tool for proof re-animation

    NARCIS (Netherlands)

    Tankink, C.; Geuvers, J.H.; McKinna, J.; Wiedijk, F.; Autexier, S.; Calmet, J.; Delahaye, D.; Ion, P.D.F.; Rideau, L.; Rioboo, R.; Sexton, A.P.

    2010-01-01

    To improve on existing models of interaction with a proof assistant (PA), in particular for storage and replay of proofs, we introduce three related concepts, those of: a proof movie, consisting of frames which record both user input and the corresponding PA response; a camera, which films a user’s

  8. Short proofs of strong normalization

    OpenAIRE

    Wojdyga, Aleksander

    2008-01-01

    This paper presents simple, syntactic strong normalization proofs for the simply-typed lambda-calculus and the polymorphic lambda-calculus (system F) with the full set of logical connectives, and all the permutative reductions. The normalization proofs use translations of terms and types to systems, for which strong normalization property is known.

  9. Sustainability in the built environment using embedded technology

    DEFF Research Database (Denmark)

    Buch-Hansen, Thomas Cornelius; Storgaard, Kresten; Ærenlund, Lærke

    2011-01-01

    designated Open Built Source products (OBS), by applying two principle: compatibility and reuse of building products with embedded technology. The project is carried out by DI and SBi and involves 30 firms namely building materials manufacturers and IT developer companies. The methods used in the User...

  10. Sharp Embeddings of Besov Spaces with Logarithmic Smoothness

    Czech Academy of Sciences Publication Activity Database

    Gurka, P.; Opic, Bohumír

    2005-01-01

    Roč. 18, č. 1 (2005), s. 81-110 ISSN 1139-1138 R&D Projects: GA ČR(CZ) GA201/01/0333 Institutional research plan: CEZ:AV0Z10190503 Keywords : Besov spaces wirh logarithmic smoothness * Lorentz-Zygmund spaces * sharp embeddings Subject RIV: BA - General Mathematics

  11. The Hodge theory of projective manifolds

    CERN Document Server

    de Cataldo, Mark Andrea

    2007-01-01

    This book is a written-up and expanded version of eight lectures on the Hodge theory of projective manifolds. It assumes very little background and aims at describing how the theory becomes progressively richer and more beautiful as one specializes from Riemannian, to Kähler, to complex projective manifolds. Though the proof of the Hodge Theorem is omitted, its consequences - topological, geometrical and algebraic - are discussed at some length. The special properties of complex projective manifolds constitute an important body of knowledge and readers are guided through it with the help of selected exercises. Despite starting with very few prerequisites, the concluding chapter works out, in the meaningful special case of surfaces, the proof of a special property of maps between complex projective manifolds, which was discovered only quite recently.

  12. 49 CFR 604.43 - Offer of proof.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 7 2010-10-01 2010-10-01 false Offer of proof. 604.43 Section 604.43..., DEPARTMENT OF TRANSPORTATION CHARTER SERVICE Hearings. § 604.43 Offer of proof. A party whose evidence has... respond to the offer of proof, may offer the evidence on the record when filing an appeal. ...

  13. 36 CFR 1150.79 - Offer of proof.

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false Offer of proof. 1150.79... BOARD PRACTICE AND PROCEDURES FOR COMPLIANCE HEARINGS Hearing Procedures § 1150.79 Offer of proof. An offer of proof made in connection with an objection taken to a ruling of the judge rejecting or...

  14. A novel tri-axis MEMS gyroscope with in-plane tetra-pendulum proof masses and enhanced sensitive springs

    International Nuclear Information System (INIS)

    Wang, M C; Jiao, J W; Yan, P L; Mi, B W; Qin, S

    2014-01-01

    This paper presents a tri-axis MEMS gyroscope design with novel tetra-pendulum proof masses for X-, Y-axis and regular proof masses for Z-axis rate sensing, which are all coupled with and embedded in a conventional tuning fork driving frame. The four pendulum proof masses are suspended via the torsional springs to a common center anchor and can be driven to swing around the anchor via the tilted transforming springs as the driving frame is oscillated in an anti-phase mode. As an X-, Y-axis angular rate is applied, the tetra-pendulum proof masses will rotate around the torsional springs in pairs for X- and Y-axis differential sensing, respectively. In particular, we investigated the relationship between the tilting angle of the transforming spring and its transforming efficiency, i.e. the amplitude ratio of the pendulum's swing to the driving oscillation, which shows a straight impact on the sensitivity. By theoretical analysis and Ansys simulation, we achieved an optimal tilting angle of 22.5°, which extends along the angular bisector of the pendulum's and driving mass’ moving direction and demonstrates a significant increase in transforming efficiency by about 40%, compared with the trivial tilting angle of 45°. By employing an SOI-based bulk micromachining process, the prototype device with the optimal design of the transforming spring (type I) and that with the trivial design (type II) for reference have been successfully fabricated. As expected, the testing results indicate an increase of more than 20% in the X- and Y- sensitivities, which is mainly from the enhanced sensitive transforming springs. (paper)

  15. ATAC Process Proof of Concept Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston; Sarah Freeman

    2014-03-01

    Researchers at INL with funding from the Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) evaluated a novel approach for near real-time consumption of threat intelligence. Demonstration testing in an industry environment supported the development of this new process to assist the electric sector in securing their critical networks. This report provides the reader with an understanding of the methods used during this proof of concept project. The processes and templates were further advanced with an industry partner during an onsite assessment. This report concludes with lessons learned and a roadmap for final development of these materials for use by industry.

  16. A backing device based on an embedded stiffener and retractable insertion tool for thin-film cochlear arrays

    Science.gov (United States)

    Tewari, Radheshyam

    Intracochlear trauma from surgical insertion of bulky electrode arrays and inadequate pitch perception are areas of concern with current hand-assembled commercial cochlear implants. Parylene thin-film arrays with higher electrode densities and lower profiles are a potential solution, but lack rigidity and hence depend on manually fabricated permanently attached polyethylene terephthalate (PET) tubing based bulky backing devices. As a solution, we investigated a new backing device with two sub-systems. The first sub-system is a thin poly(lactic acid) (PLA) stiffener that will be embedded in the parylene array. The second sub-system is an attaching and detaching mechanism, utilizing a poly(N-vinylpyrrolidone)-block-poly(d,l-lactide) (PVP-b-PDLLA) copolymer-based biodegradable and water soluble adhesive, that will help to retract the PET insertion tool after implantation. As a proof-of-concept of sub-system one, a microfabrication process for patterning PLA stiffeners embedded in parylene has been developed. Conventional hot-embossing, mechanical micromachining, and standard cleanroom processes were integrated for patterning fully released and discrete stiffeners coated with parylene. The released embedded stiffeners were thermoformed to demonstrate that imparting perimodiolar shapes to stiffener-embedded arrays will be possible. The developed process when integrated with the array fabrication process will allow fabrication of stiffener-embedded arrays in a single process. As a proof-of-concept of sub-system two, the feasibility of the attaching and detaching mechanism was demonstrated by adhering 1x and 1.5x scale PET tube-based insertion tools and PLA stiffeners embedded in parylene using the copolymer adhesive. The attached devices survived qualitative adhesion tests, thermoforming, and flexing. The viability of the detaching mechanism was tested by aging the assemblies in-vitro in phosphate buffer solution. The average detachment times, 2.6 minutes and 10 minutes

  17. Integrating PROOF Analysis in Cloud and Batch Clusters

    International Nuclear Information System (INIS)

    Rodríguez-Marrero, Ana Y; Fernández-del-Castillo, Enol; López García, Álvaro; Marco de Lucas, Jesús; Matorras Weinig, Francisco; González Caballero, Isidro; Cuesta Noriega, Alberto

    2012-01-01

    High Energy Physics (HEP) analysis are becoming more complex and demanding due to the large amount of data collected by the current experiments. The Parallel ROOT Facility (PROOF) provides researchers with an interactive tool to speed up the analysis of huge volumes of data by exploiting parallel processing on both multicore machines and computing clusters. The typical PROOF deployment scenario is a permanent set of cores configured to run the PROOF daemons. However, this approach is incapable of adapting to the dynamic nature of interactive usage. Several initiatives seek to improve the use of computing resources by integrating PROOF with a batch system, such as Proof on Demand (PoD) or PROOF Cluster. These solutions are currently in production at Universidad de Oviedo and IFCA and are positively evaluated by users. Although they are able to adapt to the computing needs of users, they must comply with the specific configuration, OS and software installed at the batch nodes. Furthermore, they share the machines with other workloads, which may cause disruptions in the interactive service for users. These limitations make PROOF a typical use-case for cloud computing. In this work we take profit from Cloud Infrastructure at IFCA in order to provide a dynamic PROOF environment where users can control the software configuration of the machines. The Proof Analysis Framework (PAF) facilitates the development of new analysis and offers a transparent access to PROOF resources. Several performance measurements are presented for the different scenarios (PoD, SGE and Cloud), showing a speed improvement closely correlated with the number of cores used.

  18. Report for slot cutter proof-of-principle test, Buried Waste Containment System project. Revision 1

    International Nuclear Information System (INIS)

    1998-01-01

    Several million cubic feet of hazardous and radioactive waste was buried in shallow pits and trenches within many US Department of Energy (US DOE) sites. The pits and trenches were constructed similarly to municipal landfills with both stacked and random dump waste forms such as barrels and boxes. Many of the hazardous materials in these waste sites are migrating into groundwater systems through plumes and leaching. On-site containment is one of the options being considered for prevention of waste migration. This report describes the results of a proof-of-principle test conducted to demonstrate technology for containing waste. This proof-of-principle test, conducted at the RAHCO International, Inc., facility in the summer of 1997, evaluated equipment techniques for cutting a horizontal slot beneath an existing waste site. The slot would theoretically be used by complementary equipment designed to place a cement barrier under the waste. The technology evaluated consisted of a slot cutting mechanism, muck handling system, thrust system, and instrumentation. Data were gathered and analyzed to evaluate the performance parameters

  19. Report for slot cutter proof-of-principle test, Buried Waste Containment System project. Revision 1

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1998-05-21

    Several million cubic feet of hazardous and radioactive waste was buried in shallow pits and trenches within many US Department of Energy (US DOE) sites. The pits and trenches were constructed similarly to municipal landfills with both stacked and random dump waste forms such as barrels and boxes. Many of the hazardous materials in these waste sites are migrating into groundwater systems through plumes and leaching. On-site containment is one of the options being considered for prevention of waste migration. This report describes the results of a proof-of-principle test conducted to demonstrate technology for containing waste. This proof-of-principle test, conducted at the RAHCO International, Inc., facility in the summer of 1997, evaluated equipment techniques for cutting a horizontal slot beneath an existing waste site. The slot would theoretically be used by complementary equipment designed to place a cement barrier under the waste. The technology evaluated consisted of a slot cutting mechanism, muck handling system, thrust system, and instrumentation. Data were gathered and analyzed to evaluate the performance parameters.

  20. The on-board tailpipe emissions measurement system (TOTEMS) : proof\\0x2010 of\\0x2010concept.

    Science.gov (United States)

    2009-06-03

    An on-board tailpipe emissions instrumentation system was designed, assembled and tested as proof-of-concept : for the University of Vermonts Transportation Research Center (TRC) Signature Project #2 real-world vehicle : emissions data colle...

  1. 34 CFR 101.85 - Offer of proof.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Offer of proof. 101.85 Section 101.85 Education... PRACTICE AND PROCEDURE FOR HEARINGS UNDER PART 100 OF THIS TITLE Hearing Procedures § 101.85 Offer of proof. An offer of proof made in connection with an objection taken to any ruling of the presiding officer...

  2. 7 CFR 15.122 - Offer of proof.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Offer of proof. 15.122 Section 15.122 Agriculture..., Decisions and Administrative Review Under the Civil Rights Act of 1964 Hearing Procedures § 15.122 Offer of proof. An offer of proof made in connection with an objection taken to any ruling of the hearing officer...

  3. 43 CFR 4.840 - Offer of proof.

    Science.gov (United States)

    2010-10-01

    ... the Interior-Effectuation of Title VI of the Civil Rights Act of 1964 Hearing § 4.840 Offer of proof. An offer of proof made in connection with an objection taken to any ruling of the administrative law... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Offer of proof. 4.840 Section 4.840 Public...

  4. An Architecture for Proof Planning Systems

    OpenAIRE

    Dennis, Louise Abigail

    2005-01-01

    This paper presents a generic architecture for proof planning systems in terms of an interaction between a customisable proof module and search module. These refer to both global and local information contained in reasoning states.

  5. The Proof is in the Pudding The Changing Nature of Mathematical Proof

    CERN Document Server

    Krantz, Steven G

    2011-01-01

    This text explores the many transformations that the mathematical proof has undergone from its inception to its versatile, present-day use, considering the advent of high-speed computing machines. Though there are many truths to be discovered in this book, by the end it is clear that there is no formalized approach or standard method of discovery to date. Most of the proofs are discussed in detail with figures and equations accompanying them, allowing both the professional mathematician and those less familiar with mathematics to derive the same joy from reading this book.

  6. Imparting functionality to biocatalysts via embedding enzymes into nanoporous materials by a de novo approach: size-selective sheltering of catalase in metal-organic framework microcrystals.

    Science.gov (United States)

    Shieh, Fa-Kuen; Wang, Shao-Chun; Yen, Chia-I; Wu, Chang-Cheng; Dutta, Saikat; Chou, Lien-Yang; Morabito, Joseph V; Hu, Pan; Hsu, Ming-Hua; Wu, Kevin C-W; Tsung, Chia-Kuang

    2015-04-08

    We develop a new concept to impart new functions to biocatalysts by combining enzymes and metal-organic frameworks (MOFs). The proof-of-concept design is demonstrated by embedding catalase molecules into uniformly sized ZIF-90 crystals via a de novo approach. We have carried out electron microscopy, X-ray diffraction, nitrogen sorption, electrophoresis, thermogravimetric analysis, and confocal microscopy to confirm that the ~10 nm catalase molecules are embedded in 2 μm single-crystalline ZIF-90 crystals with ~5 wt % loading. Because catalase is immobilized and sheltered by the ZIF-90 crystals, the composites show activity in hydrogen peroxide degradation even in the presence of protease proteinase K.

  7. Embedded Web Technology: Applying World Wide Web Standards to Embedded Systems

    Science.gov (United States)

    Ponyik, Joseph G.; York, David W.

    2002-01-01

    Embedded Systems have traditionally been developed in a highly customized manner. The user interface hardware and software along with the interface to the embedded system are typically unique to the system for which they are built, resulting in extra cost to the system in terms of development time and maintenance effort. World Wide Web standards have been developed in the passed ten years with the goal of allowing servers and clients to intemperate seamlessly. The client and server systems can consist of differing hardware and software platforms but the World Wide Web standards allow them to interface without knowing about the details of system at the other end of the interface. Embedded Web Technology is the merging of Embedded Systems with the World Wide Web. Embedded Web Technology decreases the cost of developing and maintaining the user interface by allowing the user to interface to the embedded system through a web browser running on a standard personal computer. Embedded Web Technology can also be used to simplify an Embedded System's internal network.

  8. Parallel interactive data analysis with PROOF

    International Nuclear Information System (INIS)

    Ballintijn, Maarten; Biskup, Marek; Brun, Rene; Canal, Philippe; Feichtinger, Derek; Ganis, Gerardo; Kickinger, Guenter; Peters, Andreas; Rademakers, Fons

    2006-01-01

    The Parallel ROOT Facility, PROOF, enables the analysis of much larger data sets on a shorter time scale. It exploits the inherent parallelism in data of uncorrelated events via a multi-tier architecture that optimizes I/O and CPU utilization in heterogeneous clusters with distributed storage. The system provides transparent and interactive access to gigabytes today. Being part of the ROOT framework PROOF inherits the benefits of a performant object storage system and a wealth of statistical and visualization tools. This paper describes the data analysis model of ROOT and the latest developments on closer integration of PROOF into that model and the ROOT user environment, e.g. support for PROOF-based browsing of trees stored remotely, and the popular TTree::Draw() interface. We also outline the ongoing developments aimed to improve the flexibility and user-friendliness of the system

  9. ETHERNET BASED EMBEDDED SYSTEM FOR FEL DIAGNOSTICS AND CONTROLS

    International Nuclear Information System (INIS)

    Jianxun Yan; Daniel Sexton; Steven Moore; Albert Grippo; Kevin Jordan

    2006-01-01

    An Ethernet based embedded system has been developed to upgrade the Beam Viewer and Beam Position Monitor (BPM) systems within the free-electron laser (FEL) project at Jefferson Lab. The embedded microcontroller was mounted on the front-end I/O cards with software packages such as Experimental Physics and Industrial Control System (EPICS) and Real Time Executive for Multiprocessor System (RTEMS) running as an Input/Output Controller (IOC). By cross compiling with the EPICS, the RTEMS kernel, IOC device supports, and databases all of these can be downloaded into the microcontroller. The first version of the BPM electronics based on the embedded controller was built and is currently running in our FEL system. The new version of BPM that will use a Single Board IOC (SBIOC), which integrates with an Field Programming Gate Array (FPGA) and a ColdFire embedded microcontroller, is presently under development. The new system has the features of a low cost IOC, an open source real-time operating system, plug and play-like ease of installation and flexibility, and provides a much more localized solution

  10. Why prove it again? alternative proofs in mathematical practice

    CERN Document Server

    Dawson, Jr , John W

    2015-01-01

    This monograph considers several well-known mathematical theorems and asks the question, “Why prove it again?” while examining alternative proofs.   It  explores the different rationales mathematicians may have for pursuing and presenting new proofs of previously established results, as well as how they judge whether two proofs of a given result are different.  While a number of books have examined alternative proofs of individual theorems, this is the first that presents comparative case studies of other methods for a variety of different theorems. The author begins by laying out the criteria for distinguishing among proofs and enumerates reasons why new proofs have, for so long, played a prominent role in mathematical practice.  He then outlines various purposes that alternative proofs may serve.  Each chapter that follows provides a detailed case study of alternative proofs for particular theorems, including the Pythagorean Theorem, the Fundamental Theorem of Arithmetic, Desargues’ Theorem, the...

  11. Two proofs of Fine's theorem

    International Nuclear Information System (INIS)

    Halliwell, J.J.

    2014-01-01

    Fine's theorem concerns the question of determining the conditions under which a certain set of probabilities for pairs of four bivalent quantities may be taken to be the marginals of an underlying probability distribution. The eight CHSH inequalities are well-known to be necessary conditions, but Fine's theorem is the striking result that they are also sufficient conditions. Here two transparent and self-contained proofs of Fine's theorem are presented. The first is a physically motivated proof using an explicit local hidden variables model. The second is an algebraic proof which uses a representation of the probabilities in terms of correlation functions. - Highlights: • A discussion of the various approaches to proving Fine's theorem. • A new physically-motivated proof using a local hidden variables model. • A new algebraic proof. • A new form of the CHSH inequalities

  12. Embedded, everywhere: a research agenda for networked systems of embedded computers

    National Research Council Canada - National Science Library

    Committee on Networked Systems of Embedded Computers; National Research Council Staff; Division on Engineering and Physical Sciences; Computer Science and Telecommunications Board; National Academy of Sciences

    2001-01-01

    .... Embedded, Everywhere explores the potential of networked systems of embedded computers and the research challenges arising from embedding computation and communications technology into a wide variety of applicationsâ...

  13. Idaho National Engineering and Environmental Laboratory Environmental Technologies Proof-of-Concepts. Final report FY-96

    Energy Technology Data Exchange (ETDEWEB)

    Barrie, S.L.; Carpenter, G.S.; Crockett, A.B. [and others

    1997-04-01

    The Idaho National Engineering and Environmental Laboratory Environmental Technologies Proof-of-Concept Project was initiated for the expedited development of new or conceptual technologies in support of groundwater fate, transport, and remediation; buried waste characterization, retrieval, and treatment; waste minimization/pollution prevention; and spent fuel handling and storage. In Fiscal Year 1996, The Idaho National Engineering and Environmental Laboratory proposed 40 development projects and the Department of Energy funded 15. The projects proved the concepts of the various technologies, and all the technologies contribute to successful environmental management.

  14. Idaho National Engineering and Environmental Laboratory Environmental Technologies Proof-of-Concepts. Final report FY-96

    International Nuclear Information System (INIS)

    Barrie, S.L.; Carpenter, G.S.; Crockett, A.B.

    1997-04-01

    The Idaho National Engineering and Environmental Laboratory Environmental Technologies Proof-of-Concept Project was initiated for the expedited development of new or conceptual technologies in support of groundwater fate, transport, and remediation; buried waste characterization, retrieval, and treatment; waste minimization/pollution prevention; and spent fuel handling and storage. In Fiscal Year 1996, The Idaho National Engineering and Environmental Laboratory proposed 40 development projects and the Department of Energy funded 15. The projects proved the concepts of the various technologies, and all the technologies contribute to successful environmental management

  15. Unicycle Project Report

    OpenAIRE

    Thomson, S

    2010-01-01

    The Unicycle project implemented an institutional Open Educational Resource repository with a view to ensuring sustainability in approach by embedding OER as an Assessment, Learning and Teaching strategy. This is the final submitted report for the project.

  16. Let's take this conversation outside: supporting embodied embedded memory

    NARCIS (Netherlands)

    Dijk, van J.; Lugt, van der R.; Overbeeke, C.J.

    2009-01-01

    In a research-through-design project we developed NOOT, a tangible interaction device that links conversational context to texts and sketches generated during creative sessions. We assumed an embodied embedded cognition perspective; i.e.: cognition was assumed to be embodied in human activity and

  17. Pacific CRYSTAL Project: Explicit Literacy Instruction Embedded in Middle School Science Classrooms

    Science.gov (United States)

    Anthony, Robert J.; Tippett, Christine D.; Yore, Larry D.

    2010-01-01

    Science literacy leading to fuller and informed participation in the public debate about science, technology, society, and environmental (STSE) issues that produce justified decisions and sustainable actions is the shared and central goal of the Pacific CRYSTAL Project. There is broad agreement by science education researchers that learners need to be able to construct and interpret specific scientific discourses and texts to be literate in science. We view these capabilities as components in the fundamental sense of science literacy and as interactive and synergetic to the derived sense of science literacy, which refers to having general knowledge about concepts, principles, and methods of science. This article reports on preliminary findings from Years 1, 2, and 3 of the 5-year Pacific CRYSTAL project that aims to identify, develop, and embed explicit literacy instruction in science programs to achieve both senses of science literacy. A community-based, opportunistic, engineering research and development approach has been utilized to identify problems and concerns and to design instructional solutions for teaching middle school (Grades 6, 7, and 8) science. Initial data indicate (a) opportunities in programs for embedding literacy instruction and tasks; (b) difficulties generalist teachers have with new science curricula; (c) difficulties specialist science teachers have with literacy activities, strategies, genre, and writing-to-learn science tasks; and (d) potential literacy activities (vocabulary, reading comprehension, visual literacy, genre, and writing tasks) for middle school science. Preinstruction student assessments indicate a range of challenges in achieving effective learning in science and the need for extensive teacher support to achieve the project’s goals. Postinstructional assessments indicate positive changes in students’ ability to perform target reading and writing tasks. Qualitative data indicate teachers’ desire for external direction

  18. Embedded Empiricisms in Soft Soil Technology

    Science.gov (United States)

    Wijeyesekera, D. C.; John, L. M. S. Alvin; Adnan, Z.

    2016-07-01

    Civil engineers of today are continuously challenged by innovative projects that push further the knowledge boundaries with conceptual and/or ingenious solutions leading to the realization of that once was considered impossible in the realms of geotechnology. Some of the forward developments rely on empirical methods embedded within soft soil technology and the spectral realms of engineering in its entirety. Empiricisms unlike folklore are not always shrouded in mysticism but can find scientific reasoning to justify them being adopted in design and tangible construction projects. This lecture therefore is an outline exposition of how empiricism has been integrally embedded in total empirical beginnings in the evolution of soft soil technology from the Renaissance time, through the developments of soil mechanics in the 19th century which in turn has paved the way to the rise of computational soil mechanics. Developments in computational soil mechanics has always embraced and are founded on a wide backdrop of empirical geoenvironment simulations. However, it is imperative that a competent geotechnical engineer needs postgraduate training combined with empiricism that is based on years of well- winnowed practical experience to fathom the diverseness and complexity of nature. However, experience being regarded more highly than expertise can, perhaps inadvertently, inhibit development and innovation.

  19. The statistical strength of nonlocality proofs

    NARCIS (Netherlands)

    Dam, van W.; Gill, R.D.; Grünwald, P.D.

    2005-01-01

    There exist numerous proofs of Bell's theorem, stating that quantum mechanics is incompatible with local realistic theories of nature. Here the strength of such nonlocality proofs is defined in terms of the amount of evidence against local realism provided by the corresponding experiments.

  20. Positive projections of symmetric matrices and Jordan algebras

    DEFF Research Database (Denmark)

    Fuglede, Bent; Jensen, Søren Tolver

    2013-01-01

    An elementary proof is given that the projection from the space of all symmetric p×p matrices onto a linear subspace is positive if and only if the subspace is a Jordan algebra. This solves a problem in a statistical model.......An elementary proof is given that the projection from the space of all symmetric p×p matrices onto a linear subspace is positive if and only if the subspace is a Jordan algebra. This solves a problem in a statistical model....

  1. Multiparty session types as coherence proofs

    DEFF Research Database (Denmark)

    Carbone, Marco; Montesi, Fabrizio; Schürmann, Carsten

    2017-01-01

    We propose a Curry–Howard correspondence between a language for programming multiparty sessions and a generalisation of Classical Linear Logic (CLL). In this framework, propositions correspond to the local behaviour of a participant in a multiparty session type, proofs to processes, and proof nor...

  2. Velocity feedback control with a flywheel proof mass actuator

    Science.gov (United States)

    Kras, Aleksander; Gardonio, Paolo

    2017-08-01

    This paper presents four new proof mass actuators to be used in velocity feedback control systems for the control of vibrations of machines and flexible structures. A classical proof mass actuator is formed by a coil-magnet linear motor, with either the magnet or the armature-coil proof mass suspended on soft springs. This arrangement produces a net force effect at frequencies above the fundamental resonance frequency of the springs-proof mass system. Thus, it can be used to implement point velocity feedback loops, although the dynamic response and static deflection of the springs-proof mass system poses some stability and control performance limitations. The four proof mass actuators presented in this study include a flywheel element, which is used to augment the inertia effect of the suspended proof mass. The paper shows that the flywheel element modifies both the dynamic response and static deflection of the springs-proof mass system in such a way as the stability and control performance of velocity feedback loops using these actuators are significantly improved.

  3. Hybrid Logic and its Proof-Theory

    CERN Document Server

    Brauner, Torben

    2011-01-01

    This is the first book-length treatment of hybrid logic and its proof-theory. Hybrid logic is an extension of ordinary modal logic which allows explicit reference to individual points in a model (where the points represent times, possible worlds, states in a computer, or something else). This is useful for many applications, for example when reasoning about time one often wants to formulate a series of statements about what happens at specific times. There is little consensus about proof-theory for ordinary modal logic. Many modal-logical proof systems lack important properties and the relatio

  4. 16 CFR 614.1 - Appropriate proof of identity.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Appropriate proof of identity. 614.1 Section... IDENTITY § 614.1 Appropriate proof of identity. (a) Consumer reporting agencies shall develop and implement reasonable requirements for what information consumers shall provide to constitute proof of identity for...

  5. Application Development for Optimizing Patient Placement on Aeromedical Evacuation Flights: Proof-of-Concept

    Science.gov (United States)

    2018-01-12

    PROGRAM ELEMENT NUMBER 6. AUTHOR(S) Brittany Fouts, Jennifer Serres, Ray Hill, Frank Ciarallo 5d. PROJECT NUMBER 5e. TASK NUMBER 5f...APPENDIX A – Flowchart for Graphical Prototype ...................................................................... 9 APPENDIX B – Proof-of-Concept App...would like to thank the programming team at the Department of Operational Analysis at the Air Force Institute of Technology at Wright-Patterson Air

  6. Evaluating Google compute engine with PROOF

    International Nuclear Information System (INIS)

    Ganis, Gerardo; Panitkin, Sergey

    2014-01-01

    The advent of private and commercial cloud platforms has opened the question of evaluating the cost-effectiveness of such solution for computing in High Energy Physics . Google Compute Engine (GCE) is a IaaS product launched by Google as an experimental platform during 2012 and now open to the public market. In this contribution we present the results of a set of CPU-intensive and I/O-intensive tests we have run with PROOF on a GCE resources made available by Google for test purposes. We have run tests on large scale PROOF clusters (up to 1000 workers) to study the overall scalability of coordinated multi-process jobs. We have studied and compared the performance of ephemeral and persistent storage with PROOF-Lite on the single machines and of standard PROOF on the whole cluster. We will discuss our results in perspective, in particular with respect to the typical analysis needs of an LHC experiment.

  7. 29 CFR 1919.31 - Proof tests-loose gear.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 7 2010-07-01 2010-07-01 false Proof tests-loose gear. 1919.31 Section 1919.31 Labor... (CONTINUED) GEAR CERTIFICATION Certification of Vessels: Tests and Proof Loads; Heat Treatment; Competent Persons § 1919.31 Proof tests—loose gear. (a) Chains, rings, shackles and other loose gear (whether...

  8. Synchronous correlation matrices and Connes’ embedding conjecture

    Energy Technology Data Exchange (ETDEWEB)

    Dykema, Kenneth J., E-mail: kdykema@math.tamu.edu [Department of Mathematics, Texas A& M University, College Station, Texas 77843-3368 (United States); Paulsen, Vern, E-mail: vern@math.uh.edu [Department of Mathematics, University of Houston, Houston, Texas 77204 (United States)

    2016-01-15

    In the work of Paulsen et al. [J. Funct. Anal. (in press); preprint arXiv:1407.6918], the concept of synchronous quantum correlation matrices was introduced and these were shown to correspond to traces on certain C*-algebras. In particular, synchronous correlation matrices arose in their study of various versions of quantum chromatic numbers of graphs and other quantum versions of graph theoretic parameters. In this paper, we develop these ideas further, focusing on the relations between synchronous correlation matrices and microstates. We prove that Connes’ embedding conjecture is equivalent to the equality of two families of synchronous quantum correlation matrices. We prove that if Connes’ embedding conjecture has a positive answer, then the tracial rank and projective rank are equal for every graph. We then apply these results to more general non-local games.

  9. System Description: Embedding Verification into Microsoft Excel

    OpenAIRE

    Collins, Graham; Dennis, Louise Abigail

    2000-01-01

    The aim of the PROSPER project is to allow the embedding of existing verification technology into applications in such a way that the theorem proving is hidden, or presented to the end user in a natural way. This paper describes a system built to test whether the PROSPER toolkit satisfied this aim. The system combines the toolkit with Microsoft Excel, a popular commercial spreadsheet application.

  10. Web Server Embedded System

    Directory of Open Access Journals (Sweden)

    Adharul Muttaqin

    2014-07-01

    Full Text Available Abstrak Embedded sistem saat ini menjadi perhatian khusus pada teknologi komputer, beberapa sistem operasi linux dan web server yang beraneka ragam juga sudah dipersiapkan untuk mendukung sistem embedded, salah satu aplikasi yang dapat digunakan dalam operasi pada sistem embedded adalah web server. Pemilihan web server pada lingkungan embedded saat ini masih jarang dilakukan, oleh karena itu penelitian ini dilakukan dengan menitik beratkan pada dua buah aplikasi web server yang tergolong memiliki fitur utama yang menawarkan “keringanan” pada konsumsi CPU maupun memori seperti Light HTTPD dan Tiny HTTPD. Dengan menggunakan parameter thread (users, ramp-up periods, dan loop count pada stress test embedded system, penelitian ini menawarkan solusi web server manakah diantara Light HTTPD dan Tiny HTTPD yang memiliki kecocokan fitur dalam penggunaan embedded sistem menggunakan beagleboard ditinjau dari konsumsi CPU dan memori. Hasil penelitian menunjukkan bahwa dalam hal konsumsi CPU pada beagleboard embedded system lebih disarankan penggunaan Light HTTPD dibandingkan dengan tiny HTTPD dikarenakan terdapat perbedaan CPU load yang sangat signifikan antar kedua layanan web tersebut Kata kunci: embedded system, web server Abstract Embedded systems are currently of particular concern in computer technology, some of the linux operating system and web server variegated also prepared to support the embedded system, one of the applications that can be used in embedded systems are operating on the web server. Selection of embedded web server on the environment is still rarely done, therefore this study was conducted with a focus on two web application servers belonging to the main features that offer a "lightness" to the CPU and memory consumption as Light HTTPD and Tiny HTTPD. By using the parameters of the thread (users, ramp-up periods, and loop count on a stress test embedded systems, this study offers a solution of web server which between the Light

  11. ReACT Methodology Proof of Concept Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Bri Rolston; Sarah Freeman

    2014-03-01

    The Department of Energy’s Office of Electricity Delivery and Energy Reliability (DOE-OE) funded INL Researchers to evaluate a novel process for assessing and mitigating cyber security risks. The proof of concept level of the method was tested in an industry environment. This case study, plus additional case studies will support the further development of the method into a tool to assist industry in securing their critical networks. This report provides an understanding of the process developed in the Response Analysis and Characterization Tool (ReACT) project. This report concludes with lessons learned and a roadmap for final development of these tools for use by industry.

  12. Other trigonometric proofs of Pythagoras theorem

    OpenAIRE

    Luzia, Nuno

    2015-01-01

    Only very recently a trigonometric proof of the Pythagoras theorem was given by Zimba \\cite{1}, many authors thought this was not possible. In this note we give other trigonometric proofs of Pythagoras theorem by establishing, geometrically, the half-angle formula $\\cos\\theta=1-2\\sin^2 \\frac{\\theta}{2}$.

  13. Existence of Projective Planes

    OpenAIRE

    Perrott, Xander

    2016-01-01

    This report gives an overview of the history of finite projective planes and their properties before going on to outline the proof that no projective plane of order 10 exists. The report also investigates the search carried out by MacWilliams, Sloane and Thompson in 1970 [12] and confirms their result by providing independent verification that there is no vector of weight 15 in the code generated by the projective plane of order 10.

  14. Burdens of Proof, Presumptions and Standards of Proof in Criminal ...

    African Journals Online (AJOL)

    Worku_Y

    evidential and persuasive burdens of proof as between the state and the ..... scholars have observed that the evidential burden is a function of the burden of ..... required to convince judges by creating such an intensity of belief in their minds.

  15. Generalization of the Greenberger-Horne-Zeilinger algebraic proof of nonlocality

    International Nuclear Information System (INIS)

    Clifton, R.K.; Redhead, M.L.G.; Butterfield, J.N.

    1991-01-01

    The authors further develop a recent new proof (by Greenberger, Horne, and Zeilinger - GHZ) that local deterministic hidden-variable theories are inconsistent with certain strict correlations predicted by quantum mechanics. First, they generalize GHZ's proof so that it applied to factorable stochastic theories in which apparatus hidden variables are casually relevant to measurement results, and theories in which the hidden variables evolve indeterministically prior to the particle-apparatus interactions. Then they adopt a more general measure-theoretic approach which requires that GHZ's argument be modified in order to produce a valid proof. Finally, they motivate the more general proof's assumptions in a somewhat different way from previous authors in order to strengthen the implications of the proof as much as possible. After developing GHZ's proof along these lines, they then consider the analogue, for their proof, of Bohr's reply to the EPR argument, and conclude (pace GHZ) that in at least one respect (viz, that of most concern to Bohr) the proof is no more powerful than Bell's. Nevertheless, they point out some new advantages of their proof over Bell's, and over other algebraic proofs of nonlocality. And they conclude by giving a modified version of their proof that, like Bell's does not rely on experimentally unrealizable strict correlations, but still leads to a testable quasi-algebraic locality inequality

  16. Proof Mapping

    Science.gov (United States)

    Linares, Leanne A.; Smith, Phil R.

    2009-01-01

    A geometry textbook or mathematics journal that prints all the work that mathematicians use as they generate proofs of mathematical results would be rare indeed. The false starts, the tentative conjectures, and the arguments that led nowhere--these are conveniently omitted; only the final successful product is presented to the world. To students…

  17. Investigation on Smart Parts with Embedded Piezoelectric Sensors via Additive Manufacturing

    Energy Technology Data Exchange (ETDEWEB)

    Lin, Yirong [Univ. of Texas, El Paso, TX (United States)

    2017-12-10

    The goal of this proposed research is to design, fabricate, and evaluate “smart parts” with embedded sensors for energy systems. The “smart parts” will be fabricated using Electron Beam Melting (EBM) 3D printing technique with built-in piezoceramic sensors. The objectives of the proposed project are: 1) Fabricate energy system related components with embedded sensors, 2) Evaluate the mechanical properties and sensing functionalities of the “smart parts” with embedded piezoceramic sensors, and 3) Assess in-situ sensing capability of energy system parts. The second year’s research of the research is centered on fabrication of the “smart parts” with considerations of overall material property as well as demonstration of sensing functionalities. The results for the final report are presented here, including all research accomplishment, project management. Details are included such as: how the design and fabrication of sensor packaging could improve the sensor performance, demonstration of “smart parts” sensing capabilities, analysis on the elements that constitute the “smart sensors”, advanced “stop and go” fabrication process, smart injector fabrication using SLM technology, smart injector testing in combustion environments etc. Research results to date have generated several posters and papers.

  18. On Kripke-style semantics for the provability logic of Gödel’s proof predicate with quantifiers on proofs

    NARCIS (Netherlands)

    Yavorskiy, R.

    Kripke-style semantics is suggested for the provability logic with quantifiers on proofs corresponding to the standard Gödel proof predicate. It is proved that the set of valid formulas is decidable. The arithmetical completeness is still an open issue.

  19. Embedded systems handbook

    CERN Document Server

    Zurawski, Richard

    2005-01-01

    Embedded systems are nearly ubiquitous, and books on individual topics or components of embedded systems are equally abundant. Unfortunately, for those designers who thirst for knowledge of the big picture of embedded systems there is not a drop to drink. Until now. The Embedded Systems Handbook is an oasis of information, offering a mix of basic and advanced topics, new solutions and technologies arising from the most recent research efforts, and emerging trends to help you stay current in this ever-changing field.With preeminent contributors from leading industrial and academic institutions

  20. Towards an Intelligent Tutor for Mathematical Proofs

    Directory of Open Access Journals (Sweden)

    Serge Autexier

    2012-02-01

    Full Text Available Computer-supported learning is an increasingly important form of study since it allows for independent learning and individualized instruction. In this paper, we discuss a novel approach to developing an intelligent tutoring system for teaching textbook-style mathematical proofs. We characterize the particularities of the domain and discuss common ITS design models. Our approach is motivated by phenomena found in a corpus of tutorial dialogs that were collected in a Wizard-of-Oz experiment. We show how an intelligent tutor for textbook-style mathematical proofs can be built on top of an adapted assertion-level proof assistant by reusing representations and proof search strategies originally developed for automated and interactive theorem proving. The resulting prototype was successfully evaluated on a corpus of tutorial dialogs and yields good results.

  1. Proof test diagrams for Zerodur glass-ceramic

    Science.gov (United States)

    Tucker, D. S.

    1991-01-01

    Proof test diagrams for Zerodur glass-ceramics are calculated from available fracture mechanics data. It is shown that the environment has a large effect on minimum time-to-failure as predicted by proof test diagrams.

  2. Proof in Algebra: Reasoning beyond Examples

    Science.gov (United States)

    Otten, Samuel; Herbel-Eisenmann, Beth A.; Males, Lorraine M.

    2010-01-01

    The purpose of this article is to provide an image of what proof could look like in beginning algebra, a course that nearly every secondary school student encounters. The authors present an actual classroom vignette in which a rich opportunity for student reasoning arose. After analyzing the proof schemes at play, the authors provide a…

  3. Validation, Proof-of-Concept, and Postaudit of the Groundwater Flow and Transport Model of the Project Shoal Area

    International Nuclear Information System (INIS)

    Ahmed Hassan

    2004-01-01

    The groundwater flow and radionuclide transport model characterizing the Shoal underground nuclear test has been accepted by the State of Nevada Division of Environmental Protection. According to the Federal Facility Agreement and Consent Order (FFACO) between DOE and the State of Nevada, the next steps in the closure process for the site are then model validation (or postaudit), the proof-of-concept, and the long-term monitoring stage. This report addresses the development of the validation strategy for the Shoal model, needed for preparing the subsurface Corrective Action Decision Document-Corrective Action Plan and the development of the proof-of-concept tools needed during the five-year monitoring/validation period. The approach builds on a previous model, but is adapted and modified to the site-specific conditions and challenges of the Shoal site

  4. Validation, Proof-of-Concept, and Postaudit of the Groundwater Flow and Transport Model of the Project Shoal Area

    Energy Technology Data Exchange (ETDEWEB)

    Ahmed Hassan

    2004-09-01

    The groundwater flow and radionuclide transport model characterizing the Shoal underground nuclear test has been accepted by the State of Nevada Division of Environmental Protection. According to the Federal Facility Agreement and Consent Order (FFACO) between DOE and the State of Nevada, the next steps in the closure process for the site are then model validation (or postaudit), the proof-of-concept, and the long-term monitoring stage. This report addresses the development of the validation strategy for the Shoal model, needed for preparing the subsurface Corrective Action Decision Document-Corrective Action Plan and the development of the proof-of-concept tools needed during the five-year monitoring/validation period. The approach builds on a previous model, but is adapted and modified to the site-specific conditions and challenges of the Shoal site.

  5. Embedded systems handbook networked embedded systems

    CERN Document Server

    Zurawski, Richard

    2009-01-01

    Considered a standard industry resource, the Embedded Systems Handbook provided researchers and technicians with the authoritative information needed to launch a wealth of diverse applications, including those in automotive electronics, industrial automated systems, and building automation and control. Now a new resource is required to report on current developments and provide a technical reference for those looking to move the field forward yet again. Divided into two volumes to accommodate this growth, the Embedded Systems Handbook, Second Edition presents a comprehensive view on this area

  6. Design, implementation, and evaluation of the Resilient Smalltalk embedded platform

    DEFF Research Database (Denmark)

    Andersen, Jacob Robert; Bak, Lars; Grarup, Steffen

    2005-01-01

    machine running on embedded systems. Programmers may connect to running virtual machines and service, monitor, or change the running systems. Furthermore, we present an evaluation of the Resilient platform in relation to the design goals through a case study of two development projects which successfully...

  7. Designing embedded systems with 32-bit PIC microcontrollers and MikroC

    CERN Document Server

    Ibrahim, Dogan

    2013-01-01

    The new generation of 32-bit PIC microcontrollers can be used to solve the increasingly complex embedded system design challenges faced by engineers today. This book teaches the basics of 32-bit C programming, including an introduction to the PIC 32-bit C compiler. It includes a full description of the architecture of 32-bit PICs and their applications, along with coverage of the relevant development and debugging tools. Through a series of fully realized example projects, Dogan Ibrahim demonstrates how engineers can harness the power of this new technology to optimize their embedded design

  8. Embeddings between weighted Copson and Cesaro function spaces

    Czech Academy of Sciences Publication Activity Database

    Gogatishvili, Amiran; Mustafayev, R.Ch.; Ünver, T.

    2017-01-01

    Roč. 67, č. 4 (2017), s. 1005-1132 ISSN 0011-4642 R&D Projects: GA ČR GA13-14743S Institutional support: RVO:67985840 Keywords : Cesaro and Copson function spaces * embedding * iterated Hardy inequalities Subject RIV: BA - General Mathematics OBOR OECD: Pure mathematics Impact factor: 0.364, year: 2016 https://link.springer.com/article/10.21136/CMJ.2017.0424-16

  9. Embedded Linux in het onderwijs

    NARCIS (Netherlands)

    Dr Ruud Ermers

    2008-01-01

    Embedded Linux wordt bij steeds meer grote bedrijven ingevoerd als embedded operating system. Binnen de opleiding Technische Informatica van Fontys Hogeschool ICT is Embedded Linux geïntroduceerd in samenwerking met het lectoraat Architectuur van Embedded Systemen. Embedded Linux is als vakgebied

  10. FAILSAFE Health Management for Embedded Systems

    Science.gov (United States)

    Horvath, Gregory A.; Wagner, David A.; Wen, Hui Ying; Barry, Matthew

    2010-01-01

    The FAILSAFE project is developing concepts and prototype implementations for software health management in mission- critical, real-time embedded systems. The project unites features of the industry-standard ARINC 653 Avionics Application Software Standard Interface and JPL s Mission Data System (MDS) technology (see figure). The ARINC 653 standard establishes requirements for the services provided by partitioned, real-time operating systems. The MDS technology provides a state analysis method, canonical architecture, and software framework that facilitates the design and implementation of software-intensive complex systems. The MDS technology has been used to provide the health management function for an ARINC 653 application implementation. In particular, the focus is on showing how this combination enables reasoning about, and recovering from, application software problems.

  11. Introduction to sofic and hyperlinear groups and Connes' embedding conjecture

    CERN Document Server

    Capraro, Valerio

    2015-01-01

    This monograph presents some cornerstone results in the study of sofic and hyperlinear groups and the closely related Connes' embedding conjecture. These notions, as well as the proofs of many results, are presented in the framework of model theory for metric structures. This point of view, rarely explicitly adopted in the literature, clarifies the ideas therein, and provides additional tools to attack open problems. Sofic and hyperlinear groups are countable discrete groups that can be suitably approximated by finite symmetric groups and groups of unitary matrices. These deep and fruitful notions, introduced by Gromov and Radulescu, respectively, in the late 1990s, stimulated an impressive amount of research in the last 15 years, touching several seemingly distant areas of mathematics including geometric group theory, operator algebras, dynamical systems, graph theory, and quantum information theory. Several long-standing conjectures, still open for arbitrary groups, are now settled for sofic or hyperlinear ...

  12. IT Project Evaluation and Investment Decision

    Institute of Scientific and Technical Information of China (English)

    黄东兵; 张世英

    2004-01-01

    There are many kinds of real options,which are valuable,in each phase of the lifetime of an information technology(IT)project.However,in the current IT investment decision theory,real options that embedded in IT projects are not considered. In this paper, the process of IT project decision and implementation is fully analyzed, the real options that may be embedded in an IT project are identified, and a real option analysis (ROA) method is proposed for evaluation of an IT project under uncertain business environment. ROA employs Black-Scholes expansion model and cancels the assumption that the cost of project is certain. The numerical example manifests that the ROA can better evaluate IT project and select the IT investment alternative. Finally, a road map is provided to help selecting the suitable evaluation method to make IT investment decision.

  13. Embedding beyond electrostatics

    DEFF Research Database (Denmark)

    Nåbo, Lina J.; Olsen, Jógvan Magnus Haugaard; Holmgaard List, Nanna

    2016-01-01

    We study excited states of cholesterol in solution and show that, in this specific case, solute wave-function confinement is the main effect of the solvent. This is rationalized on the basis of the polarizable density embedding scheme, which in addition to polarizable embedding includes non-electrostatic...... repulsion that effectively confines the solute wave function to its cavity. We illustrate how the inclusion of non-electrostatic repulsion results in a successful identification of the intense π → π∗ transition, which was not possible using an embedding method that only includes electrostatics....... This underlines the importance of non-electrostatic repulsion in quantum-mechanical embedding-based methods....

  14. On Callan's proof of the BPHZ theorem

    International Nuclear Information System (INIS)

    Lesniewski, A.

    1984-01-01

    The author gives an elementary proof of the BPHZ theorem in the case of the Euclidean lambdaphi 4 theory. The method of proof relies on a detailed analysis of the skeleton structure of graphs and estimates based on the Callan-Symanzik equations. (Auth.)

  15. A survey of noninteractive zero knowledge proof system and its applications.

    Science.gov (United States)

    Wu, Huixin; Wang, Feng

    2014-01-01

    Zero knowledge proof system which has received extensive attention since it was proposed is an important branch of cryptography and computational complexity theory. Thereinto, noninteractive zero knowledge proof system contains only one message sent by the prover to the verifier. It is widely used in the construction of various types of cryptographic protocols and cryptographic algorithms because of its good privacy, authentication, and lower interactive complexity. This paper reviews and analyzes the basic principles of noninteractive zero knowledge proof system, and summarizes the research progress achieved by noninteractive zero knowledge proof system on the following aspects: the definition and related models of noninteractive zero knowledge proof system, noninteractive zero knowledge proof system of NP problems, noninteractive statistical and perfect zero knowledge, the connection between noninteractive zero knowledge proof system, interactive zero knowledge proof system, and zap, and the specific applications of noninteractive zero knowledge proof system. This paper also points out the future research directions.

  16. A Survey of Noninteractive Zero Knowledge Proof System and Its Applications

    Directory of Open Access Journals (Sweden)

    Huixin Wu

    2014-01-01

    Full Text Available Zero knowledge proof system which has received extensive attention since it was proposed is an important branch of cryptography and computational complexity theory. Thereinto, noninteractive zero knowledge proof system contains only one message sent by the prover to the verifier. It is widely used in the construction of various types of cryptographic protocols and cryptographic algorithms because of its good privacy, authentication, and lower interactive complexity. This paper reviews and analyzes the basic principles of noninteractive zero knowledge proof system, and summarizes the research progress achieved by noninteractive zero knowledge proof system on the following aspects: the definition and related models of noninteractive zero knowledge proof system, noninteractive zero knowledge proof system of NP problems, noninteractive statistical and perfect zero knowledge, the connection between noninteractive zero knowledge proof system, interactive zero knowledge proof system, and zap, and the specific applications of noninteractive zero knowledge proof system. This paper also points out the future research directions.

  17. Pembelajaran Embedded System Berbasis Arduino Mega 2560 dan MIT App Inventor

    OpenAIRE

    Tukadi, Tukadi

    2017-01-01

    This paper describes the learning process of the Embedded System course with a practical approach based on Arduino Mega 2560 and Android using MIT App inventor software. Learning materials include digital I / O and analog I / O access via android mobile phone. The method used in its implementation premises to provide tasks in the form of projects. The next step is to find the theories that can support in completing the project task. The project task is to control or read electronic devices co...

  18. The data embedding method

    Energy Technology Data Exchange (ETDEWEB)

    Sandford, M.T. II; Bradley, J.N.; Handel, T.G.

    1996-06-01

    Data embedding is a new steganographic method for combining digital information sets. This paper describes the data embedding method and gives examples of its application using software written in the C-programming language. Sandford and Handel produced a computer program (BMPEMBED, Ver. 1.51 written for IBM PC/AT or compatible, MS/DOS Ver. 3.3 or later) that implements data embedding in an application for digital imagery. Information is embedded into, and extracted from, Truecolor or color-pallet images in Microsoft{reg_sign} bitmap (.BMP) format. Hiding data in the noise component of a host, by means of an algorithm that modifies or replaces the noise bits, is termed {open_quote}steganography.{close_quote} Data embedding differs markedly from conventional steganography, because it uses the noise component of the host to insert information with few or no modifications to the host data values or their statistical properties. Consequently, the entropy of the host data is affected little by using data embedding to add information. The data embedding method applies to host data compressed with transform, or {open_quote}lossy{close_quote} compression algorithms, as for example ones based on discrete cosine transform and wavelet functions. Analysis of the host noise generates a key required for embedding and extracting the auxiliary data from the combined data. The key is stored easily in the combined data. Images without the key cannot be processed to extract the embedded information. To provide security for the embedded data, one can remove the key from the combined data and manage it separately. The image key can be encrypted and stored in the combined data or transmitted separately as a ciphertext much smaller in size than the embedded data. The key size is typically ten to one-hundred bytes, and it is in data an analysis algorithm.

  19. An illustration of the explanatory and discovery functions of proof

    Directory of Open Access Journals (Sweden)

    Michael de Villiers

    2012-11-01

    Full Text Available This article provides an illustration of the explanatory and discovery functions of proof with an original geometric conjecture made by a Grade 11 student. After logically explaining (proving the result geometrically and algebraically, the result is generalised to other polygons by further reflection on the proof(s. Different proofs are given, each giving different insights that lead to further generalisations. The underlying heuristic reasoning is carefully described in order to provide an exemplar for designing learning trajectories to engage students with these functions of proof.

  20. A Concise and Direct Proof of "Fermat's Last Theorem"

    OpenAIRE

    Ellman, Roger

    1998-01-01

    The recently developed proof of Fermat's Last Theorem is very lengthy and difficult, so much so as to be beyond all but a small body of specialists. While certainly of value in the developments that resulted, that proof could not be, nor was offered as being, possibly the proof Fermat had in mind. The present proof being brief, direct and concise is a candidate for being what Fermat had in mind. It is also completely accessible to any one trained in common algebra. That critical suggestions o...

  1. 28 CFR 79.35 - Proof of onset of leukemia at least two years after first exposure, and proof of onset of a...

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Proof of onset of leukemia at least two... Participants § 79.35 Proof of onset of leukemia at least two years after first exposure, and proof of onset of... be the date of first or initial exposure. The date of onset will be the date of diagnosis as...

  2. Earthquake proof device for nuclear power plant building

    International Nuclear Information System (INIS)

    Okada, Yasuo.

    1991-01-01

    The structure of the present invention enables three dimensional vibration proof, i.e., in horizontal and vertical directions of a reactor container building. That is, each of the reactor container building and a reactor auxiliary building is adapted as an independent structure. The periphery of the reactor container building is surrounded by the reactor auxiliary building. The reactor auxiliary building is supported against the ground by way of a horizontal vibration proof device. The reactor container building is supported against the ground by way of a three-dimensional vibration proof device that prevents vibrations in both of the horizontal directions, and the vertical directions. The reactor container building is connected to the auxiliary building by way of a vertical vibration proof device. With such a constitution, although the reactor container building is vibration proof against both of the horizontal and the vertical vibrations, the vertical vibration proofness is an extension of inherent vertical vibration period. Accordingly, the head of the building undergoes rocking vibrations. However, since the reactor container building is connected to the reactor auxiliary building, the rocking vibrations are prevented by the reactor auxiliary building. As a result, safety upon occurrence of an earthquakes can be ensured. (I.S.)

  3. 28 CFR 79.13 - Proof of physical presence for the requisite period and proof of participation onsite during a...

    Science.gov (United States)

    2010-07-01

    ... participated onsite in the atmospheric detonation of a nuclear device. ... requisite period and proof of participation onsite during a period of atmospheric nuclear testing. 79.13... presence for the requisite period and proof of participation onsite during a period of atmospheric nuclear...

  4. Symbolic logic syntax, semantics, and proof

    CERN Document Server

    Agler, David

    2012-01-01

    Brimming with visual examples of concepts, derivation rules, and proof strategies, this introductory text is ideal for students with no previous experience in logic. Students will learn translation both from formal language into English and from English into formal language; how to use truth trees and truth tables to test propositions for logical properties; and how to construct and strategically use derivation rules in proofs.

  5. Data-oriented scheduling for PROOF

    International Nuclear Information System (INIS)

    Xu Neng; Guan Wen; Wu Sau Lan; Ganis, Gerardo

    2011-01-01

    The Parallel ROOT Facility - PROOF - is a distributed analysis system optimized for I/O intensive analysis tasks of HEP data. With LHC entering the analysis phase, PROOF has become a natural ingredient for computing farms at Tier3 level. These analysis facilities will typically be used by a few tenths of users, and can also be federated into a sort of analysis cloud corresponding to the Virtual Organization of the experiment. Proper scheduling is required to guarantee fair resource usage, to enforce priority policies and to optimize the throughput. In this paper we discuss an advanced priority system that we are developing for PROOF. The system has been designed to automatically adapt to unknown length of the tasks, to take into account the data location and availability (including distribution across geographically separated sites), and the {group, user} default priorities. In this system, every element - user, group, dataset, job slot and storage - gets its priority and those priorities are dynamically linked with each other. In order to tune the interplay between the various components, we have designed and started implementing a simulation application that can model various type and size of PROOF clusters. In this application a monitoring package records all the changes of them so that we can easily understand and tune the performance. We will discuss the status of our simulation and show examples of the results we are expecting from it.

  6. Embedded Processor Laboratory

    Data.gov (United States)

    Federal Laboratory Consortium — The Embedded Processor Laboratory provides the means to design, develop, fabricate, and test embedded computers for missile guidance electronics systems in support...

  7. Comparison of Component Frameworks for Real-Time Embedded Systems

    Czech Academy of Sciences Publication Activity Database

    Pop, T.; Hnětynka, P.; Hošek, P.; Malohlava, M.; Bureš, Tomáš

    2014-01-01

    Roč. 40, č. 1 (2014), s. 127-170 ISSN 0219-1377 Grant - others:GA AV ČR(CZ) GAP202/11/0312; GA UK(CZ) Project 378111; UK(CZ) SVV-2013- 267312 Keywords : component-based development * component frameworks * real-time and embedded systems Subject RIV: JC - Computer Hardware ; Software Impact factor: 1.782, year: 2014

  8. Embeddings of Lorentz-type spaces involving weighted integral means

    Czech Academy of Sciences Publication Activity Database

    Gogatishvili, Amiran; Křepela, M.; Pick, L.; Soudský, F.

    2017-01-01

    Roč. 273, č. 9 (2017), s. 2939-2980 ISSN 0022-1236 R&D Projects: GA ČR GA13-14743S Institutional support: RVO:67985840 Keywords : classical Lorentz spaces * embeddings * iterated operators Subject RIV: BA - General Mathematics OBOR OECD: Pure mathematics Impact factor: 1.254, year: 2016 http://www.sciencedirect.com/science/article/pii/S0022123617302252

  9. Verifying Process Algebra Proofs in Type Theory

    NARCIS (Netherlands)

    Sellink, M.P.A.

    In this paper we study automatic verification of proofs in process algebra. Formulas of process algebra are represented by types in typed λ-calculus. Inhabitants (terms) of these types represent proofs. The specific typed λ-calculus we use is the Calculus of Inductive Constructions as implemented

  10. Non-Well-Founded Proofs for the Grzegorczyk Modal Logic

    OpenAIRE

    Savateev, Yury; Shamkanov, Daniyar

    2018-01-01

    We present a sequent calculus for the Grzegorczyk modal logic Grz allowing cyclic and other non-well-founded proofs and obtain the cut-elimination theorem for it by constructing a continuous cut-elimination mapping acting on these proofs. As an application, we establish the Lyndon interpolation property for the logic Grz proof-theoretically.

  11. Mathematicians' Perspectives on Features of a Good Pedagogical Proof

    Science.gov (United States)

    Lai, Yvonne; Weber, Keith; Mejia-Ramos, Juan Pablo

    2012-01-01

    In this article, we report two studies investigating what mathematicians value in a pedagogical proof. Study 1 is a qualitative study of how eight mathematicians revised two proofs that would be presented in a course for mathematics majors. These mathematicians thought that introductory and concluding sentences should be included in the proofs,…

  12. A Calculus of Circular Proofs and its Categorical Semantics

    DEFF Research Database (Denmark)

    Santocanale, Luigi

    2002-01-01

    We present a calculus of "circular proofs": the graph underlying a proof is not a finite tree but instead it is allowed to contain a certain amount of cycles.The main challenge in developing a theory for the calculus is to define the semantics of proofs, since the usual method by induction...

  13. Climate-proof planning for flood-prone areas : assessing the adaptive capacity of planning institutions in the Netherlands

    NARCIS (Netherlands)

    van den Brink, Margo; Meijerink, Sander; Termeer, Catrien; Gupta, Joyeeta

    It is generally acknowledged that adapting low-lying, flood-prone deltas to the projected impacts of climate change is of great importance. Deltas are densely populated and often subject to high risk. Climate-proof planning is, however, not only a new but also a highly complex task that poses

  14. Climate-proof planning for flood-prone areas: assessing the adaptive capacity of planning institutions in the Netherlands

    NARCIS (Netherlands)

    Brink, van den M.A.; Meijerink, S.; Termeer, C.J.A.M.; Gupta, J.

    2014-01-01

    It is generally acknowledged that adapting lowlying, flood-prone deltas to the projected impacts of climate change is of great importance. Deltas are densely populated and often subject to high risk. Climate-proof planning is, however, not only a new but also a highly complex task that poses

  15. Proof of payment for all reimbursement claims

    CERN Multimedia

    HR Department

    2006-01-01

    Members of the personnel are kindly requested to note that only documents proving that a payment has been made are accepted as proof of payment for any claims for reimbursement, including specifically the reimbursement of education fees. In particular, the following will be accepted as proof of payment: bank or post office bank statements indicating the name of the institution to which the payment was made; photocopies of cheques made out to the institution to which the payments were made together with bank statements showing the numbers of the relevant cheques; proof of payment in the form of discharged payment slips; invoices with acknowledgement of settlement, receipts, bank statements detailing operations crediting another account or similar documents. As a result, the following documents in particular will no longer be accepted as proof of payment: photocopies of cheques that are not submitted together with bank or post office bank statements showing the numbers of the relevant cheques; details of ...

  16. Problems and proofs in numbers and algebra

    CERN Document Server

    Millman, Richard S; Kahn, Eric Brendan

    2015-01-01

    Designed to facilitate the transition from undergraduate calculus and differential equations to learning about proofs, this book helps students develop the rigorous mathematical reasoning needed for advanced courses in analysis, abstract algebra, and more. Students will focus on both how to prove theorems and solve problem sets in-depth; that is, where multiple steps are needed to prove or solve. This proof technique is developed by examining two specific content themes and their applications in-depth: number theory and algebra. This choice of content themes enables students to develop an understanding of proof technique in the context of topics with which they are already familiar, as well as reinforcing natural and conceptual understandings of mathematical methods and styles. The key to the text is its interesting and intriguing problems, exercises, theorems, and proofs, showing how students will transition from the usual, more routine calculus to abstraction while also learning how to “prove” or “sol...

  17. Craft-Joule Project: Stagnation proof transparently insulated flat plate solar collector (static)

    Energy Technology Data Exchange (ETDEWEB)

    Oliva, A; Cadafalch, J; Perez-Segarra, C.D. [Universitat Politecnica de Catalunya, Barcelona (Spain)] (and others)

    2000-07-01

    The STATIC (STAgnation proof Transparently Insulated flat plate Solar Collector) project is a Craft-Joule Project within the framework of the Non Nuclear Energy Programme Joule III coordinated by the Centre Technologic de Transferencia de Calor (CTTC). The core group of SMEs involved in the project has its main economical activity in the field of solar thermal systems at low temperature level (domestic hot water, solar heating, etc.). Beyond this, a large application potential exists for solar heating at medium temperature level (from 80 to 160 Celsius degrees) : industrial process heat, solar cooling and air conditioning, solar drying , distillation and desalination. Three of the four SME proposers are located in Southern Europe and in the Caribean, where a continuos increase of the demand for air conditioning and cooling has been demonstrated in the last years. The recent development of flat plate solar collectors with honeycomb-type transparent insulation cover has shown that this type of collectors can become a low cost alternative to evacuated tube and high concentrating CPC collectors in the medium temperature range from 80 to 160 Celsius degrees. With the expected reduction of collector cost, that forms 30%-50% of total system cost, a decisive break-through of solar thermal systems using heat in the medium temperature range can be achieved. The feasibility and good performance of these solar collectors has been proved in several prototypes. Nevertheless, up to now no commercial products are available. In order to reach this, the following developments of new concepts are necessary and are being carried out within this project: solution of the problem of overheating: development of collector versions for different working temperatures: optimization of the design with the support of high level numerical simulation. Several prototypes of the new solar collectors are being tested. System tests will also be carried or for two test arrays of optimized collector

  18. Embedded defects

    International Nuclear Information System (INIS)

    Barriola, M.; Vachaspati, T.; Bucher, M.

    1994-01-01

    We give a prescription for embedding classical solutions and, in particular, topological defects in field theories which are invariant under symmetry groups that are not necessarily simple. After providing examples of embedded defects in field theories based on simple groups, we consider the electroweak model and show that it contains the Z string and a one-parameter family of strings called the W(α) string. It is argued that although the members of this family are gauge equivalent when considered in isolation, each member becomes physically distinct when multistring configurations are considered. We then turn to the issue of stability of embedded defects and demonstrate the instability of a large class of such solutions in the absence of bound states or condensates. The Z string is shown to be unstable for all values of the Higgs boson mass when θ W =π/4. W strings are also shown to be unstable for a large range of parameters. Embedded monopoles suffer from the Brandt-Neri-Coleman instability. Finally, we connect the electroweak string solutions to the sphaleron

  19. On the burden of proof in civil procedure

    Directory of Open Access Journals (Sweden)

    Keča Ranko

    2013-01-01

    Full Text Available The appliance of burden of proof rules is conceived of assumption that evidences are taken and that court didn't reach the required degree of conviction of a particular fact, what implies limitation of application of these rules on proceedings in which the judgment is rendered after the plenary proceedings. The Code of Civil Procedure (CCP has no suitable answers for the problems arising from new conception of the principle of party control of facts and means of proof in Serbian litigation legislature, by which the court has no more power to take the evidence ex offo. There is no answer to the question how should court conduct when evidence is not taken because of a lack of parties' indication of the means of proof. In this case courts practice somehow wider conception of burden of proof rules, which however has no explicit legal ground. They are applying them even though evidences are not taken. In any case it would be useful to reformulate basic rule of burden of proof in manner which would correspondent to the new conception of the principle of party presentation. The rule of burden of proof applies when the high degree of conviction of facts is demanded from the court, in order to render the judgment. Consequently this rule loses its' sense when mere probability of factual findings is demanded. The broader conception of parties' representation principle however does not liberate court from his responsibility to clarify facts that should be base for adjudication. Circumstance that CCP does mention the principle of material truth anymore should not be seen as argument for liberation of mentioned responsibility. It is still expected from the court to be active. Only when joint effort of the court and parties is left without of goal, in sense that court doesn't reach the high degree conviction, there would be ground for burden of proof rule's application. In this situation court also must justify why he couldn't reach required degree of

  20. Semantic Contamination and Mathematical Proof: Can a Non-Proof Prove?

    Science.gov (United States)

    Mejia-Ramos, Juan Pablo; Inglis, Matthew

    2011-01-01

    The way words are used in natural language can influence how the same words are understood by students in formal educational contexts. Here we argue that this so-called semantic contamination effect plays a role in determining how students engage with mathematical proof, a fundamental aspect of learning mathematics. Analyses of responses to…

  1. Polymorphic Embedding of DSLs

    DEFF Research Database (Denmark)

    Hofer, Christian; Ostermann, Klaus; Rendel, Tillmann

    2008-01-01

    propose polymorphic embedding of DSLs, where many different interpretations of a DSL can be provided as reusable components, and show how polymorphic embedding can be realized in the programming language Scala. With polymorphic embedding, the static type-safety, modularity, composability and rapid...

  2. Integrated Design Tools for Embedded Control Systems

    OpenAIRE

    Jovanovic, D.S.; Hilderink, G.H.; Broenink, Johannes F.; Karelse, F.

    2001-01-01

    Currently, computer-based control systems are still being implemented using the same techniques as 10 years ago. The purpose of this project is the development of a design framework, consisting of tools and libraries, which allows the designer to build high reliable heterogeneous real-time embedded systems in a very short time at a fraction of the present day costs. The ultimate focus of current research is on transformation control laws to efficient concurrent algorithms, with concerns about...

  3. Runtime verification of embedded real-time systems.

    Science.gov (United States)

    Reinbacher, Thomas; Függer, Matthias; Brauer, Jörg

    We present a runtime verification framework that allows on-line monitoring of past-time Metric Temporal Logic (ptMTL) specifications in a discrete time setting. We design observer algorithms for the time-bounded modalities of ptMTL, which take advantage of the highly parallel nature of hardware designs. The algorithms can be translated into efficient hardware blocks, which are designed for reconfigurability, thus, facilitate applications of the framework in both a prototyping and a post-deployment phase of embedded real-time systems. We provide formal correctness proofs for all presented observer algorithms and analyze their time and space complexity. For example, for the most general operator considered, the time-bounded Since operator, we obtain a time complexity that is doubly logarithmic both in the point in time the operator is executed and the operator's time bounds. This result is promising with respect to a self-contained, non-interfering monitoring approach that evaluates real-time specifications in parallel to the system-under-test. We implement our framework on a Field Programmable Gate Array platform and use extensive simulation and logic synthesis runs to assess the benefits of the approach in terms of resource usage and operating frequency.

  4. Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security (Self-Securing Devices)

    National Research Council Canada - National Science Library

    Ganger, Gregory R

    2007-01-01

    This report summarizes the results of the work on the AFOSR's Critical Infrastructure Protection Program project, entitled Enabling Dynamic Security Management of Networked Systems via Device-Embedded Security...

  5. On the proof of the first Carnot theorem in thermodynamics

    International Nuclear Information System (INIS)

    Morad, M R; Momeni, F

    2013-01-01

    The proof of the first Carnot theorem in classical thermodynamics is revisited in this study. The underlying conditions of a general proof of this principle presented by Senft (1978 Phys. Educ. 13 35–37) are explored and discussed. These conditions are analysed in more detail using a physical description of heat and work to present a simpler proof of the first principle prior to using the violation of the second law of thermodynamics. Finally, a new simple proof is also presented based on Gibbs relation. This discussion will benefit the teaching of classical thermodynamics and promote better understanding of the proof of the first Carnot theorem in general form. (paper)

  6. Construction of state-independent proofs for quantum contextuality

    Science.gov (United States)

    Tang, Weidong; Yu, Sixia

    2017-12-01

    Since the enlightening proofs of quantum contextuality first established by Kochen and Specker, and also by Bell, various simplified proofs have been constructed to exclude the noncontextual hidden variable theory of our nature at the microscopic scale. The conflict between the noncontextual hidden variable theory and quantum mechanics is commonly revealed by Kochen-Specker sets of yes-no tests, represented by projectors (or rays), via either logical contradictions or noncontextuality inequalities in a state-(in)dependent manner. Here we propose a systematic and programmable construction of a state-independent proof from a given set of nonspecific rays in C3 according to their Gram matrix. This approach brings us a greater convenience in the experimental arrangements. Besides, our proofs in C3 can also be generalized to any higher-dimensional systems by a recursive method.

  7. Adapting proofs-as-programs the Curry-Howard protocol

    CERN Document Server

    Poernomo, Iman Hafiz; Crossley, John Newsome

    2007-01-01

    Details developments in the direction of a practical proofs-as-programs paradigm, which constitutes a set of approaches to developing programs from proofs in constructive logic with applications to industrial-scale, complex software engineering problems.

  8. 14 CFR 406.155 - Offer of proof.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 4 2010-01-01 2010-01-01 false Offer of proof. 406.155 Section 406.155... Transportation Adjudications § 406.155 Offer of proof. A party whose evidence has been excluded by a ruling of the administrative law judge may offer the evidence for the record on appeal. ...

  9. Interval logic. Proof theory and theorem proving

    DEFF Research Database (Denmark)

    Rasmussen, Thomas Marthedal

    2002-01-01

    of a direction of an interval, and present a sound and complete Hilbert proof system for it. Because of its generality, SIL can conveniently act as a general formalism in which other interval logics can be encoded. We develop proof theory for SIL including both a sequent calculus system and a labelled natural...

  10. 14 CFR 25.307 - Proof of structure.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Proof of structure. 25.307 Section 25.307... STANDARDS: TRANSPORT CATEGORY AIRPLANES Structure General § 25.307 Proof of structure. (a) Compliance with... condition. Structural analysis may be used only if the structure conforms to that for which experience has...

  11. 14 CFR 23.307 - Proof of structure.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Proof of structure. 23.307 Section 23.307... STANDARDS: NORMAL, UTILITY, ACROBATIC, AND COMMUTER CATEGORY AIRPLANES Structure General § 23.307 Proof of structure. (a) Compliance with the strength and deformation requirements of § 23.305 must be shown for each...

  12. Time-dependent embedding

    OpenAIRE

    Inglesfield, J. E.

    2007-01-01

    A method of solving the time-dependent Schr\\"odinger equation is presented, in which a finite region of space is treated explicitly, with the boundary conditions for matching the wave-functions on to the rest of the system replaced by an embedding term added on to the Hamiltonian. This time-dependent embedding term is derived from the Fourier transform of the energy-dependent embedding potential, which embeds the time-independent Schr\\"odinger equation. Results are presented for a one-dimensi...

  13. Field tests on partial embedment effects (embedment effect tests on soil-structure interaction)

    International Nuclear Information System (INIS)

    Kurimoto, O.; Tsunoda, T.; Inoue, T.; Izumi, M.; Kusakabe, K.; Akino, K.

    1993-01-01

    A series of Model Tests of Embedment Effect on Reactor Buildings has been carried out by the Nuclear Power Engineering Corporation (NUPEC), under the sponsorship of the Ministry of International Trade and lndustry (MITI) of Japan. The nuclear reactor buildings are partially embedded due to conditions for the construction or building arrangement in Japan. It is necessary to verify the partial embedment effects by experiments and analytical studies in order to incorporate the effects in the seismic design. Forced vibration tests, therefore, were performed using a model with several types of embedment. Correlated simulation analyses were also performed and the characteristics of partial embedment effects on soil-structure interaction were evaluated. (author)

  14. Autonomous intelligent cars: proof that the EPSRC Principles are future-proof

    NARCIS (Netherlands)

    de Bruin, R.W.; de Cock Buning, M.

    2017-01-01

    Principle 2 of the EPSRC’s principles of robotics (AISB workshop on PrinciplesofRobotics, 2016) proves to be future proof when applied to the current state of the art of law and technology surrounding autonomous intelligent cars (AICs). Humans, not AICS, are responsible agents. AICs should be

  15. Towards a comprehensive knowledge package for teaching proof: A focus on the misconception that empirical arguments are proofs

    Directory of Open Access Journals (Sweden)

    Andreas J. Stylianides

    2011-08-01

    Full Text Available The concept of proof is central to meaningful learning of mathematics, but is hard for students to learn. A serious misconception dominant amongst students at all levels of schooling is that empirical arguments are proofs. An important question, then, is the following: What knowledge might enable teachers to help students overcome this misconception? Earlier research led to construction of a significant but rather incomplete ‘knowledge package’ for teaching in this area. Major elements of this knowledge package are summarised and its further development is contributed to by discussing a research-based instructional intervention found to be effective in helping secondary students begin to overcome the misconception that empirical arguments are proofs. Implications for mathematics teacher education are considered.

  16. Proof, rigour and informality : a virtue account of mathematical knowledge

    OpenAIRE

    Tanswell, Fenner Stanley

    2017-01-01

    This thesis is about the nature of proofs in mathematics as it is practiced, contrasting the informal proofs found in practice with formal proofs in formal systems. In the first chapter I present a new argument against the Formalist-Reductionist view that informal proofs are justified as rigorous and correct by corresponding to formal counterparts. The second chapter builds on this to reject arguments from Gödel's paradox and incompleteness theorems to the claim that mathematics is inherently...

  17. Embedded Systems Design: Optimization Challenges

    DEFF Research Database (Denmark)

    Pop, Paul

    2005-01-01

    Summary form only given. Embedded systems are everywhere: from alarm clocks to PDAs, from mobile phones to cars, almost all the devices we use are controlled by embedded systems. Over 99% of the microprocessors produced today are used in embedded systems, and recently the number of embedded systems...

  18. 14 CFR 16.231 - Offer of proof.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Offer of proof. 16.231 Section 16.231... PRACTICE FOR FEDERALLY-ASSISTED AIRPORT ENFORCEMENT PROCEEDINGS Hearings § 16.231 Offer of proof. A party whose evidence has been excluded by a ruling of the hearing officer may offer the evidence on the record...

  19. 49 CFR 1503.641 - Offer of proof.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 9 2010-10-01 2010-10-01 false Offer of proof. 1503.641 Section 1503.641... Rules of Practice in TSA Civil Penalty Actions § 1503.641 Offer of proof. A party whose evidence has been excluded by a ruling of the ALJ may offer the evidence for the record on appeal. ...

  20. Embedded graph invariants in Chern-Simons theory

    International Nuclear Information System (INIS)

    Major, Seth A.

    1999-01-01

    Chern-Simons gauge theory, since its inception as a topological quantum field theory, has proved to be a rich source of understanding for knot invariants. In this work the theory is used to explore the definition of the expectation value of a network of Wilson lines -- an embedded graph invariant. Using a generalization of the variational method, lowest-order results for invariants for graphs of arbitrary valence and general vertex tangent space structure are derived. Gauge invariant operators are introduced. Higher order results are found. The method used here provides a Vassiliev-type definition of graph invariants which depend on both the embedding of the graph and the group structure of the gauge theory. It is found that one need not frame individual vertices. However, without a global projection of the graph there is an ambiguity in the relation of the decomposition of distinct vertices. It is suggested that framing may be seen as arising from this ambiguity -- as a way of relating frames at distinct vertices

  1. An Investigation of Communication Values and Normative Principles Embedded in a Public/Private Partnership

    National Research Council Canada - National Science Library

    MacDonald, Jessica

    2004-01-01

    .... People cannot work together to solve these problems without communication. this dissertation project examines espoused and embedded preferences for specific communication practices in the context of a public/private partnership...

  2. [Burden of proof in medical cases--presumption of fact and prima facie evidence. 1. Burden of proof].

    Science.gov (United States)

    Sliwka, Marcin

    2004-01-01

    The aim of this paper was to present the main rules concerning the burden of proof in polish civil trials, including medical cases. This paper also describes the subject of evidence were presented and explained. The court influence on evidence procedure was also analysed. The effect of the institution of informed consent on burden of proof in polish civil law is also described. This paper includes numerous High Court sentences on evidential and medical issues.

  3. Visualizing Probabilistic Proof

    OpenAIRE

    Guerra-Pujol, Enrique

    2015-01-01

    The author revisits the Blue Bus Problem, a famous thought-experiment in law involving probabilistic proof, and presents simple Bayesian solutions to different versions of the blue bus hypothetical. In addition, the author expresses his solutions in standard and visual formats, i.e. in terms of probabilities and natural frequencies.

  4. Proof-of-Concept of the Phytoimmobilization Technology for TNX Outfall Delta: Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Kaplan, D.I.

    2001-06-04

    A series of proof-of-principle studies was initiated to evaluate the soil remediation technology, phytoimmobilization, for application at the TNX Outfall Delta (TNX OD) operable unit. Phytoimmobilization involves two steps. The first step is entitled phytoextraction, and it takes place mostly during the spring and summer. During this step the plants extract contaminants from the sediment into the roots and then translocate the contaminants to the aboveground plant parts. The second step is referred to as sequestration and it takes place largely during the autumn and winter when annual plants senesce or deciduous trees drop their leaves. This step involves the immobilization of the contaminant once it leaches form the fallen leaves into a ''geomat,'' a geotextile embedded with mineral sequestering agents. This final report describes the results to date, including those reported in the status report (Kaplan et al. 2000a), those completed since the report was issued, and the preliminary calculations of the phytoimmobilization effectiveness.

  5. CESAR cost-efficient methods and processes for safety-relevant embedded systems

    CERN Document Server

    Wahl, Thomas

    2013-01-01

    The book summarizes the findings and contributions of the European ARTEMIS project, CESAR, for improving and enabling interoperability of methods, tools, and processes to meet the demands in embedded systems development across four domains - avionics, automotive, automation, and rail. The contributions give insight to an improved engineering and safety process life-cycle for the development of safety critical systems. They present new concept of engineering tools integration platform to improve the development of safety critical embedded systems and illustrate capacity of this framework for end-user instantiation to specific domain needs and processes. They also advance state-of-the-art in component-based development as well as component and system validation and verification, with tool support. And finally they describe industry relevant evaluated processes and methods especially designed for the embedded systems sector as well as easy adoptable common interoperability principles for software tool integratio...

  6. On Mathematicians' Proof Skimming: A Reply to Inglis and Alcock

    Science.gov (United States)

    Weber, Keith; Mejia-Ramos, Juan Pablo

    2013-01-01

    n a recent article, Inglis and Alcock (2012) contended that their data challenge the claim that when mathematicians validate proofs, they initially skim a proof to grasp its main idea before reading individual parts of the proof more carefully. This result is based on the fact that when mathematicians read proofs in their study, on average their…

  7. 14 CFR 13.225 - Offer of proof.

    Science.gov (United States)

    2010-01-01

    ... 14 Aeronautics and Space 1 2010-01-01 2010-01-01 false Offer of proof. 13.225 Section 13.225... INVESTIGATIVE AND ENFORCEMENT PROCEDURES Rules of Practice in FAA Civil Penalty Actions § 13.225 Offer of proof. A party whose evidence has been excluded by a ruling of the administrative law judge may offer the...

  8. 34 CFR 34.14 - Burden of proof.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Burden of proof. 34.14 Section 34.14 Education Office of the Secretary, Department of Education ADMINISTRATIVE WAGE GARNISHMENT § 34.14 Burden of proof. (a... those in § 34.24. (d)(1) If you object on the ground that applicable law bars us from collecting the...

  9. Simulation and Embedded Smart Control

    DEFF Research Database (Denmark)

    Conrad, Finn; Fan, Zhun; Sørensen, Torben

    2006-01-01

    The paper presents results obtained from a Danish mechatronic research program focusing on intelligent motion control, simulation and embedded smart controllers for hydraulic actuators and robots as well as results from the EU projects. A mechatronic test facility with digital controllers...... for a hydraulic robot was implemented. The controllers apply digital signal processors (DSPs), and Field Programmable Gate Array, short named as FPGA, respectively. The DSP controller utilizes the dSPACE System that is suitable for real-time experimentation, evaluation and validation of control laws...... and algorithms. Furthermore, a developed IT-tool concept for controller and system design utilizing the ISO 10303 STEP Standard is proposed....

  10. Visual Considerations in the Presentation of Mathematical Proofs

    Directory of Open Access Journals (Sweden)

    Lara Alcock

    2010-11-01

    Full Text Available This article is about visual issues in the presentation of mathematics within teaching situations. It focuses particularly on the presentation of proofs to undergraduate students. We describe some of the decisions that a lecturer must make when presenting a written proof, from the layout of individual equations to the layout of a whole argument on the page. We consider the way in which these decisions are made explicit for lecturers who construct electronic learning resources termed e-Proofs, and conclude by discussing the constraints and affordances of this technology.

  11. In Bed with the Library: A Critical Exploration of Embedded Librarianship at the City University of New York

    Science.gov (United States)

    Pollack, Julia

    2017-01-01

    This project considers the efficacy and scalability of embedded librarianship initiatives within the City University of New York (CUNY) library system and presents findings of an original research study conducted in 2015. Through an analysis of recent LIS literature on embedment, response data from a survey of librarians, and a selection of…

  12. Co-constructive Logics for Proofs and Refutations

    Directory of Open Access Journals (Sweden)

    Trafford James

    2015-01-01

    Full Text Available This paper considers logics which are formally dual to intuitionistic logic in order to investigate a co-constructive logic for proofs and refutations. This is philosophically motivated by a set of problems regarding the nature of constructive truth, and its relation to falsity. It is well known both that intuitionism can not deal constructively with negative information, and that defining falsity by means of intuitionistic negation leads, under widely-held assumptions, to a justification of bivalence. For example, we do not want to equate falsity with the non-existence of a proof since this would render a statement such as “pi is transcendental” false prior to 1882. In addition, the intuitionist account of negation as shorthand for the derivation of absurdity is inadequate, particularly outside of purely mathematical contexts. To deal with these issues, I investigate the dual of intuitionistic logic, co-intuitionistic logic, as a logic of refutation, alongside intuitionistic logic of proofs. Direct proof and refutation are dual to each other, and are constructive, whilst there also exist syntactic, weak, negations within both logics. In this respect, the logic of refutation is weakly paraconsistent in the sense that it allows for statements for which, neither they, nor their negation, are refuted. I provide a proof theory for the co-constructive logic, a formal dualizing map between the logics, and a Kripke-style semantics. This is given an intuitive philosophical rendering in a re-interpretation of Kolmogorov's logic of problems.

  13. New climate-proof cropping systems in dry areas of the Mediterranean region

    DEFF Research Database (Denmark)

    Jacobsen, Sven-Erik

    2014-01-01

    severe consequences of climate changes, under influence of multiple abiotic stresses. These stresses are becoming even more pronounced under changing climate, resulting in drier conditions, increasing temperatures and greater variability, causing desertification. This topic has been addressed in the EU...... FP7 project entitled 'Sustainable water use securing food production in dry areas of the Mediterranean region (SWUP-MED)' working on climate-proof cropping systems in Morocco, Syria, Turkey and southern Europe, collaborating with UK, Denmark and Australia. The results are valid for other parts...

  14. Gödel's Proof

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 12; Issue 5. Gödel's Proof - Incompleteness Theorems. S M Srivastava. General Article Volume 12 Issue 5 May 2007 pp 71-84. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/012/05/0071-0084. Keywords.

  15. Coiled Brine Recovery Assembly (CoBRA) Project

    Data.gov (United States)

    National Aeronautics and Space Administration — The Coiled Brine Recovery Assembly (CoBRA) project will result in a proof-of-concept demonstration for a lightweight, compact, affordable, regenerable and disposable...

  16. Sound Insulation Property Study on Nylon 66 Scrim Reinforced PVF Laminated Membranes and their Composite Sound Proof Structure

    Science.gov (United States)

    Chen, Lihe; Chen, Zhaofeng; Zhang, Xinyang; Wang, Weiwei

    2018-01-01

    In this paper, we investigated the sound insulation property of nylon 66 scrim reinforced PVF laminated membranes and their corresponding composite structures with glass fiber felt and carbon fiber board. Sound transmission loss (STL) was measured by standing wave tube method. The results show that, with the decrease of nylon 66 gridlines spacing, STL of nylon 66 scrim reinforced PVF laminated membranes was improved. The sound insulation performance of laminated membranes with gridlines spacing of 3mm is the best, whose STL was up to 10dB at 6.3 kHz. Besides, STL was improved effectively as air layers were embedded into the composite sound proof construction consist of laminated membrane, glass fiber felt and carbon fiber board.

  17. Embedded software verification and debugging

    CERN Document Server

    Winterholer, Markus

    2017-01-01

    This book provides comprehensive coverage of verification and debugging techniques for embedded software, which is frequently used in safety critical applications (e.g., automotive), where failures are unacceptable. Since the verification of complex systems needs to encompass the verification of both hardware and embedded software modules, this book focuses on verification and debugging approaches for embedded software with hardware dependencies. Coverage includes the entire flow of design, verification and debugging of embedded software and all key approaches to debugging, dynamic, static, and hybrid verification. This book discusses the current, industrial embedded software verification flow, as well as emerging trends with focus on formal and hybrid verification and debugging approaches. Includes in a single source the entire flow of design, verification and debugging of embedded software; Addresses the main techniques that are currently being used in the industry for assuring the quality of embedded softw...

  18. Proof of Concept: Iraqi Enrollment via Voice Authentication Project

    National Research Council Canada - National Science Library

    Lee, Samuel K

    2005-01-01

    ...). The IEVAP is an Office of the Secretary of Defense sponsored research project commissioned to study the feasibility of speaker verification technology in support of the Global War on Terrorism security requirements...

  19. Math Course for Liberal Arts Majors: A Pilot with Embedded Remediation

    Directory of Open Access Journals (Sweden)

    Eileen Perez

    2018-01-01

    Full Text Available This study was designed to determine if embedded remediation is significant in accelerating the pathway to completion of a college-level math course for students needing remediation. The project studied the impact on student success in a quantitative literacy course at a Massachusetts four-year state university with remedial material embedded. The course satisfies the university�s general education math requirement for students with liberal arts majors who are not required to complete college algebra or calculus-based courses. The paper begins with a presentation of the issues with remedial mathematics and its impact on students� graduation and persistence. Next, the paper covers the design and implementation of the pilot program. In addition, the placement criteria and the pilot nature of the program are discussed, including attempts at the random assignment of students to regular or embedded-remediation course groups. A discussion of the findings follows including that students succeeded in the course with embedded remediation at 87% compared to 72% for those in the traditional version of the course though the differences are not statistically significant at the sample size. The paper concludes with lessons learned and next steps at this university for further study.

  20. 41 CFR 60-30.19 - Objections; exceptions; offer of proof.

    Science.gov (United States)

    2010-07-01

    ... exceptions to the Administrative Law Judge's recommendations and conclusions. (c) Offer of proof. An offer of...; offer of proof. 60-30.19 Section 60-30.19 Public Contracts and Property Management Other Provisions... EXECUTIVE ORDER 11246 Hearings and Related Matters § 60-30.19 Objections; exceptions; offer of proof. (a...

  1. A simple proof of Debreu's Gap Lemma | Ouwehand | ORiON

    African Journals Online (AJOL)

    Debreu's Gap Lemma is central to the proof of his fundamental result on the existence of continuous utility functions. A short proof based on a standard textbook construction of utility functions on countable linearly ordered sets is presented here. The proof is accessible to students with limited mathematical background, thus ...

  2. A String of Pearls: Proofs of Fermat's Little Theorem

    Directory of Open Access Journals (Sweden)

    Hing Lun Chan

    2013-01-01

    Full Text Available We discuss mechanised proofs of Fermat's Little Theorem in a variety of styles, focusing in particular on an elegant combinatorial ``necklace'' proof that has not been mechanised previously.What is elegant in prose turns out to be long-winded mechanically, and so we examine the effect of explicitly appealing to group theory. This has pleasant consequences both for the necklace proof, and also for some of the direct number-theoretic approaches.

  3. Another proof of Gell-Mann and Low's theorem

    OpenAIRE

    Molinari, Luca Guido

    2006-01-01

    The theorem by Gell-Mann and Low is a cornerstone in QFT and zero-temperature many-body theory. The standard proof is based on Dyson's time-ordered expansion of the propagator; a proof based on exact identities for the time-propagator is here given.

  4. CLAM - CoLlAborative eMbedded networks for submarine surveillance: An overview

    NARCIS (Netherlands)

    Meratnia, Nirvana; Havinga, Paul J.M.; Casari, Paolo; Petrioli, Chiara; Grythe, Knut; Husoy, Thor; Zorzi, Michele

    2011-01-01

    This paper provides an overview of the CLAM project, which aims at developing a collaborative embedded monitoring and control platform for submarine surveillance by combining cutting edge acoustic vector sensor technology and 1D, 2D, 3D sensor arrays, underwater wireless sensor networks protocol

  5. 16 CFR 23.10 - Misuse of “corrosion proof,” “noncorrosive,” “corrosion resistant,” “rust proof,” “rust resistant...

    Science.gov (United States)

    2010-01-01

    ... INDUSTRIES § 23.10 Misuse of “corrosion proof,” “noncorrosive,” “corrosion resistant,” “rust proof,” “rust resistant,” etc. (a) It is unfair or deceptive to: (1) Use the terms “corrosion proof,” “noncorrosive... the product will be immune from rust and other forms of corrosion during the life expectancy of the...

  6. "You're just one of the group when you're embedded": report from a mixed-method investigation of the research-embedded health librarian experience.

    Science.gov (United States)

    Greyson, Devon; Surette, Soleil; Dennett, Liz; Chatterley, Trish

    2013-10-01

    Embedded librarianship has received much attention in recent years. A model of embeddedness rarely discussed to date is that of research-embedded health librarians (REHLs). This study explores the characteristics of Canadian REHLs and the situations in which they are employed. The authors employed a sequential, mixed-method design. An online survey provided descriptive statistics about REHLs' positions and work experiences. This informed a series of focus group interviews that expanded upon the survey. Through constant comparison, we conducted qualitative descriptive analysis of the interviews. Based on twenty-nine survey responses and four group interviews, we created a portrait of a "typical" REHL and discovered themes relevant to REHL work. REHLs may identify more strongly as researchers than as librarians, with corresponding professional needs and rewards. REHLs value "belonging" to the research team, involvement in full project lifecycles, and in-depth relationships with nonlibrarian colleagues. Despite widely expressed job satisfaction, many REHLs struggle with isolation from library and information science peers and relative lack of job security. REHLs differ from non-embedded health librarians, as well as from other types of embedded librarians. REHLs' work also differs from just a decade or two ago, prior to widespread Internet access to digital resources. Given that research-embedded librarianship appears to be a distinct and growing subset of health librarianship, libraries, master's of library and information science programs, and professional associations will need to respond to the support and education needs of REHLs or risk losing them to the health research field.

  7. How Mathematicians Determine if an Argument Is a Valid Proof

    Science.gov (United States)

    Weber, Keith

    2008-01-01

    The purpose of this article is to investigate the mathematical practice of proof validation--that is, the act of determining whether an argument constitutes a valid proof. The results of a study with 8 mathematicians are reported. The mathematicians were observed as they read purported mathematical proofs and made judgments about their validity;…

  8. The quadratic reciprocity law a collection of classical proofs

    CERN Document Server

    Baumgart, Oswald

    2015-01-01

    This book is the English translation of Baumgart’s thesis on the early proofs of the quadratic reciprocity law (“Über das quadratische Reciprocitätsgesetz. Eine vergleichende Darstellung der Beweise”), first published in 1885. It is divided into two parts. The first part presents a very brief history of the development of number theory up to Legendre, as well as detailed descriptions of several early proofs of the quadratic reciprocity law. The second part highlights Baumgart’s comparisons of the principles behind these proofs. A current list of all known proofs of the quadratic reciprocity law, with complete references, is provided in the appendix. This book will appeal to all readers interested in elementary number theory and the history of number theory.

  9. Another proof of Gell-Mann and Low's theorem

    International Nuclear Information System (INIS)

    Molinari, Luca Guido

    2007-01-01

    The theorem by Gell-Mann and Low is a cornerstone in quantum field theory and zero-temperature many-body theory. The standard proof is based on Dyson's time-ordered expansion of the propagator; a proof based on exact identities for the time propagator is here given

  10. Microstructural investigation of variations in the proof strength of Nimonic PE16

    International Nuclear Information System (INIS)

    Riley, B.F.; Wilson, E.G.; Jones, A.R.

    1987-01-01

    Nimonic PE16 shows a correlation of stress rupture behaviour after irradiation with proof strength. Proof testing of material from bars from several casts yielded a relationship (Hall-Petch) between the peak-aged proof stress and grain size -1/2 but the scatter in proof stress values at a given grain size merited further microstructural study. Transmission electron microscopy revealed that high proof stress material contained dislocation densities consistent with material which had received 1 to 2% cold work, verified by examination of lightly prestrained tensile specimens. Ageing to peak strength induced partial recovery but some variability in proof stress remained. Variations in γ' size and composition having been eliminated, the scatter in proof stress values was attributed to variable cold work induced by the commercial bar straightening process. (Author)

  11. Accounting for Proof Test Data in a Reliability Based Design Optimization Framework

    Science.gov (United States)

    Ventor, Gerharad; Scotti, Stephen J.

    2012-01-01

    This paper investigates the use of proof (or acceptance) test data during the reliability based design optimization of structural components. It is assumed that every component will be proof tested and that the component will only enter into service if it passes the proof test. The goal is to reduce the component weight, while maintaining high reliability, by exploiting the proof test results during the design process. The proposed procedure results in the simultaneous design of the structural component and the proof test itself and provides the designer with direct control over the probability of failing the proof test. The procedure is illustrated using two analytical example problems and the results indicate that significant weight savings are possible when exploiting the proof test results during the design process.

  12. Mobile Data Collection Applications: A Proof of Concept

    International Nuclear Information System (INIS)

    Chang, J

    2006-01-01

    This project's goal is to provide a proof of concept for mobile data collection applications, and identify the best ways such applications could be implemented and used. Such an application should decrease the time and resources users now need to devote to redundant data processes, and provide an easy of locating and retrieving data at a later time. The two types of available mobile devices, Personal Digital Assistants and Tablet Personal Computers, each have their particular strengths that suggest themselves for certain types of applications. As such, parallel data collection applications have been developed, with a common web application for uploading information to the database. While these aspects have been developed and proven, it still remains to refine these applications, develop the tables to hold their data, and field-test with users for their feedback

  13. New results on embeddings of polyhedra and manifolds in Euclidean spaces

    International Nuclear Information System (INIS)

    Repovs, D; Skopenkov, A B

    1999-01-01

    The aim of this survey is to present several classical results on embeddings and isotopies of polyhedra and manifolds in R m . We also describe the revival of interest in this beautiful branch of topology and give an account of new results, including an improvement of the Haefliger-Weber theorem on the completeness of the deleted product obstruction to embeddability and isotopy of highly connected manifolds in R m (Skopenkov) as well as the unimprovability of this theorem for polyhedra (Freedman, Krushkal, Teichner, Segal, Skopenkov, and Spiez) and for manifolds without the necessary connectedness assumption (Skopenkov). We show how algebraic obstructions (in terms of cohomology, characteristic classes, and equivariant maps) arise from geometric problems of embeddability in Euclidean spaces. Several classical and modern results on completeness or incompleteness of these obstructions are stated and proved. By these proofs we illustrate classical and modern tools of geometric topology (engulfing, the Whitney trick, van Kampen and Casson finger moves, and their generalizations)

  14. Embracing the Future: Embedding Digital Repositories in Higher Education Institutions. Research Brief

    Science.gov (United States)

    Hoorens, Stijn; van Dijk, Lidia Villalba; van Stolk, Christian

    2009-01-01

    This briefing paper captures the key findings and recommendations of a study commissioned by the Joint Information Systems Committee on aspects of the strategic commitment of institutions to repository sustainability. This project, labelled EMBRACE (EMBedding Repositories And Consortial Enhancement), is aimed at enhancing the functionality,…

  15. A portable virtual machine target for proof-carrying code

    DEFF Research Database (Denmark)

    Franz, Michael; Chandra, Deepak; Gal, Andreas

    2005-01-01

    Virtual Machines (VMs) and Proof-Carrying Code (PCC) are two techniques that have been used independently to provide safety for (mobile) code. Existing virtual machines, such as the Java VM, have several drawbacks: First, the effort required for safety verification is considerable. Second and mor...... simultaneously providing efficient justin-time compilation and target-machine independence. In particular, our approach reduces the complexity of the required proofs, resulting in fewer proof obligations that need to be discharged at the target machine....

  16. Fault tolerant embedded computers and power electronics for nuclear robotics

    International Nuclear Information System (INIS)

    Giraud, A.; Robiolle, M.

    1995-01-01

    For requirements of nuclear industries, it is necessary to use embedded rad-tolerant electronics and high-level safety. In this paper, we first describe a computer architecture called MICADO designed for French nuclear industry. We then present outgoing projects on our industry. A special point is made on power electronics for remote-operated and legged robots. (authors). 7 refs., 2 figs

  17. Fault tolerant embedded computers and power electronics for nuclear robotics

    Energy Technology Data Exchange (ETDEWEB)

    Giraud, A.; Robiolle, M.

    1995-12-31

    For requirements of nuclear industries, it is necessary to use embedded rad-tolerant electronics and high-level safety. In this paper, we first describe a computer architecture called MICADO designed for French nuclear industry. We then present outgoing projects on our industry. A special point is made on power electronics for remote-operated and legged robots. (authors). 7 refs., 2 figs.

  18. Proof-of-Concept of the Phytoimmobilization Technology for TNX Outfall Delta: Final Report; FINAL

    International Nuclear Information System (INIS)

    Kaplan, D.I.

    2001-01-01

    A series of proof-of-principle studies was initiated to evaluate the soil remediation technology, phytoimmobilization, for application at the TNX Outfall Delta (TNX OD) operable unit. Phytoimmobilization involves two steps. The first step is entitled phytoextraction, and it takes place mostly during the spring and summer. During this step the plants extract contaminants from the sediment into the roots and then translocate the contaminants to the aboveground plant parts. The second step is referred to as sequestration and it takes place largely during the autumn and winter when annual plants senesce or deciduous trees drop their leaves. This step involves the immobilization of the contaminant once it leaches form the fallen leaves into a ''geomat,'' a geotextile embedded with mineral sequestering agents. This final report describes the results to date, including those reported in the status report (Kaplan et al. 2000a), those completed since the report was issued, and the preliminary calculations of the phytoimmobilization effectiveness

  19. Relativistic particle dynamics: Lagrangian proof of the no-interaction theorem

    International Nuclear Information System (INIS)

    Marmo, G.; Mukunda, N.; Sudarshan, E.C.G.

    1983-11-01

    An economical proof is given, in the Lagrangian framework, of the No Interaction Theorem of relativistic particle mechanics. It is based on the assumption that there is a Lagrangian, which if singular is allowed to lead at most to primary first class constraints. The proof works with Lagrange rather than Poisson brackets, leading to considerable simplifications compared to other proofs

  20. The direct Flow parametric Proof of Gauss' Divergence Theorem revisited

    DEFF Research Database (Denmark)

    Markvorsen, Steen

    The standard proof of the divergence theorem in undergraduate calculus courses covers the theorem for static domains between two graph surfaces. We show that within first year undergraduate curriculum, the flow proof of the dynamic version of the divergence theorem - which is usually considered...... we apply the key instrumental concepts and verify the various steps towards this alternative proof of the divergence theorem....

  1. Three Styles Characterising Mathematicians' Pedagogical Perspectives on Proof

    Science.gov (United States)

    Hemmi, Kirsti

    2010-01-01

    The article describes mathematicians' pedagogical perspectives on proof in the teaching of first year university students at a mathematics department in Sweden. A conceptual frame that was used in the data analysis combines theories about proof from earlier mathematics education research with a social practice approach of Lave and Wenger. A…

  2. Reliability analysis of structures under periodic proof tests in service

    Science.gov (United States)

    Yang, J.-N.

    1976-01-01

    A reliability analysis of structures subjected to random service loads and periodic proof tests treats gust loads and maneuver loads as random processes. Crack initiation, crack propagation, and strength degradation are treated as the fatigue process. The time to fatigue crack initiation and ultimate strength are random variables. Residual strength decreases during crack propagation, so that failure rate increases with time. When a structure fails under periodic proof testing, a new structure is built and proof-tested. The probability of structural failure in service is derived from treatment of all the random variables, strength degradations, service loads, proof tests, and the renewal of failed structures. Some numerical examples are worked out.

  3. 33 CFR 136.233 - Proof.

    Science.gov (United States)

    2010-07-01

    ... SOURCE; AND ADVERTISEMENT Procedures for Particular Claims § 136.233 Proof. In addition to the... must be established. (d) Whether alternative employment or business was available and undertaken and...

  4. Surveys of embedded piping for Shoreham license termination

    International Nuclear Information System (INIS)

    Williams, D.E. Jr.

    2004-01-01

    In planning the decommissioning of the Shoreham Nuclear Power Station (SNPS) in Wading River, N.Y., it was determined that the cost of removing contaminated floor drain piping was prohibitive. The piping is typically embedded approximately four feet deep in reinforced concrete, often below structural I-beams. A decision was made to develop remote survey devices ('pipe crawlers') that would allow SNPS to decontaminate and survey embedded piping within NRC free release limits. Pipe crawlers currently in use at SNPS are able to traverse multiple 45 and 90 degree bends while maintaining all detectors in the required geometry (less than 1 cm detector to surface distance). The following aspects of this project will be presented: 1) System classification and cost-benefit analysis 2) Overview of system decontamination 3) Pipe crawler mechanical and electrical development 4) Detector backgrounds and MDA's 5) Additional devices and techniques 6) NRC position on crawler use. 7) SNPS results to date. (author)

  5. Embedding Complementarity in HCI Methods

    DEFF Research Database (Denmark)

    Nielsen, Janni; Yssing, Carsten; Tweddell Levinsen, Karin

    2007-01-01

    Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded in the tec......Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded...

  6. Smart Multicore Embedded Systems

    DEFF Research Database (Denmark)

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where very...... specificities of various embedded systems from different industries. Parallel programming tool-chains are described that take as input parameters both the application and the platform model, then determine relevant transformations and mapping decisions on the concrete platform, minimizing user intervention...... and hiding the difficulties related to the correct and efficient use of memory hierarchy and low level code generation. Describes tools and programming models for multicore embedded systems Emphasizes throughout performance per watt scalability Discusses realistic limits of software parallelization Enables...

  7. Reversal burden of proof on corruption in Indonesia

    Directory of Open Access Journals (Sweden)

    Hibnu Nugroho

    2018-03-01

    Full Text Available Corruption becomes the greatest enemy most countries face including Indonesia. Commitment to eradicate corruption significantly increases yet it would be meaningless if it is not supported by adequate legislation to implement the law effectively. Reversal burden of proof essentially aims to facilitate law enforcers to seek and disclose assets a suspect owns allegedly as corruption crime. The principle of reversal burden of proof was originated from Anglo-Saxon countries and this still applies to certain cases such as bribery-related gratifications as Malaysia and Singapore implement. In Indonesia, provisions on the principle of reversal burden of proof have been long recognized even since 1960 on the first law on corruption crimes. Nevertheless, for more than a half of century, the provision on reversal burden of proof has never been implemented. It occurs since articles which govern the issues barely provide clear regulation. It only mentions the principle yet never issues an implemented regulation to support the principle. In regards to this, the research is aimed at investigating, seeking and analyzing the weaknesses in implementing the principle of reversal burden of proof in corruption crimes recently as well as discussing obstacles in law enforcement.

  8. Detection of Tropical Fungi in Formalin-Fixed, Paraffin-Embedded Tissue: Still an Indication for Microscopy in Times of Sequence-Based Diagnosis?

    Directory of Open Access Journals (Sweden)

    Hagen Frickmann

    2015-01-01

    Full Text Available Introduction. The aim of the study was the evaluation of panfungal PCR protocols with subsequent sequence analysis for the diagnostic identification of invasive mycoses in formalin-fixed, paraffin-embedded tissue samples with rare tropical mycoses. Materials and Methods. Five different previously described panfungal PCR/sequencing protocols targeting 18S and 28S ribosomal RNA gene fragments as well as internal transcribed spacer 1 and 2 fragments were evaluated with a collection of 17 formalin-fixed, paraffin-embedded tissue samples of patients with rare and/or tropical invasive mycoses, comprising chromoblastomycosis, coccidioidomycosis, cryptococcosis, histoplasmosis, mucormycosis, mycetoma/maduromycosis, and rhinosporidiosis, in a proof-of-principle analysis. Results. The primers of the panfungal PCRs readily and predominantly reacted with contaminating environmental fungi that had deposited on the paraffin blocks. Altogether three sequence results of histoplasmosis and mycetoma samples that matched the histological assessment were associated with sample age <10 years and virtually without PCR inhibition. Conclusions. The high risk of amplifying environmental contaminants severely reduces the usefulness of the assessed panfungal PCR/sequencing protocols for the identification of rare and/or tropical mycoses in stored formalin-fixed, paraffin-embedded tissues. Histological assessment remains valuable for such indications if cultural differentiation is impossible from inactivated sample material.

  9. Embedding research to improve program implementation in Latin America and the Caribbean.

    Science.gov (United States)

    Tran, Nhan; Langlois, Etienne V; Reveiz, Ludovic; Varallyay, Ilona; Elias, Vanessa; Mancuso, Arielle; Becerra-Posada, Francisco; Ghaffar, Abdul

    2017-06-08

    In the last 10 years, implementation research has come to play a critical role in improving the implementation of already-proven health interventions by promoting the systematic uptake of research findings and other evidence-based strategies into routine practice. The Alliance for Health Policy and Systems Research and the Pan American Health Organization implemented a program of embedded implementation research to support health programs in Latin America and the Caribbean (LAC) in 2014-2015. A total of 234 applications were received from 28 countries in the Americas. The Improving Program Implementation through Embedded Research (iPIER) scheme supported 12 implementation research projects led by health program implementers from nine LAC countries: Argentina, Bolivia, Brazil, Chile, Colombia, Mexico, Panama, Peru, and Saint Lucia. Through this experience, we learned that the "insider" perspective, which implementers bring to the research proposal, is particularly important in identifying research questions that focus on the systems failures that often manifest in barriers to implementation. This paper documents the experience of and highlights key conclusions about the conduct of embedded implementation research. The iPIER experience has shown great promise for embedded research models that place implementers at the helm of implementation research initiatives.

  10. Big Data Clustering via Community Detection and Hyperbolic Network Embedding in IoT Applications.

    Science.gov (United States)

    Karyotis, Vasileios; Tsitseklis, Konstantinos; Sotiropoulos, Konstantinos; Papavassiliou, Symeon

    2018-04-15

    In this paper, we present a novel data clustering framework for big sensory data produced by IoT applications. Based on a network representation of the relations among multi-dimensional data, data clustering is mapped to node clustering over the produced data graphs. To address the potential very large scale of such datasets/graphs that test the limits of state-of-the-art approaches, we map the problem of data clustering to a community detection one over the corresponding data graphs. Specifically, we propose a novel computational approach for enhancing the traditional Girvan-Newman (GN) community detection algorithm via hyperbolic network embedding. The data dependency graph is embedded in the hyperbolic space via Rigel embedding, allowing more efficient computation of edge-betweenness centrality needed in the GN algorithm. This allows for more efficient clustering of the nodes of the data graph in terms of modularity, without sacrificing considerable accuracy. In order to study the operation of our approach with respect to enhancing GN community detection, we employ various representative types of artificial complex networks, such as scale-free, small-world and random geometric topologies, and frequently-employed benchmark datasets for demonstrating its efficacy in terms of data clustering via community detection. Furthermore, we provide a proof-of-concept evaluation by applying the proposed framework over multi-dimensional datasets obtained from an operational smart-city/building IoT infrastructure provided by the Federated Interoperable Semantic IoT/cloud Testbeds and Applications (FIESTA-IoT) testbed federation. It is shown that the proposed framework can be indeed used for community detection/data clustering and exploited in various other IoT applications, such as performing more energy-efficient smart-city/building sensing.

  11. Proof of the positive energy theorem including the angular momentum contribution

    International Nuclear Information System (INIS)

    Zhang Jingfei; Chee, G.Y.; Guo Yongxin

    2005-01-01

    A proof of the positive energy theorem of general relativity is given. In this proof the gravitational Lagrangian is identified with that of Lau and is equivalent to the teleparallel Lagrangian modulo, a boundary term. The approach adopted in this proof uses the two-spinor method and the extended Witten identities and then combines the Brown-York and the Nester-Witten approaches. At the same time the proof is extended to the case involving the contribution of angular momentum by choosing a special shift vector

  12. ORION - Crew Module Side Hatch: Proof Pressure Test Anomaly Investigation

    Science.gov (United States)

    Evernden, Brent A.; Guzman, Oscar J.

    2018-01-01

    The Orion Multi-Purpose Crew Vehicle program was performing a proof pressure test on an engineering development unit (EDU) of the Orion Crew Module Side Hatch (CMSH) assembly. The purpose of the proof test was to demonstrate structural capability, with margin, at 1.5 times the maximum design pressure, before integrating the CMSH to the Orion Crew Module structural test article for subsequent pressure testing. The pressure test was performed at lower pressures of 3 psig, 10 psig and 15.75 psig with no apparent abnormal behavior or leaking. During pressurization to proof pressure of 23.32 psig, a loud 'pop' was heard at 21.3 psig. Upon review into the test cell, it was noted that the hatch had prematurely separated from the proof test fixture, thus immediately ending the test. The proof pressure test was expected be a simple verification but has since evolved into a significant joint failure investigation from both Lockheed Martin and NASA.

  13. Communicating embedded systems networks applications

    CERN Document Server

    Krief, Francine

    2013-01-01

    Embedded systems become more and more complex and require having some knowledge in various disciplines such as electronics, data processing, telecommunications and networks. Without detailing all the aspects related to the design of embedded systems, this book, which was written by specialists in electronics, data processing and telecommunications and networks, gives an interesting point of view of communication techniques and problems in embedded systems. This choice is easily justified by the fact that embedded systems are today massively communicating and that telecommunications and network

  14. Advances in embedded computer vision

    CERN Document Server

    Kisacanin, Branislav

    2014-01-01

    This illuminating collection offers a fresh look at the very latest advances in the field of embedded computer vision. Emerging areas covered by this comprehensive text/reference include the embedded realization of 3D vision technologies for a variety of applications, such as stereo cameras on mobile devices. Recent trends towards the development of small unmanned aerial vehicles (UAVs) with embedded image and video processing algorithms are also examined. The authoritative insights range from historical perspectives to future developments, reviewing embedded implementation, tools, technolog

  15. Car sequencing is NP-hard: a short proof

    OpenAIRE

    B Estellon; F Gardi

    2013-01-01

    In this note, a new proof is given that the car sequencing (CS) problem is NP-hard. Established from the Hamiltonian Path problem, the reduction is direct while closing some gaps remaining in the previous NP-hardness results. Since CS is studied in many operational research courses, this result and its proof are particularly interesting for teaching purposes.

  16. A new proof of the positive energy theorem

    International Nuclear Information System (INIS)

    Witten, E.

    1981-01-01

    A new proof is given of the positive energy theorem of classical general relativity. Also, a new proof is given that there are no asymptotically Euclidean gravitational instantons. (These theorems have been proved previously, by a different method, by Schoen and Yau). The relevance of these results to the stability of Minkowski space is discussed. (orig.)

  17. A proof challenge: multiple alignment and information compression

    OpenAIRE

    Wolff, J Gerard

    2014-01-01

    These notes pose a "proof challenge": a proof, or disproof, of the proposition that "For any given body of information, I, expressed as a one-dimensional sequence of atomic symbols, a multiple alignment concept, described in the document, provides a means of encoding all the redundancy that may exist in I. Aspects of the challenge are described.

  18. 29 CFR 1919.73 - Unit proof test and examination of derricks.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 7 2010-07-01 2010-07-01 false Unit proof test and examination of derricks. 1919.73 Section 1919.73 Labor Regulations Relating to Labor (Continued) OCCUPATIONAL SAFETY AND HEALTH... Devices § 1919.73 Unit proof test and examination of derricks. (a) Unit proof tests of derricks shall be...

  19. Proofs from THE BOOK

    CERN Document Server

    Aigner, Martin

    2014-01-01

    This revised and enlarged fifth edition features four new chapters, which contain highly original and delightful proofs for classics such as the spectral theorem from linear algebra, some more recent jewels like the non-existence of the Borromean rings and other surprises. From the Reviews "... Inside PFTB (Proofs from The Book) is indeed a glimpse of mathematical heaven, where clever insights and beautiful ideas combine in astonishing and glorious ways. There is vast wealth within its pages, one gem after another. ... Aigner and Ziegler... write: "... all we offer is the examples that we have selected, hoping that our readers will share our enthusiasm about brilliant ideas, clever insights and wonderful observations." I do. ... " Notices of the AMS, August 1999 "... This book is a pleasure to hold and to look at: ample margins, nice photos, instructive pictures, and beautiful drawings ... It is a pleasure to read as well: the style is clear and entertaining, the level is close to elementary, the necessary b...

  20. Towards a climate-proof Netherlands. Summary routeplanner

    International Nuclear Information System (INIS)

    Van Drunen, M.

    2007-03-01

    There is no doubt about it: the climate is changing and the effects are now tangible and predictable. Scientific research has shown that even if we make significant reductions in greenhouse gas emissions (mitigation), climate change cannot be prevented. Which is why we have to adapt to make the effects of the changing climate acceptable: the Netherlands must be made climate-proof. To stimulate climate-proofing, four ministries and the Climate changes Spatial Planning (CcSP), Living with Water (LmW) and Habiforum research programmes have established a National Programme on Adapting Spatial Planning to Climate Change (ARK). The core research questions examined by ARK are: What is the nature and scale of the observable and expected impacts of climate change for various themes and economic sectors?; What spatial issues do they raise?; How can we tackle these spatial issues?; What dilemmas (technical, administrative, economic, social) will we face when trying to resolve these issues? The Routeplanner is the scientific arm of ARK: the three research programmes, assisted by other research institutes, supply ARK with scientific information and insights on climate-proofing the spatial development of the Netherlands. This brochure summarises the outcome of phase 2 of Routeplanner, which took place in 2006. It consisted of a Climate-proofing Baseline Assessment, a review (Quickscan) of knowledge gaps, formulation of adaptation strategies, a qualitative assessment of adaptation options, a quantitative assessment of adaptation options and identification of case studies. This brochure answers the following questions, as far as current scientific understanding permits: How will climate change affect the Netherlands?; What are the consequences of climate change for the Netherlands?; What must be done?; When must we act?; What examples are there of climate-proof strategies?; What next? The main conclusion of the Routeplanner is that climate change can cause considerable damage in

  1. Response to the Comment by G. Emch on projective group representations in quaternionic Hilbert space

    International Nuclear Information System (INIS)

    Adler, S.L.

    1996-01-01

    We discuss the differing definitions of complex and quaternionic projective group representations employed by us and by Emch. The definition of Emch (termed here a strong projective representation) is too restrictive to accommodate quaternionic Hilbert space embeddings of complex projective representations. Our definition (termed here a weak projective representation) encompasses such embeddings, and leads to a detailed theory of quaternionic, as well as complex, projective group representations. copyright 1996 American Institute of Physics

  2. Design Methodologies for Secure Embedded Systems

    CERN Document Server

    Biedermann, Alexander

    2011-01-01

    Embedded systems have been almost invisibly pervading our daily lives for several decades. They facilitate smooth operations in avionics, automotive electronics, or telecommunication. New problems arise by the increasing employment, interconnection, and communication of embedded systems in heterogeneous environments: How secure are these embedded systems against attacks or breakdowns? Therefore, how can embedded systems be designed to be more secure? And how can embedded systems autonomically react to threats? Facing these questions, Sorin A. Huss is significantly involved in the exploration o

  3. Dynamic PROOF clusters with PoD: architecture and user experience

    Science.gov (United States)

    Manafov, Anar

    2011-12-01

    PROOF on Demand (PoD) is a tool-set, which sets up a PROOF cluster on any resource management system. PoD is a user oriented product with an easy to use GUI and a command-line interface. It is fully automated. No administrative privileges or special knowledge is required to use it. PoD utilizes a plug-in system, to use different job submission front-ends. The current PoD distribution is shipped with LSF, Torque (PBS), Grid Engine, Condor, gLite, and SSH plug-ins. The product is to be extended. We therefore plan to implement a plug-in for AliEn Grid as well. Recently developed algorithms made it possible to efficiently maintain two types of connections: packet-forwarding and native PROOF connections. This helps to properly handle most kinds of workers, with and without firewalls. PoD maintains the PROOF environment automatically and, for example, prevents resource misusage in case when workers idle for too long. As PoD matures as a product and provides more plug-ins, it's used as a standard for setting up dynamic PROOF clusters in many different institutions. The GSI Analysis Facility (GSIAF) is in production since 2007. The static PROOF cluster has been phased out end of 2009. GSIAF is now completely based on PoD. Users create private dynamic PROOF clusters on the general purpose batch farm. This provides an easier resource sharing between interactive local batch and Grid usage. The main user communities are FAIR and ALICE.

  4. Proof pressure tests of the PCPVs at Hinkley Point B and Hunterston B

    International Nuclear Information System (INIS)

    Eadie, D.McD.; Bell, D.J.

    1976-01-01

    The two PCPVs at Hinkley Point B were pressure tested in August 1973 and April 1974. The first vessel at Hunterston B was tested in December, 1973, and the second early in 1975. The vessels were pressurised up to 709 psig and, at various stages of pressurisation, readings were taken of external deflections, internal corner deflections and concrete strains. Surveys were taken of external concrete cracks and of crack gauges embedded in the concrete near the re-entrant corners. The external vessel deflections were measured optically using telescopes, targets and invar tapes. In some cases a recent design of manometric equipment was used to monitor the vertical deflections of the top slab during pressurisation and at proof pressure when access to the vessel was not possible for safety reasons. Internal concrete strains were measured using vibrating wire strain gauges. A brief description is given of the various measuring devices used. Deflection readings were also taken of some penetration primary closures. Summaries of the various recorded readings are given and compared with the design analyses. (author)

  5. Embedding of ESD in Engineering Education: Experiences from Chalmers University of Technology

    Science.gov (United States)

    Svanstrom, Magdalena; Palme, Ulrika; Wedel, Maria Knutson; Carlson, Ola; Nystrom, Thomas; Eden, Michael

    2012-01-01

    Purpose: The purpose of this paper is to report on methods developed, within a three-year Education for Sustainable Development (ESD) project at Chalmers University of Technology in Gothenburg, Sweden, to achieve a higher degree of embedding of ESD in engineering programmes. The major emphasis is on methods used, results achieved and lessons…

  6. Towards Verification of Constituent Systems through Automated Proof

    DEFF Research Database (Denmark)

    Couto, Luis Diogo Monteiro Duarte; Foster, Simon; Payne, R

    2014-01-01

    This paper explores verification of constituent systems within the context of the Symphony tool platform for Systems of Systems (SoS). Our SoS modelling language, CML, supports various contractual specification elements, such as state invariants and operation preconditions, which can be used...... to specify contractual obligations on the constituent systems of a SoS. To support verification of these obligations we have developed a proof obligation generator and theorem prover plugin for Symphony. The latter uses the Isabelle/HOL theorem prover to automatically discharge the proof obligations arising...... from a CML model. Our hope is that the resulting proofs can then be used to formally verify the conformance of each constituent system, which is turn would result in a dependable SoS....

  7. Preservice Mathematics Teachers' Metaphorical Perceptions towards Proof and Proving

    Science.gov (United States)

    Ersen, Zeynep Bahar

    2016-01-01

    Since mathematical proof and proving are in the center of mathematics; preservice mathematics teachers' perceptions against these concepts have a great importance. Therefore, the study aimed to determine preservice mathematics teachers' perceptions towards proof and proving through metaphors. The participants consisted of 192 preservice…

  8. Promoting the inclusion of Afghan women and men in research: reflections from research and community partners involved in implementing a 'proof of concept' project.

    Science.gov (United States)

    Riggs, Elisha; Yelland, Jane; Szwarc, Josef; Casey, Sue; Chesters, Donna; Duell-Piening, Philippa; Wahidi, Sayed; Fouladi, Fatema; Brown, Stephanie

    2015-01-31

    With mounting evidence that poor maternal and child health outcomes are related to the social determinants of health, researchers need to engage with vulnerable and isolated communities to gather the evidence that is essential to determine appropriate solutions. Conventional research methods may not ensure the degree and quality of participation that is necessary for meaningful study findings. Participatory methods provide reciprocal opportunities for often excluded communities to both take part in, and guide the conduct of research. The Having a baby in a new country research project was undertaken to provide evidence about how women and men of refugee background experience health services at the time of having a baby. This two year, multifaceted proof of concept study comprised: 1) an organisational partnership to oversee the project; 2) a community engagement framework including: female and male Afghan community researchers, community and sector stakeholder advisory groups and community consultation and engagement. Inclusive research strategies that address power imbalances in research, and diversity of and within communities, are necessary to obtain the evidence required to address health inequalities in vulnerable populations. Such an approach involves mindfully adapting research processes to ensure that studies have regard for the advice of community members about the issues that affect them. Researchers have much to gain by committing time and resources to engaging communities in reciprocal ways in research processes.

  9. A short proof of increased parabolic regularity

    Directory of Open Access Journals (Sweden)

    Stephen Pankavich

    2015-08-01

    Full Text Available We present a short proof of the increased regularity obtained by solutions to uniformly parabolic partial differential equations. Though this setting is fairly introductory, our new method of proof, which uses a priori estimates and an inductive method, can be extended to prove analogous results for problems with time-dependent coefficients, advection-diffusion or reaction diffusion equations, and nonlinear PDEs even when other tools, such as semigroup methods or the use of explicit fundamental solutions, are unavailable.

  10. Bribe-proof Rules in the Division Problem

    OpenAIRE

    Jordi MassóAuthor-Email:; Alejandro Neme

    2003-01-01

    The division problem consists of allocating an amount of a perfectly divisible good among a group of n agents with single-peaked preferences. A rule maps preference profiles into n shares of the amount to be allocated. A rule is bribe-proof if no group of agents can compensate another agent to misrepresent his preference and, after an appropriate redistribution of their shares, each obtain a strictly preferred share. We characterize all bribe-proof rules as the class of efficient, strategy-pr...

  11. 29 CFR 1919.71 - Unit proof test and examination of cranes.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 7 2010-07-01 2010-07-01 false Unit proof test and examination of cranes. 1919.71 Section... § 1919.71 Unit proof test and examination of cranes. (a) Unit proof tests of cranes shall be carried out at the following times: (1) In the cases of new cranes, before initial use and every 4 years...

  12. Burden of Proof in Bioethics.

    Science.gov (United States)

    Koplin, Julian J; Selgelid, Michael J

    2015-11-01

    A common strategy in bioethics is to posit a prima facie case in favour of one policy, and to then claim that the burden of proof (that this policy should be rejected) falls on those with opposing views. If the burden of proof is not met, it is claimed, then the policy in question should be accepted. This article illustrates, and critically evaluates, examples of this strategy in debates about the sale of organs by living donors, human enhancement, and the precautionary principle. We highlight general problems with this style of argument, and particular problems with its use in specific cases. We conclude that the burden ultimately falls on decision-makers (i.e. policy-makers) to choose the policy supported by the best reasons. © 2015 John Wiley & Sons Ltd.

  13. Electronics for embedded systems

    CERN Document Server

    Bindal, Ahmet

    2017-01-01

    This book provides semester-length coverage of electronics for embedded systems, covering most common analog and digital circuit-related issues encountered while designing embedded system hardware. It is written for students and young professionals who have basic circuit theory background and want to learn more about passive circuits, diode and bipolar transistor circuits, the state-of-the-art CMOS logic family and its interface with older logic families such as TTL, sensors and sensor physics, operational amplifier circuits to condition sensor signals, data converters and various circuits used in electro-mechanical device control in embedded systems. The book also provides numerous hardware design examples by integrating the topics learned in earlier chapters. The last chapter extensively reviews the combinational and sequential logic design principles to be able to design the digital part of embedded system hardware.

  14. The direct Flow parametric Proof of Gauss' Divergence Theorem revisited

    OpenAIRE

    Markvorsen, Steen

    2006-01-01

    The standard proof of the divergence theorem in undergraduate calculus courses covers the theorem for static domains between two graph surfaces. We show that within first year undergraduate curriculum, the flow proof of the dynamic version of the divergence theorem - which is usually considered only much later in more advanced math courses - is comprehensible with only a little extension of the first year curriculum. Moreover, it is more intuitive than the static proof. We support this intuit...

  15. Brauer type embedding problems

    CERN Document Server

    Ledet, Arne

    2005-01-01

    This monograph is concerned with Galois theoretical embedding problems of so-called Brauer type with a focus on 2-groups and on finding explicit criteria for solvability and explicit constructions of the solutions. The advantage of considering Brauer type embedding problems is their comparatively simple condition for solvability in the form of an obstruction in the Brauer group of the ground field. This book presupposes knowledge of classical Galois theory and the attendant algebra. Before considering questions of reducing the embedding problems and reformulating the solvability criteria, the

  16. Embedded Systems Design with FPGAs

    CERN Document Server

    Pnevmatikatos, Dionisios; Sklavos, Nicolas

    2013-01-01

    This book presents methodologies for modern applications of embedded systems design, using field programmable gate array (FPGA) devices.  Coverage includes state-of-the-art research from academia and industry on a wide range of topics, including advanced electronic design automation (EDA), novel system architectures, embedded processors, arithmetic, dynamic reconfiguration and applications. Describes a variety of methodologies for modern embedded systems design;  Implements methodologies presented on FPGAs; Covers a wide variety of applications for reconfigurable embedded systems, including Bioinformatics, Communications and networking, Application acceleration, Medical solutions, Experiments for high energy physics, Astronomy, Aerospace, Biologically inspired systems and Computational fluid dynamics (CFD).

  17. A compositional proof system for the modal μ-calculus

    DEFF Research Database (Denmark)

    Andersen, Henrik Reif; Stirling, C.; Winskel,, G.

    1994-01-01

    We present a proof system for determining satisfaction between processes in a fairly general process algebra and assertions of the modal μ-calculus. The proof system is compositional in the structure of processes. It extends earlier work on compositional reasoning within the modal μ-calculus and ...

  18. Nonglobal proof of the thin--sandwich conjecture

    International Nuclear Information System (INIS)

    Pereira, C.M.

    1981-01-01

    A gravitational thin--sandwich conjecture was first proposed by Wheeler and coworkers during the period 1962--4. The present paper contains a proof of the nonglobal form of this gravitational thin--sandwich conjecture. The proof (a) applies for arbitrary choices of the spatial metric and its time derivative; and (b) demonstrates the existence on a spacelike three-surface of solutions which satisfy conditions of continuity known to be sufficient to obtain existence and uniqueness of solutions to Einstein's equations off the three-surface and existence and uniqueness of geodesics. Riquier's existence theorem plays an important role in the proof. The relationship of the present results to previous work is discussed. Some global questions associated with the thin--sandwich conjecture are clarified. Some aspects of the relationship of the thin--sandwich conjecture to the problem of the quantization of the gravitational field are noted. Both the vacuum case and the case of a nonviscous fluid are included. The discussion allows for an arbitrary equation of state p = p

  19. Permutation entropy with vector embedding delays

    Science.gov (United States)

    Little, Douglas J.; Kane, Deb M.

    2017-12-01

    Permutation entropy (PE) is a statistic used widely for the detection of structure within a time series. Embedding delay times at which the PE is reduced are characteristic timescales for which such structure exists. Here, a generalized scheme is investigated where embedding delays are represented by vectors rather than scalars, permitting PE to be calculated over a (D -1 ) -dimensional space, where D is the embedding dimension. This scheme is applied to numerically generated noise, sine wave and logistic map series, and experimental data sets taken from a vertical-cavity surface emitting laser exhibiting temporally localized pulse structures within the round-trip time of the laser cavity. Results are visualized as PE maps as a function of embedding delay, with low PE values indicating combinations of embedding delays where correlation structure is present. It is demonstrated that vector embedding delays enable identification of structure that is ambiguous or masked, when the embedding delay is constrained to scalar form.

  20. Luminescent, Fire-Resistant, and Water-Proof Ultralong Hydroxyapatite Nanowire-Based Paper for Multimode Anticounterfeiting Applications.

    Science.gov (United States)

    Yang, Ri-Long; Zhu, Ying-Jie; Chen, Fei-Fei; Dong, Li-Ying; Xiong, Zhi-Chao

    2017-08-02

    Counterfeiting of valuable certificates, documents, and banknotes is a serious issue worldwide. As a result, the need for developing novel anticounterfeiting materials is greatly increasing. Herein, we report a new kind of ultralong hydroxyapatite nanowire (HAPNW)-based paper with luminescence, fire resistance, and waterproofness properties that may be exploited for anticounterfeiting applications. In this work, lanthanide-ion-doped HAPNWs (HAPNW:Ln 3+ ) with lengths over 100 μm have been synthesized and used as a raw material to fabricating a free-standing luminescent, fire-resistant, water-proof paper through a simple vacuum filtration process. It is interesting to find that the luminescence intensity, structure, and morphology of HAPNW:Ln 3+ highly depend on the experimental conditions. The as-prepared HAPNW:Ln 3+ paper has a unique combination of properties, such as high flexibility, good processability, writing and printing abilities, luminescence, tunable emission color, waterproofness, and fire resistance. In addition, a well-designed pattern can be embedded in the paper that is invisible under ambient light but viewable as a luminescent color under ultraviolet light. Moreover, the HAPNW:Ln 3+ paper can be well-preserved without any damage after being burned by fire or soaked in water. The unique combination of luminescence, fire resistance, and waterproofness properties and the nanowire structure of the as-prepared HAPNW:Ln 3+ paper may be exploited toward developing a new kind of multimode anticounterfeiting technology for various high-level security antiforgery applications, such as in making forgery-proof documents, certificates, labels, and tags and in packaging.

  1. Philosophy of mathematics an introduction to a world of proofs and pictures

    CERN Document Server

    Brown, James Robert

    1999-01-01

    This text discusses the great philosophers and the importance of mathematics to their thought. It includes topics such as: the mathematical image; platonism; picture-proofs; applied mathematics; Hilbert and Godel; knots and nations; definitions; picture-proofs and Wittgenstein; and computation, proof and conjecture.

  2. On the Mechanization of the Proof of Hessenberg's Theorem in Coherent Logic

    NARCIS (Netherlands)

    Bezem, M.; Hendriks, R.D.A.

    2008-01-01

    We propose to combine interactive proof construction with proof automation for a fragment of first-order logic called Coherent Logic (CL). CL allows enough existential quantification to make Skolemization unnecessary. Moreover, CL has a constructive proof system based on forward reasoning, which is

  3. Embedding Quantitative Methods by Stealth in Political Science: Developing a Pedagogy for Psephology

    Science.gov (United States)

    Gunn, Andrew

    2017-01-01

    Student evaluations of quantitative methods courses in political science often reveal they are characterised by aversion, alienation and anxiety. As a solution to this problem, this paper describes a pedagogic research project with the aim of embedding quantitative methods by stealth into the first-year undergraduate curriculum. This paper…

  4. Values and Norms of Proof for Mathematicians and Students

    Science.gov (United States)

    Dawkins, Paul Christian; Weber, Keith

    2017-01-01

    In this theoretical paper, we present a framework for conceptualizing proof in terms of mathematical values, as well as the norms that uphold those values. In particular, proofs adhere to the values of establishing a priori truth, employing decontextualized reasoning, increasing mathematical understanding, and maintaining consistent standards for…

  5. Security proof for round robin differential phase shift QKD

    NARCIS (Netherlands)

    Leermakers, D.; Skoric, B.

    2017-01-01

    We give the first information-theoretic security proof of the `Round Robin Differential Phase Shift' Quantum Key Distribution scheme. Our proof consists of the following steps. We construct an EPR variant of the scheme. We identify Eve's optimal way of coupling an ancilla to an EPR qudit pair under

  6. 28 CFR 79.25 - Proof of onset of leukemia at least two years after first exposure, and proof of onset of a...

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Proof of onset of leukemia at least two... leukemia at least two years after first exposure, and proof of onset of a specified compensable disease more than five years after first exposure. The date of onset will be the date of diagnosis as indicated...

  7. Embedded librarian within an online health informatics graduate research course: a case study.

    Science.gov (United States)

    Kumar, Sajeesh; Wu, Lin; Reynolds, Rebecca

    2014-01-01

    The Health Sciences Library and the Department of Health Informatics & Information Management at the University of Tennessee Health Science Center in Memphis piloted an embedded librarian project in summer 2012. The value and effectiveness of the pilot project was evaluated by analyzing the content of e-mail questions received from the students and the students' answers to the pre- and post-class surveys. The project received positive feedback from the students and course faculty. Librarians collaborating with teaching faculty and interacting one-on-one with students in health information-intensive courses proved to be helpful for student learning.

  8. A Framework for Effective Software Monitoring in Project Management

    African Journals Online (AJOL)

    A Framework for Effective Software Monitoring in Project Management. ... is shown to provide meaningful interpretation of collected metric data by embedding certain quality function. Key words: Project Management, Feedback, project control, metrics, process model, quantitative validity ... AJOL African Journals Online.

  9. Embedding research to improve program implementation in Latin America and the Caribbean

    Directory of Open Access Journals (Sweden)

    Nhan Tran

    2017-06-01

    Full Text Available ABSTRACT In the last 10 years, implementation research has come to play a critical role in improving the implementation of already-proven health interventions by promoting the systematic uptake of research findings and other evidence-based strategies into routine practice. The Alliance for Health Policy and Systems Research and the Pan American Health Organization implemented a program of embedded implementation research to support health programs in Latin America and the Caribbean (LAC in 2014–2015. A total of 234 applications were received from 28 countries in the Americas. The Improving Program Implementation through Embedded Research (iPIER scheme supported 12 implementation research projects led by health program implementers from nine LAC countries: Argentina, Bolivia, Brazil, Chile, Colombia, Mexico, Panama, Peru, and Saint Lucia. Through this experience, we learned that the “insider” perspective, which implementers bring to the research proposal, is particularly important in identifying research questions that focus on the systems failures that often manifest in barriers to implementation. This paper documents the experience of and highlights key conclusions about the conduct of embedded implementation research. The iPIER experience has shown great promise for embedded research models that place implementers at the helm of implementation research initiatives.

  10. Smart Multicore Embedded Systems

    DEFF Research Database (Denmark)

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where ve...

  11. The Bright Side and Dark Side of Embedded Ties In Business-to-Business Innovation

    NARCIS (Netherlands)

    C.S. Noordhoff (Corine); K. Kyriakopoulos (Kyriakos); C. Moorman (Christina); P. Pauwels (Pieter); B.G.C. Dellaert (Benedict)

    2011-01-01

    textabstractWhile the number and importance of joint innovation projects between suppliers and their customers continue to rise, the literature has yet to resolve a key question—do embedded ties with customers help or hurt supplier innovation? Drawing on both the tie strength and knowledge

  12. The bright side and dark side of embedded ties in business-to-business innovation

    NARCIS (Netherlands)

    C.S. Noordhoff (Corine); K. Kyriakopoulos (Kyriakos); C. Moorman (Christina); P. Pauwels (Pieter); B.G.C. Dellaert (Benedict)

    2011-01-01

    textabstractAlthough the number and importance of joint innovation projects between suppliers and their customers continue to rise, the literature has yet to resolve a key question: Do embedded ties with customers help or hurt supplier innovation? Drawing on both the tie strength and knowledge

  13. Proofs that Develop Insight

    Science.gov (United States)

    Weber, Keith

    2010-01-01

    Many mathematics educators have noted that mathematicians do not only read proofs to gain conviction but also to obtain insight. The goal of this article is to discuss what this insight is from mathematicians' perspective. Based on interviews with nine research-active mathematicians, two sources of insight are discussed. The first is reading a…

  14. Experimental study of reinforced concrete pile caps with external, embedded and partially embedded socket with smooth interface

    Directory of Open Access Journals (Sweden)

    R. Barros

    Full Text Available On Precast concrete structures the column foundation connections can occur through the socket foundation, which can be embedded, partially embedded or external, with socket walls over the pile caps. This paper presents an experimental study about two pile caps reinforced concrete with external, partially embedded and embedded socket submitted to central load, using 1:2 scaled models. In the analyzed models, the smooth interface between the socket walls and column was considered. The results are compared to a reference model that presents monolithic connections between the column and pile cap. It is observed that the ultimate load of pile cap with external sockets has the same magnitude as the reference pile cap, but the ultimate load of models with partially embedded and embedded socket present less magnitude than the reference model.

  15. Proof of Principle for Electronic Collimation of a Gamma Ray Detector

    Science.gov (United States)

    2016-01-01

    Approved for public release; distribution is unlimited. ERDC TN-EQT-16-1 January 2016 Proof of Principle for Electronic Collimation of a Gamma...in achieving the proof of principle of the technique, which is intended to be further developed. A gamma ray detector system utilizing electronic...waveforms from longitudinal (along the axis) waveforms yield proof of principle . TECHNOLOGY DESCRIPTION: The component detector technologies were

  16. A short list color proof of Grotzsch's theorem

    DEFF Research Database (Denmark)

    Thomassen, Carsten

    2000-01-01

    We give a short proof of the result that every planar graph of girth $5$is $3$-choosable and hence also of Gr\\"{o}tzsch's theorem saying that everyplanar triangle-free graph is $3$-colorable.......We give a short proof of the result that every planar graph of girth $5$is $3$-choosable and hence also of Gr\\"{o}tzsch's theorem saying that everyplanar triangle-free graph is $3$-colorable....

  17. A Calculus of Circular Proofs and its Categorical Semantics

    DEFF Research Database (Denmark)

    Santocanale, Luigi

    2002-01-01

    We present a calculus of “circular proofs”: the graph underlying a proof is not a finite tree but instead it is allowed to contain a certain amount of cycles.The main challenge in developing a theory for the calculus is to define the semantics of proofs, since the usual method by induction...

  18. Big Data Clustering via Community Detection and Hyperbolic Network Embedding in IoT Applications

    Directory of Open Access Journals (Sweden)

    Vasileios Karyotis

    2018-04-01

    Full Text Available In this paper, we present a novel data clustering framework for big sensory data produced by IoT applications. Based on a network representation of the relations among multi-dimensional data, data clustering is mapped to node clustering over the produced data graphs. To address the potential very large scale of such datasets/graphs that test the limits of state-of-the-art approaches, we map the problem of data clustering to a community detection one over the corresponding data graphs. Specifically, we propose a novel computational approach for enhancing the traditional Girvan–Newman (GN community detection algorithm via hyperbolic network embedding. The data dependency graph is embedded in the hyperbolic space via Rigel embedding, allowing more efficient computation of edge-betweenness centrality needed in the GN algorithm. This allows for more efficient clustering of the nodes of the data graph in terms of modularity, without sacrificing considerable accuracy. In order to study the operation of our approach with respect to enhancing GN community detection, we employ various representative types of artificial complex networks, such as scale-free, small-world and random geometric topologies, and frequently-employed benchmark datasets for demonstrating its efficacy in terms of data clustering via community detection. Furthermore, we provide a proof-of-concept evaluation by applying the proposed framework over multi-dimensional datasets obtained from an operational smart-city/building IoT infrastructure provided by the Federated Interoperable Semantic IoT/cloud Testbeds and Applications (FIESTA-IoT testbed federation. It is shown that the proposed framework can be indeed used for community detection/data clustering and exploited in various other IoT applications, such as performing more energy-efficient smart-city/building sensing.

  19. Trusted computing for embedded systems

    CERN Document Server

    Soudris, Dimitrios; Anagnostopoulos, Iraklis

    2015-01-01

    This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. Case studies are used to present new techniques designed as industrial security solutions. Coverage includes development of tamper resistant hardware and firmware mechanisms for lightweight embedded devices, as well as those serving as security anchors for embedded platforms required by applications such as smart power grids, smart networked and home appliances, environmental and infrastructure sensor networks, etc. ·         Enables readers to address a variety of security threats to embedded hardware and software; ·         Describes design of secure wireless sensor networks, to address secure authen...

  20. Poincare ball embeddings of the optical geometry

    International Nuclear Information System (INIS)

    Abramowicz, M A; Bengtsson, I; Karas, V; Rosquist, K

    2002-01-01

    It is shown that the optical geometry of the Reissner-Nordstroem exterior metric can be embedded in a hyperbolic space all the way down to its outer horizon. The adopted embedding procedure removes a breakdown of flat-space embeddings which occurs outside the horizon, at and below the Buchdahl-Bondi limit (R/M=9/4 in the Schwarzschild case). In particular, the horizon can be captured in the optical geometry embedding diagram. Moreover, by using the compact Poincare ball representation of the hyperbolic space, the embedding diagram can cover the whole extent of radius from spatial infinity down to the horizon. Attention is drawn to the advantages of such embeddings in an appropriately curved space: this approach gives compact embeddings and it clearly distinguishes the case of an extremal black hole from a non-extremal one in terms of the topology of the embedded horizon

  1. Multiparty Session Types as Coherence Proofs

    DEFF Research Database (Denmark)

    Carbone, Marco; Montesi, Fabrizio; Schürmann, Carsten

    2015-01-01

    We propose a Curry-Howard correspondence between a language for programming multiparty sessions and a generalisation of Classical Linear Logic (CLL). In this framework, propositions correspond to the local behaviour of a participant in a multiparty session type, proofs to processes, and proof...... normalisation to executing communications. Our key contribution is generalising duality, from CLL, to a new notion of n-ary compatibility, called coherence. Building on coherence as a principle of compositionality, we generalise the cut rule of CLL to a new rule for composing many processes communicating...... in a multiparty session. We prove the soundness of our model by showing the admissibility of our new rule, which entails deadlock-freedom via our correspondence....

  2. Homomorphic embeddings in n-groups

    Directory of Open Access Journals (Sweden)

    Mona Cristescu

    2013-06-01

    Full Text Available We prove that an cancellative n-groupoid A can be homotopic embedded in an n-group if and only if in A are satisfied all n-ary Malcev conditions. Now we shall prove that in the presence of associative law we obtain homomorphic embeddings. Furthermore, if A has a lateral identity a such embeddings is assured by a subset of n-ary Malcev conditions - unary Malcev conditions.

  3. Strategy-proof social choice

    OpenAIRE

    Barberà, Salvador, 1946-

    2010-01-01

    This paper surveys the literature on strategy-proofness from a historical perspective. While I discuss the connections with other works on incentives in mechanism design, the main emphasis is on social choice models. This article has been prepared for the Handbook of Social Choice and Welfare, Volume 2, Edited by K. Arrow, A. Sen and K. Suzumura

  4. Rapid BeagleBoard prototyping with MATLAB and Simulink

    CERN Document Server

    Qin, Fei

    2013-01-01

    This book is a fast-paced guide with practical, hands-on recipes which will show you how to prototype Beagleboard-based audio/video applications using Matlab/Simlink and Sourcery Codebench on a Windows host.Beagleboard Embedded Projects is great for students and academic researchers who have practical ideas and who want to build a proof-of-concept system on an embedded hardware platform quickly and efficiently. It is also useful for product design engineers who want to ratify their applications and reduce the time-to-market. It is assumed that you are familiar with Matlab/Simulink and have som

  5. Encoding Featherweight Java with Assignment and Immutability using The Coq Proof Assistant

    DEFF Research Database (Denmark)

    Mackay, Julian; Mehnert, Hannes; Potanin, Alex

    2012-01-01

    We develop a mechanized proof of Featherweight Java with Assignment and Immutability in the Coq proof assistant. This is a step towards more machine-checked proofs of a non-trivial type system. We used object immutability close to that of IGJ [9] . We describe the challenges of the mech- anisation...

  6. On mathematicians' different standards when evaluating elementary proofs.

    Science.gov (United States)

    Inglis, Matthew; Mejia-Ramos, Juan Pablo; Weber, Keith; Alcock, Lara

    2013-04-01

    In this article, we report a study in which 109 research-active mathematicians were asked to judge the validity of a purported proof in undergraduate calculus. Significant results from our study were as follows: (a) there was substantial disagreement among mathematicians regarding whether the argument was a valid proof, (b) applied mathematicians were more likely than pure mathematicians to judge the argument valid, (c) participants who judged the argument invalid were more confident in their judgments than those who judged it valid, and (d) participants who judged the argument valid usually did not change their judgment when presented with a reason raised by other mathematicians for why the proof should be judged invalid. These findings suggest that, contrary to some claims in the literature, there is not a single standard of validity among contemporary mathematicians. Copyright © 2013 Cognitive Science Society, Inc.

  7. An Embedded Systems Course for Engineering Students Using Open-Source Platforms in Wireless Scenarios

    Science.gov (United States)

    Rodriguez-Sanchez, M. C.; Torrado-Carvajal, Angel; Vaquero, Joaquin; Borromeo, Susana; Hernandez-Tamames, Juan A.

    2016-01-01

    This paper presents a case study analyzing the advantages and disadvantages of using project-based learning (PBL) combined with collaborative learning (CL) and industry best practices, integrated with information communication technologies, open-source software, and open-source hardware tools, in a specialized microcontroller and embedded systems…

  8. Sound-proof Sandwich Panel Design via Metamaterial Concept

    Science.gov (United States)

    Sui, Ni

    the core material maintains the mechanical property and yields a sound transmission loss that is consistently greater than 50 dB at low frequencies. Furthermore, the absorption property of the proposed honeycomb sandwich panel was experimentally studied. The honeycomb sandwich panel shows an excellent sound absorbing performance at high frequencies by using reinforced glass fiber without adding too much mass. The effect of the panel size and the stiffness of the grid-like frame effect of the honeycomb sandwich structures on sound transmission are discussed lastly. For the second sound-proof sandwich panel design, each unit cell of the sandwich panel is replaced by a Helmholtz resonator by perforating a small hole on the top face sheet. A perfect sound absorber sandwich panel with coupled Helmholtz resonators is proposed by two types: single identical Helmholtz resonator in each unit cell and dual Helmholtz resonators with different orifices, arranged in each cell arranged periodically. The soundproof sandwich panel is modelled as a panel embedded in rigid panel and assumed as a semiinfinite space with hard boundary condition. The net/mutual impedance model is first proposed and derived by solving Kirchhoff-Helmholtz integral by using the Green's function. The thermal-viscous energy dissipation at the thermal boundary layer dominates the total energy consumed. Two types of perfect sound absorber sandwich panel are designed in the last part. Two theoretical methods: the average energy and the equivalent surface impedance method are used to predict sound absorption performance. The geometry for perfect sound absorber sandwich panel at a target frequency can be obtained when the all the Helmholtz resonators are at resonance and the surface impedance of the sandwich panel matches the air impedance. The bandwidth for the identical sandwich panel mainly depends on the neck radius. The absorptive property of the dual Helmholtz resonators type of sandwich panel is studied by

  9. Tree Resolution Proofs of the Weak Pigeon-Hole Principle

    DEFF Research Database (Denmark)

    Dantchev, Stefan Stajanov; Riis, Søren

    2001-01-01

    We prove that any optimal tree resolution proof of PHPn m is of size 2&thetas;(n log n), independently from m, even if it is infinity. So far, only a 2Ω(n) lower bound has been known in the general case. We also show that any, not necessarily optimal, regular tree resolution proof PHPn m is bound...

  10. A Forward-secure Grouping-proof Protocol for Multiple RFID Tags

    Directory of Open Access Journals (Sweden)

    Liu Ya-li

    2012-09-01

    Full Text Available Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT. The proposed grouping-proof protocols recently have security and/or privacy omission and these schemes afford order-dependence by relaying message among tags through an RFID reader. In consequence, aiming at enhancing the robustness, improving scalability, reducing the computation costs on resource-constrained devices, and meanwhile combing Computational Intelligence (CI with Secure Multi-party Communication (SMC, a Forward-Secure Grouping-Proof Protocol (FSGP for multiple RFID tags based on Shamir's (, secret sharing is proposed. In comparison with the previous grouping-proof protocols, FSGP has the characteristics of forward-security and order-independence addressing the scalability issue by avoiding relaying message. Our protocol provides security enhancement, performance improvement, and meanwhile controls the computation cost, which equilibrates both security and low cost requirements for RFID tags.

  11. Detection of apoptosis in paraffin embedded tissues: the influence of tissue type and fixation

    Czech Academy of Sciences Publication Activity Database

    Matalová, Eva; Dubská, L.; Míšek, Ivan

    2002-01-01

    Roč. 71, č. 4 (2002), s. 529-533 ISSN 0001-7213 R&D Projects: GA ČR GP204/02/P112; GA AV ČR KSK6005114 Keywords : apoptosis * TUNEL test * paraffin embedded tissues Subject RIV: EB - Genetics ; Molecular Biology Impact factor: 0.370, year: 2002

  12. Proof testing of CANDU concrete containment structures

    International Nuclear Information System (INIS)

    Pandey, M.D.

    1996-05-01

    Prior to commissioning of a CANDU reactor, a proof pressure test is required to demonstrate the structural integrity of the containment envelope. The test pressure specified by AECB Regulatory Document R-7 (1991) was selected without a rigorous consideration of uncertainties associated with estimates of accident pressure and conatinment resistance. This study was undertaken to develop a reliability-based philosophy for defining proof testing requirements that are consistent with the current limit states design code for concrete containments (CSA N287.3).It was shown that the upodated probability of failure after a successful test is always less than the original estimate

  13. Structuring Interactive Correctness Proofs by Formalizing Coding Idioms

    OpenAIRE

    Gast, Holger

    2012-01-01

    This paper examines a novel strategy for developing correctness proofs in interactive software verification for C programs. Rather than proceeding backwards from the generated verification conditions, we start by developing a library of the employed data structures and related coding idioms. The application of that library then leads to correctness proofs that reflect informal arguments about the idioms. We apply this strategy to the low-level memory allocator of the L4 microkernel, a case st...

  14. Characterization of associate spaces of generalized weighted weak-Lorentz spaces and embeddings

    Czech Academy of Sciences Publication Activity Database

    Gogatishvili, Amiran; Aykol, C.; Guliyev, V.S.

    2015-01-01

    Roč. 228, č. 3 (2015), s. 223-233 ISSN 0039-3223 R&D Projects: GA ČR GA13-14743S Institutional support: RVO:67985840 Keywords : generalized weighted weak-Lorentz spaces * reverse Hardy inequalities * associate spaces * embeddings Subject RIV: BA - General Mathematics Impact factor: 0.623, year: 2015 http://journals.impan.gov.pl/sm/Inf/228-3-2.html

  15. 33 CFR 136.215 - Proof.

    Science.gov (United States)

    2010-07-01

    ... FINANCIAL RESPONSIBILITY AND COMPENSATION OIL SPILL LIABILITY TRUST FUND; CLAIMS PROCEDURES; DESIGNATION OF SOURCE; AND ADVERTISEMENT Procedures for Particular Claims § 136.215 Proof. (a) In addition to the... each claim for economic loss resulting from destruction of real or personal property, the claimant must...

  16. IFA proof of principle experiments

    International Nuclear Information System (INIS)

    Olson, C.L.

    1979-01-01

    IFA proof of principle experiments is discussed. Controlled beam front motion experiments are reported, which demonstrate that accurate IFA programming of the motion of the potential well at the head of an IREB has been achieved. The status of IFA ion experiments is also discussed

  17. Secondary Teachers' Knowledge of Elementary Number Theory Proofs: The Case of General-Cover Proofs

    Science.gov (United States)

    Tabach, Michal; Levenson, Esther; Barkai, Ruthi; Tsamir, Pessia; Tirosh, Dina; Dreyfus, Tommy

    2011-01-01

    In light of recent reform recommendations, teachers are expected to turn proofs and proving into an ongoing component of their classroom practice. Two questions emerging from this requirement are: Is the mathematical knowledge of high school teachers sufficient to prove various kinds of statements? Does teachers' knowledge allow them to determine…

  18. New zero-input overflow stability proofs based on Lyapunov theory

    NARCIS (Netherlands)

    Werter, M.J.; Ritzerfeld, J.H.F.

    1989-01-01

    The authors demonstrate some proofs of zero-input overflow-oscillation suppression in recursive digital filters. The proofs are based on the second method of Lyapunov. For second-order digital filters with complex conjugated poles, the state describes a trajectory in the phase plane, spiraling

  19. A comparison of some anthropometric parameters between an Italian and a UK population: 'proof of principle' of a European project using MammoGrid

    International Nuclear Information System (INIS)

    Warren, R.; Thompson, D.; Del Frate, C.; Cordell, M.; Highnam, R.; Tromans, C.; Warsi, I.; Ding, J.; Sala, E.; Estrella, F.; Solomonides, A.E.; Odeh, M.; McClatchey, R.; Bazzocchi, M.; Amendolia, S.R.; Brady, M.

    2007-01-01

    Aim: To demonstrate the use of grid technology to produce a database of mammograms and supporting patient data, specifically using breast density as a biomarker of risk for breast cancer, for epidemiological purposes. Method: The cohort comprised 1737 women from the UK and Italy, aged 28-87 years, mean 54.7 years, who underwent mammography after giving consent to the use of their data in the project. Information regarding height, weight, and exposure data (mAs and kV) was recorded. The computer program Generate-SMF was applied to all films in the database to measure breast volume, dense breast volume, and thereby percentage density. Visual readings of density using a six-category classification system were also available for 596 women. Results: The UK and Italian participants were similar in height, but the UK women were significantly heavier with a slightly higher body mass index (BMI), despite being younger. Both absolute and percentage breast density were significantly higher in the Udine cohort. Images from the medio-lateral projection (MLO) give a significantly lower percentage density than cranio-caudal (CC) images (p < 0.0001). Total breast volume is negatively associated with percentage density, as are BMI and age (p < 0.0001 for all), although 80% of the variability in percentage density remains unexplained. Conclusion: The study offers proof of principle that confederated databases generated using Grid technology provide a useful and adaptable environment for large quantities of image, numerical, and qualitative data suitable for epidemiological research using the example of mammographic density as a biomarker of risk for breast cancer

  20. PC/104 Embedded IOCs at Jefferson Lab

    International Nuclear Information System (INIS)

    Yan, Jianxun; Allison, Trent; Witherspoon, Sue; Cuffe, Anthony

    2009-01-01

    Jefferson Lab has developed embedded IOCs based on PC/104 single board computers (SBC) for low level control systems. The PC/104 IOCs run EPICS on top of the RTEMS operating system. Two types of control system configurations are used in different applications, PC/104 SBC with commercial PC/104 I/O cards and PC/104 SBC with custom designed FPGA-based boards. RTEMS was built with CEXP shell to run on the PC/104 SBC. CEXP shell provides the function of dynamic object loading, which is similar to the widely used VxWorks operating system. Standard software configurations were setup for PC/104 IOC application development to provide a familiar format for new projects as well as ease the conversion of applications from VME based IOCs to PC/104 IOCs. Many new projects at Jefferson Lab are going to employ PC/104 SBCs as IOCs and some applications have already been running them for accelerator operations. The PC/104 - RTEMS IOC provides a free open source Real-Time Operating System (RTOS), low cost/maintenance, easily installed/ configured, flexible, and reliable solution for accelerator control and 12GeV Upgrade projects.

  1. Near-infrared study of new embedded clusters in the Carina complex

    Science.gov (United States)

    Oliveira, R. A. P.; Bica, E.; Bonatto, C.

    2018-05-01

    We analyse the nature of a sample of stellar overdensities that we found projected on the Carina complex. This study is based on the Two Micron All Sky Survey photometry and involves the photometry decontamination of field stars, elaboration of intrinsic colour-magnitude diagrams [CMDs; J × (J - Ks)], colour-colour diagrams (J - H) × (H - Ks), and radial density profiles, in order to determine the structure and the main astrophysical parameters of the best candidates. The verification of an overdensity as an embedded cluster requires a CMD consistent with a PMS content and MS stars, if any. From these results, we are able to verify if they are, in fact, embedded clusters. The results were, in general, rewarding: in a sample of 101 overdensities, the analysis provided 15 candidates, of which three were previously catalogued as clusters (CCCP-Cl 16, Treasure Chest, and FSR 1555), and the 12 remaining are discoveries that provided significant results, with ages not above 4.5 Myr and distances compatible with the studied complex. The resulting values for the differential reddening of most candidates were relatively high, confirming that these clusters are still (partially or fully) embedded in the surrounding gas and dust, as a rule within a shell. Histograms with the distribution of the masses, ages, and distances were also produced, to give an overview of the results. We conclude that all the 12 newly found embedded clusters are related to the Carina complex.

  2. Pervasive Computing Support for Hospitals: An Overview of the Activity-Based Computing Project

    DEFF Research Database (Denmark)

    Christensen, Henrik Bærbak; Bardram, Jakob E

    2007-01-01

    The activity-based computing project researched pervasive computing support for clinical hospital work. Such technologies have potential for supporting the mobile, collaborative, and disruptive use of heterogeneous embedded devices in a hospital......The activity-based computing project researched pervasive computing support for clinical hospital work. Such technologies have potential for supporting the mobile, collaborative, and disruptive use of heterogeneous embedded devices in a hospital...

  3. A correctness proof of the bakery protocol in $ mu $CRL

    NARCIS (Netherlands)

    J.F. Groote (Jan Friso); H.P. Korver

    1994-01-01

    textabstractA specification of a bakery protocol is given in $mu$CRL. We provide a simple correctness criterion for the protocol. Then the protocol is proven correct using a proof system that has been developed for $mu$CRL. The proof primarily consists of algebraic manipulations based on

  4. Peac – A set of tools to quickly enable Proof on a cluster

    International Nuclear Information System (INIS)

    Ganis, G; Vala, M

    2012-01-01

    With advent of the analysis phase of Lhcdata-processing, interest in Proof technology has considerably increased. While setting up a simple Proof cluster for basic usage is reasonably straightforward, exploiting the several new functionalities added in recent times may be complicated. Peac, standing for Proof Enabled Analysis Cluster, is a set of tools aiming to facilitate the setup and management of a Proof cluster. Peac is based on the experience made by setting up Proof for the Alice analysis facilities. It allows to easily build and configure Root and the additional software needed on the cluster, and may serve as distributor of binaries via Xrootd. Peac uses Proof-On-Demand (PoD) for resource management (start, stop or daemons). Finally, Peac sets-up and configures dataset management (using the Afdsmgrd daemon), as well as cluster monitoring (machine status and Proof query summaries) using MonAlisa. In this respect, a MonAlisa page has been dedicated to Peac users, so that a cluster managed by Peac can be automatically monitored. In this paper we present and describe the status and main components of Peac and show details about its usage.

  5. Proofs of the Kochen–Specker theorem based on a system of three qubits

    International Nuclear Information System (INIS)

    Waegell, Mordecai; Aravind, P K

    2012-01-01

    A number of new proofs of the Kochen–Specker theorem are given based on the observables of the three-qubit Pauli group. Each proof is presented in the form of a diagram from which it is obvious by inspection. Each of our observable-based proofs leads to a system of projectors and bases that generally yields a large number of ‘parity proofs’ of the Kochen–Specker theorem. Some examples of such proofs are given and some of their applications are discussed. (paper)

  6. Impact of proof test interval and coverage on probability of failure of safety instrumented function

    International Nuclear Information System (INIS)

    Jin, Jianghong; Pang, Lei; Hu, Bin; Wang, Xiaodong

    2016-01-01

    Highlights: • Introduction of proof test coverage makes the calculation of the probability of failure for SIF more accurate. • The probability of failure undetected by proof test is independently defined as P TIF and calculated. • P TIF is quantified using reliability block diagram and simple formula of PFD avg . • Improving proof test coverage and adopting reasonable test period can reduce the probability of failure for SIF. - Abstract: Imperfection of proof test can result in the safety function failure of safety instrumented system (SIS) at any time in its life period. IEC61508 and other references ignored or only elementarily analyzed the imperfection of proof test. In order to further study the impact of the imperfection of proof test on the probability of failure for safety instrumented function (SIF), the necessity of proof test and influence of its imperfection on system performance was first analyzed theoretically. The probability of failure for safety instrumented function resulted from the imperfection of proof test was defined as probability of test independent failures (P TIF ), and P TIF was separately calculated by introducing proof test coverage and adopting reliability block diagram, with reference to the simplified calculation formula of average probability of failure on demand (PFD avg ). Research results show that: the shorter proof test period and the higher proof test coverage indicate the smaller probability of failure for safety instrumented function. The probability of failure for safety instrumented function which is calculated by introducing proof test coverage will be more accurate.

  7. High school mathematics teachers' perspectives on the purposes of mathematical proof in school mathematics

    Science.gov (United States)

    Dickerson, David S.; Doerr, Helen M.

    2014-12-01

    Proof serves many purposes in mathematics. In this qualitative study of 17 high school mathematics teachers, we found that these teachers perceived that two of the most important purposes for proof in school mathematics were (a) to enhance students' mathematical understanding and (b) to develop generalized thinking skills that were transferable to other fields of endeavor. We found teachers were divided on the characteristics (or features) of proofs that would serve these purposes. Teachers with less experience tended to believe that proofs in the high school should adhere to strict standards of language and reasoning while teachers with more experience tended to believe that proofs based on concrete or visual features were well suited for high school mathematics. This study has implications for teacher preparation because it appears that there is a wide variation in how teachers think about proof. It seems likely that students would experience proof very differently merely because they were seated in different classrooms.

  8. A Correctness Proof of the Bakery Protocol in μCRL

    NARCIS (Netherlands)

    Groote, J.F.; Korver, H.

    1992-01-01

    A specification of the bakery protocol is given in μCRL. We provide a simple correctness criterion for the protocol. Then the protocol is proven correct using a proof system that has been developed for μCRL. The proof primarily consists of algebraic manipulations based on specifications of

  9. 30 CFR 18.62 - Tests to determine explosion-proof characteristics.

    Science.gov (United States)

    2010-07-01

    ... characteristics. 18.62 Section 18.62 Mineral Resources MINE SAFETY AND HEALTH ADMINISTRATION, DEPARTMENT OF LABOR... Inspections and Tests § 18.62 Tests to determine explosion-proof characteristics. (a) In testing for explosion-proof characteristics of an enclosure, it shall be filled and surrounded with various explosive mixtures...

  10. A Proof-checked Verification of a Real-Time Communication Protocol

    NARCIS (Netherlands)

    Polak, I.

    We present an analysis of a protocol developed by Philips to connect several components of an audio-system. The verification of the protocol is carried out using the timed I/O-automata model of Lynch and Vaandrager. The verification has been partially proof-checked with the interactive proof

  11. Tensor Train Neighborhood Preserving Embedding

    Science.gov (United States)

    Wang, Wenqi; Aggarwal, Vaneet; Aeron, Shuchin

    2018-05-01

    In this paper, we propose a Tensor Train Neighborhood Preserving Embedding (TTNPE) to embed multi-dimensional tensor data into low dimensional tensor subspace. Novel approaches to solve the optimization problem in TTNPE are proposed. For this embedding, we evaluate novel trade-off gain among classification, computation, and dimensionality reduction (storage) for supervised learning. It is shown that compared to the state-of-the-arts tensor embedding methods, TTNPE achieves superior trade-off in classification, computation, and dimensionality reduction in MNIST handwritten digits and Weizmann face datasets.

  12. Towards a proof of two conjectures from quantum inference concerning quantum limits of knowledge of states

    International Nuclear Information System (INIS)

    Jones, K.R.W.

    1990-11-01

    A new entropic analogue is given of the recently reported information on theoretic limits to knowledge of states. A natural relationship between the quantum correlation information and the quantum mechanical entropy is thereby revealed. Some progress is made towards a rigorous proof of both results and a complete solution to the problem of asymptotic optimal measurement. In particular the elementary convex analysis was employed to prove that the optimal operator valued measure must be a rank-one projection valued measure. 11 refs

  13. Computer-Assisted Discovery and Proof

    Energy Technology Data Exchange (ETDEWEB)

    Bailey, David H.; Borwein, Jonathan M.

    2007-12-10

    With the advent of powerful, widely-available mathematical software, combined with ever-faster computer hardware, we are approaching a day when both the discovery and proof of mathematical facts can be done in a computer-assisted manner. his article presents several specific examples of this new paradigm in action.

  14. Feature-based component model for design of embedded systems

    Science.gov (United States)

    Zha, Xuan Fang; Sriram, Ram D.

    2004-11-01

    An embedded system is a hybrid of hardware and software, which combines software's flexibility and hardware real-time performance. Embedded systems can be considered as assemblies of hardware and software components. An Open Embedded System Model (OESM) is currently being developed at NIST to provide a standard representation and exchange protocol for embedded systems and system-level design, simulation, and testing information. This paper proposes an approach to representing an embedded system feature-based model in OESM, i.e., Open Embedded System Feature Model (OESFM), addressing models of embedded system artifacts, embedded system components, embedded system features, and embedded system configuration/assembly. The approach provides an object-oriented UML (Unified Modeling Language) representation for the embedded system feature model and defines an extension to the NIST Core Product Model. The model provides a feature-based component framework allowing the designer to develop a virtual embedded system prototype through assembling virtual components. The framework not only provides a formal precise model of the embedded system prototype but also offers the possibility of designing variation of prototypes whose members are derived by changing certain virtual components with different features. A case study example is discussed to illustrate the embedded system model.

  15. The bright-side and dark-side effects of embedded ties in business-to-business innovation

    NARCIS (Netherlands)

    Noordhoff, C.S.; Kyriakopoulos, K.; Moorman, C.; Pauwels, P.; Dellaert, B.

    2011-01-01

    Although the number and importance of joint innovation projects between suppliers and their customers continue to rise, the literature has yet to resolve a key question: Do embedded ties with customers help or hurt supplier innovation? Drawing on both the tie strength and knowledge literatures, the

  16. Polarizable Density Embedding

    DEFF Research Database (Denmark)

    Olsen, Jógvan Magnus Haugaard; Steinmann, Casper; Ruud, Kenneth

    2015-01-01

    We present a new QM/QM/MM-based model for calculating molecular properties and excited states of solute-solvent systems. We denote this new approach the polarizable density embedding (PDE) model and it represents an extension of our previously developed polarizable embedding (PE) strategy. The PDE...... model is a focused computational approach in which a core region of the system studied is represented by a quantum-chemical method, whereas the environment is divided into two other regions: an inner and an outer region. Molecules belonging to the inner region are described by their exact densities...

  17. Learning Word Subsumption Projections for the Russian Language

    Directory of Open Access Journals (Sweden)

    Ustalov Dmitry

    2016-01-01

    Full Text Available The semantic relations of hypernymy and hyponymy are widely used in various natural language processing tasks for modelling the subsumptions in common sense reasoning. Since the popularisation of the distributional semantics, a significant attention is paid to applying word embeddings for inducing the relations between words. In this paper, we show our preliminary results on adopting the projection learning technique for computing hypernyms from hyponyms using word embeddings. We also conduct a series of experiments on the Russian language and release the open source software for learning hyponym-hypernym projections using both CPUs and GPUs, implemented with the TensorFlow machine learning framework.

  18. Collecting standardised oral health data via mobile application: A proof of concept study in the Netherlands.

    Directory of Open Access Journals (Sweden)

    Joost C L den Boer

    Full Text Available FDI World Dental Federation, founded as Fédération Dentaire Internationale, has taken the initiative to develop the Oral Health Observatory, a mobile application to conduct oral health surveys worldwide. The aim is to collect reliable standardized international data on oral health and oral health care via a network of dentists. A proof of concept study project was set up in the Netherlands to test the methodology and to validate the approach. Data about caries, gingivitis, oral self-care and oral health related quality of life were analysed and compared to datasets validated in other studies. The Android app embeds three questionnaires addressing oral health history, status and patient behaviour. One questionnaire was completed by the patient and two by the dentist. The proof of concept study involved two phases: in the first phase, five dentists, regular participants in KNMT-surveys, evaluated the usability of the app; after the first phase, the app was adjusted for a second phase. For this phase an extra 15 dentists were recruited from a group of 20 other dentists: five of them declined to participate. Attention was paid to ensuring there was a proportional representation of gender, age and region. In the second phase the five first and 15 new participants collected data on up to a maximum of 38 patients. Data from this 653 patients correspond with results from previously published surveys on the prevalence of caries and gingivitis in the Netherlands. Hence demonstrating an association between caries and gingivitis with oral self-care, problems eating and experiencing oral pain. This proof of concept study shows that the app makes it possible to collect reliable information on oral health in a short period of time. Both dentists and patients evaluated the methodology as user-friendly. Altogether, the results of this proof of concept study are promising.

  19. Collecting standardised oral health data via mobile application: A proof of concept study in the Netherlands.

    Science.gov (United States)

    den Boer, Joost C L; van Dijk, Ward; Horn, Virginie; Hescot, Patrick; Bruers, Josef J M

    2018-01-01

    FDI World Dental Federation, founded as Fédération Dentaire Internationale, has taken the initiative to develop the Oral Health Observatory, a mobile application to conduct oral health surveys worldwide. The aim is to collect reliable standardized international data on oral health and oral health care via a network of dentists. A proof of concept study project was set up in the Netherlands to test the methodology and to validate the approach. Data about caries, gingivitis, oral self-care and oral health related quality of life were analysed and compared to datasets validated in other studies. The Android app embeds three questionnaires addressing oral health history, status and patient behaviour. One questionnaire was completed by the patient and two by the dentist. The proof of concept study involved two phases: in the first phase, five dentists, regular participants in KNMT-surveys, evaluated the usability of the app; after the first phase, the app was adjusted for a second phase. For this phase an extra 15 dentists were recruited from a group of 20 other dentists: five of them declined to participate. Attention was paid to ensuring there was a proportional representation of gender, age and region. In the second phase the five first and 15 new participants collected data on up to a maximum of 38 patients. Data from this 653 patients correspond with results from previously published surveys on the prevalence of caries and gingivitis in the Netherlands. Hence demonstrating an association between caries and gingivitis with oral self-care, problems eating and experiencing oral pain. This proof of concept study shows that the app makes it possible to collect reliable information on oral health in a short period of time. Both dentists and patients evaluated the methodology as user-friendly. Altogether, the results of this proof of concept study are promising.

  20. Proof Rules for Recursive Procedures

    NARCIS (Netherlands)

    Hesselink, Wim H.

    1993-01-01

    Four proof rules for recursive procedures in a Pascal-like language are presented. The main rule deals with total correctness and is based on results of Gries and Martin. The rule is easier to apply than Martin's. It is introduced as an extension of a specification format for Pascal-procedures, with

  1. Computerized Proof Techniques for Undergraduates

    Science.gov (United States)

    Smith, Christopher J.; Tefera, Akalu; Zeleke, Aklilu

    2012-01-01

    The use of computer algebra systems such as Maple and Mathematica is becoming increasingly important and widespread in mathematics learning, teaching and research. In this article, we present computerized proof techniques of Gosper, Wilf-Zeilberger and Zeilberger that can be used for enhancing the teaching and learning of topics in discrete…

  2. Toda molecule and Tomimatsu-Sato solution-towards the complete proof of Nakamura's conjecture

    International Nuclear Information System (INIS)

    Fukuyama, Takeshi; Koizumi, Kozo

    2011-01-01

    We discuss the Nakamura's conjecture stating that the Tomimatsu-Sato black hole solution with an integer deformation parameter n is composed of the special solutions of the Toda molecule equation at the nth lattice site. From the previous work, in which the conjecture was partly analytically proved, we go further towards the final full proof by rearranging the rotation parameter. The proof is explicitly performed for the highest and lowest orders. Though the proof for all orders still remains unsolved, the prospect to the full proof becomes transparent and workable by our method. (paper)

  3. The bounded proof property via step algebras and step frames

    NARCIS (Netherlands)

    Bezhanishvili, N.; Ghilardi, Silvio

    2013-01-01

    We develop a semantic criterion for a specific rule-based calculus Ax axiomatizing a given logic L to have the so-called bounded proof property. This property is a kind of an analytic subformula property limiting the proof search space. Our main tools are one-step frames and one-step algebras. These

  4. An Examination of Undefined Forms of Proof in Academic Debate.

    Science.gov (United States)

    Underwood, Willard A.

    Although texts on debate and argumentation deal with accepted forms of evidence, reasoning, and logical methods of proof, they do not cover adequately the "undefined" forms of proof. Criteria of evidence found in forensic literature are not always followed strictly by judges, in courtroom or classroom. Many debate judges allow imprecise, vague, or…

  5. All-versus-nothing proofs with n qubits distributed between m parties

    International Nuclear Information System (INIS)

    Cabello, Adan; Moreno, Pilar

    2010-01-01

    All-versus-nothing (AVN) proofs show the conflict between Einstein, Podolsky, and Rosen's elements of reality and the perfect correlations of some quantum states. Given an n-qubit state distributed between m parties, we provide a method with which to decide whether this distribution allows an m-partite AVN proof specific for this state using only single-qubit measurements. We apply this method to some recently obtained n-qubit m-particle states. In addition, we provide all inequivalent AVN proofs with less than nine qubits and a minimum number of parties.

  6. All-versus-nothing proofs with n qubits distributed between m parties

    Science.gov (United States)

    Cabello, Adán; Moreno, Pilar

    2010-04-01

    All-versus-nothing (AVN) proofs show the conflict between Einstein, Podolsky, and Rosen’s elements of reality and the perfect correlations of some quantum states. Given an n-qubit state distributed between m parties, we provide a method with which to decide whether this distribution allows an m-partite AVN proof specific for this state using only single-qubit measurements. We apply this method to some recently obtained n-qubit m-particle states. In addition, we provide all inequivalent AVN proofs with less than nine qubits and a minimum number of parties.

  7. Affecting the Flow of a Proof by Creating Presence--A Case Study in Number Theory

    Science.gov (United States)

    Gabel, Mika; Dreyfus, Tommy

    2017-01-01

    The notion of flow of a proof encapsulates mathematical, didactical, and contextual aspects of proof presentation. A proof may have different flows, depending on the lecturer's choices regarding its presentation. Adopting Perelman's New Rhetoric (PNR) as a theoretical framework, we designed methods to assess aspects of the flow of a proof. We…

  8. An evaluation of the pressure proof test concept for 2024-T3 aluminium alloy sheet

    Science.gov (United States)

    Dawicke, D. S.; Poe, C. C., Jr.; Newman, J. C.; Harris, C. E.

    1991-01-01

    The concept of pressure proof testing of fuselage structures with fatigue cracks to insure structural integrity was evaluated from a fracture mechanics viewpoint. A generic analytical and experimental investigation was conducted on uniaxially loaded flat panels with crack configurations and stress levels typical of longitudinal lap splice joints in commercial transport aircraft fuselages. The results revealed that the remaining fatigue life after a proof cycle was longer than that without the proof cycle because of crack growth retardation due to increased crack closure. However, based on a crack length that is slightly less than the critical value at the maximum proof stress, the minimum assured life or proof test interval must be no more than 550 pressure cycles for a 1.33 proof factor and 1530 pressure cycles for a 1.5 proof factor to prevent in-flight failures.

  9. Special integrals of Gradshteyn and Ryzhik the proofs

    CERN Document Server

    Moll, Victor H

    2014-01-01

    A Guide to the Evaluation of IntegralsSpecial Integrals of Gradshetyn and Ryzhik: The Proofs provides self-contained proofs of a variety of entries in the frequently used table of integrals by I.S. Gradshteyn and I.M. Ryzhik. The book gives the most elementary arguments possible and uses Mathematica® to verify the formulas. Readers discover the beauty, patterns, and unexpected connections behind the formulas.Volume I collects 15 papers from Revista Scientia covering logarithmic integrals, the gamma function, trigonometric integrals, the beta function, the digamma function, the incomplete beta

  10. PROTECTORS FOR PROOFING OF IRON-CARBON-ALLOYS FROM CORROSIVE EFFECT

    Directory of Open Access Journals (Sweden)

    A. A. Pivovarchyk

    2017-01-01

    Full Text Available The article presents the results of practical testing of the developed compositions of protectors for proofing of low-carbon alloys used in the automotive industry and made from melting stocks of secondary aluminum raw materials. The results of the study of the effectiveness of the proofing of the developed protectors are presented.

  11. 26 CFR 1.871-4 - Proof of residence of aliens.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 9 2010-04-01 2010-04-01 false Proof of residence of aliens. 1.871-4 Section 1... (CONTINUED) INCOME TAXES Nonresident Aliens and Foreign Corporations § 1.871-4 Proof of residence of aliens... alien within the United States has acquired residence therein for purposes of the income tax. (b...

  12. Using metrics for proof rules for recursively defined delay-insensitive specifications

    NARCIS (Netherlands)

    Mallon, WC; Udding, JT

    1997-01-01

    An advantage of algebraic specifications of delay insensitive asynchronous processes over most other formalisms is that it allows the recursive definition of processes, and correctness proofs of an implementation through fixpoint induction. On the other hand, proofs by fixpoint induction are

  13. Embedded Sensors and Controls to Improve Component Performance and Reliability Conceptual Design Report

    Energy Technology Data Exchange (ETDEWEB)

    Kisner, R.; Melin, A.; Burress, T.; Fugate, D.; Holcomb, D.; Wilgen, J.; Miller, J.; Wilson, D.; Silva, P.; Whitlow, L.; Peretz, F.

    2012-09-15

    The objective of this project is to demonstrate improved reliability and increased performance made possible by deeply embedding instrumentation and controls (I&C) in nuclear power plant (NPP) components and systems. The project is employing a highly instrumented canned rotor, magnetic bearing, fluoride salt pump as its I&C technology demonstration platform. I&C is intimately part of the basic millisecond-by-millisecond functioning of the system; treating I&C as an integral part of the system design is innovative and will allow significant improvement in capabilities and performance. As systems become more complex and greater performance is required, traditional I&C design techniques become inadequate and more advanced I&C needs to be applied. New I&C techniques enable optimal and reliable performance and tolerance of noise and uncertainties in the system rather than merely monitoring quasistable performance. Traditionally, I&C has been incorporated in NPP components after the design is nearly complete; adequate performance was obtained through over-design. By incorporating I&C at the beginning of the design phase, the control system can provide superior performance and reliability and enable designs that are otherwise impossible. This report describes the progress and status of the project and provides a conceptual design overview for the platform to demonstrate the performance and reliability improvements enabled by advanced embedded I&C.

  14. Teaching logic using a state-of-art proof assistant

    Directory of Open Access Journals (Sweden)

    Maxim Hendriks

    2010-06-01

    Full Text Available This article describes the system ProofWeb developed for teaching logic to undergraduate computer science students. The system is based on the higher order proof assistant Coq, and is made available to the students through an interactive web interface. Part of this system is a large database of logic problems. This database will also hold the solutions of the students. The students do not need to install anything to be able to use the system (not even a browser plug-in, and the teachers are able to centrally track progress of the students. The system makes the full power of Coq available to the students, but simultaneously presents the logic problems in a way that is customary in undergraduate logic courses. Both styles of presenting natural deduction proofs (Gentzen-style `tree view' and Fitch-style `box view' are supported. Part of the system is a parser that indicates whether the students used the automation of Coq to solve their problems or that they solved it themselves using only the inference rules of the logic. For these inference rules dedicated tactics for Coq have been developed. The system has already been used in type theory courses and logic undergraduate courses. The ProofWeb system can be tried at http://proofweb.cs.ru.nl/.

  15. The Development of Proofs in Analytical Mathematics for Undergraduate Students

    Science.gov (United States)

    Ali, Maselan; Sufahani, Suliadi; Hasim, Nurnazifa; Saifullah Rusiman, Mohd; Roslan, Rozaini; Mohamad, Mahathir; Khalid, Kamil

    2018-04-01

    Proofs in analytical mathematics are essential parts of mathematics, difficult to learn because its underlying concepts are not visible. This research consists of problems involving logic and proofs. In this study, a short overview was provided on how proofs in analytical mathematics were used by university students. From the results obtained, excellent students obtained better scores compared to average and poor students. The research instruments used in this study consisted of two parts: test and interview. In this way, analysis of students’ actual performances can be obtained. The result of this study showed that the less able students have fragile conceptual and cognitive linkages but the more able students use their strong conceptual linkages to produce effective solutions

  16. Factors and factorizations of graphs proof techniques in factor theory

    CERN Document Server

    Akiyama, Jin

    2011-01-01

    This book chronicles the development of graph factors and factorizations. It pursues a comprehensive approach, addressing most of the important results from hundreds of findings over the last century. One of the main themes is the observation that many theorems can be proved using only a few standard proof techniques. This stands in marked contrast to the seemingly countless, complex proof techniques offered by the extant body of papers and books. In addition to covering the history and development of this area, the book offers conjectures and discusses open problems. It also includes numerous explanatory figures that enable readers to progressively and intuitively understand the most important notions and proofs in the area of factors and factorization.

  17. A simple proof of renormalization group equation in the minimal subtraction scheme

    International Nuclear Information System (INIS)

    Chetyrkin, K.G.

    1989-04-01

    We give a simple combinatorial proof of the renormalization group equation in the minimal subtraction scheme. Being mathematically rigorous, the proof avoids both the notorious complexity of techniques using parametric representations of Feynman diagrams and heuristic arguments of usual ''proofs'' calling up bare fields living in the space-time of complex dimension. It also copes easily with the general case of Green functions of arbitrary number of composite fields. (author). 24 refs

  18. Computer-aided proofs for multiparty computation with active security

    DEFF Research Database (Denmark)

    Haagh, Helene; Karbyshev, Aleksandr; Oechsner, Sabine

    2018-01-01

    Secure multi-party computation (MPC) is a general cryptographic technique that allows distrusting parties to compute a function of their individual inputs, while only revealing the output of the function. It has found applications in areas such as auctioning, email filtering, and secure...... teleconference. Given its importance, it is crucial that the protocols are specified and implemented correctly. In the programming language community it has become good practice to use computer proof assistants to verify correctness proofs. In the field of cryptography, EasyCrypt is the state of the art proof...... public-key encryption, signatures, garbled circuits and differential privacy. Here we show for the first time that it can also be used to prove security of MPC against a malicious adversary. We formalize additive and replicated secret sharing schemes and apply them to Maurer's MPC protocol for secure...

  19. Autonomous intelligent cars: proof that the EPSRC Principles are future-proof

    Science.gov (United States)

    de Cock Buning, Madeleine; de Bruin, Roeland

    2017-07-01

    Principle 2 of the EPSRC's principles of robotics (AISB workshop on Principles of Robotics, 2016) proves to be future proof when applied to the current state of the art of law and technology surrounding autonomous intelligent cars (AICs). Humans, not AICS, are responsible agents. AICs should be designed; operated as far as is practicable to comply with existing laws and fundamental rights and freedoms, including privacy by design. It will show that some legal questions arising from autonomous intelligent driving technology can be answered by the technology itself.

  20. Stable crack growth during over stressing or proof testing of pressure vessels

    International Nuclear Information System (INIS)

    Njo, D.H.

    1985-07-01

    In an earlier study several years ago an attempt has been made by a study group in Switzerland formed by representatives of utilities, manufacturers, inspection agency and the licensing authority to evaluate systematically the advantages and disadvantages of a proof test for a reactor pressure vessel (RPV) taking into account the different aspects involved. In this study, the present day practice in the requirements regarding proof testing in several countries with nuclear power plants were assessed. Using the method of fracture mechanics, taking into account the proof test conditions and material behaviour at hand, qualified quantitative statements were then sought for. One of the important findings of the study was that a sufficiently accurate determination of stable crack growth (SCG) during proof testing is a necessary precondition for a qualified quantitative statement. At that time this requirement could not be met. The aim of the present exercise of collecting available information on SCG was twofold: to get an overview of the present day requirements on pre-service and in-service proof testing of reactor pressure vessels in different countries with NPPs; to collect data on stable crack growth due to over stressing during proof tests to be used in the quantitative assessment, using fracture mechanics methods, and the potential benefit, if any, of proof tests. In the framework of the present study, the originally stipulated aims could not be achieved. It turned out to be a very complex and difficult problem, where various important aspects are little known and could not be assessed without further comprehensive theoretical and experimental investigations

  1. Phylogenetic trees and Euclidean embeddings.

    Science.gov (United States)

    Layer, Mark; Rhodes, John A

    2017-01-01

    It was recently observed by de Vienne et al. (Syst Biol 60(6):826-832, 2011) that a simple square root transformation of distances between taxa on a phylogenetic tree allowed for an embedding of the taxa into Euclidean space. While the justification for this was based on a diffusion model of continuous character evolution along the tree, here we give a direct and elementary explanation for it that provides substantial additional insight. We use this embedding to reinterpret the differences between the NJ and BIONJ tree building algorithms, providing one illustration of how this embedding reflects tree structures in data.

  2. Embedded 3D shape measurement system based on a novel spatio-temporal coding method

    Science.gov (United States)

    Xu, Bin; Tian, Jindong; Tian, Yong; Li, Dong

    2016-11-01

    Structured light measurement has been wildly used since 1970s in industrial component detection, reverse engineering, 3D molding, robot navigation, medical and many other fields. In order to satisfy the demand for high speed, high precision and high resolution 3-D measurement for embedded system, a new patterns combining binary and gray coding principle in space are designed and projected onto the object surface orderly. Each pixel corresponds to the designed sequence of gray values in time - domain, which is treated as a feature vector. The unique gray vector is then dimensionally reduced to a scalar which could be used as characteristic information for binocular matching. In this method, the number of projected structured light patterns is reduced, and the time-consuming phase unwrapping in traditional phase shift methods is avoided. This algorithm is eventually implemented on DM3730 embedded system for 3-D measuring, which consists of an ARM and a DSP core and has a strong capability of digital signal processing. Experimental results demonstrated the feasibility of the proposed method.

  3. Reversal burden of proof on corruption in Indonesia

    OpenAIRE

    Nugroho, Hibnu

    2018-01-01

    Corruption becomes the greatest enemy most countries face including Indonesia. Commitment to eradicate corruption significantly increases yet it would be meaningless if it is not supported by adequate legislation to implement the law effectively. Reversal burden of proof essentially aims to facilitate law enforcers to seek and disclose assets a suspect owns allegedly as corruption crime. The principle of reversal burden of proof was originated from Anglo-Saxon countries and this still applies...

  4. 6 CFR 13.30 - The hearing and burden of proof.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false The hearing and burden of proof. 13.30 Section 13.30 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.30 The hearing and burden of proof. (a) The ALJ will conduct a hearing on the record in order...

  5. IDE Support of String-Embedded Languages

    Directory of Open Access Journals (Sweden)

    S. Grigorev

    2014-01-01

    Full Text Available Complex information systems are often implemented by using more than one programming language. Sometimes this variety takes a form of one host and one or few string-embedded languages. Textual representation of clauses in a string-embedded language is built at run time by a host program and then analyzed, compiled or interpreted by a dedicated runtime component (database, web browser etc. Most general-purpose programming languages may play the role of the host; one of the most evident examples of the string-embedded language is the dynamic SQL which was specified in ISO SQL standard and is supported by the majority of DBMS. Standard IDE functionality such as code completion or syntax highlighting can really helps the developers who use this technique. There are several tools providing this functionality, but they all process only one concrete string-embedded language and cannot be easily extended for supporting another language. We present a platform which allows to easily create tools for string-embedded language processing.

  6. Getting Embedded in Industry Networks Abroad

    DEFF Research Database (Denmark)

    Gretzinger, Susanne; Dyhr Ulrich, Anna Marie; Hollensen, Svend

    (Hollensen, 2017). This research project aims to explain how the “incubator” can support the acquisition of lacking experiental knowledge and facilitate the process of getting embedded in markets or industrial networks abroad. Theoretical foundation This paper adopts an industrial network approach in line......Expanding to markets abroad is a vital opportunity to stabilize and/or expand a company’s revenues. Companies who suffer from small domestic markets try to overcome competitive pressures by entering new markets (Korsakine and Tvaronaviciene, 2012). In particular, the attention for SMEs to increase...... their activities abroad has turned to the potential of accessing emerging markets with faster growth like the BRIC countries (Brazil, Russia, India and China) in response to the saturation of domestic and European markets (Neupert, et al. 2006, Ulrich, et al., 2014). However, the challenges associated...

  7. Parametric embedding for class visualization.

    Science.gov (United States)

    Iwata, Tomoharu; Saito, Kazumi; Ueda, Naonori; Stromsten, Sean; Griffiths, Thomas L; Tenenbaum, Joshua B

    2007-09-01

    We propose a new method, parametric embedding (PE), that embeds objects with the class structure into a low-dimensional visualization space. PE takes as input a set of class conditional probabilities for given data points and tries to preserve the structure in an embedding space by minimizing a sum of Kullback-Leibler divergences, under the assumption that samples are generated by a gaussian mixture with equal covariances in the embedding space. PE has many potential uses depending on the source of the input data, providing insight into the classifier's behavior in supervised, semisupervised, and unsupervised settings. The PE algorithm has a computational advantage over conventional embedding methods based on pairwise object relations since its complexity scales with the product of the number of objects and the number of classes. We demonstrate PE by visualizing supervised categorization of Web pages, semisupervised categorization of digits, and the relations of words and latent topics found by an unsupervised algorithm, latent Dirichlet allocation.

  8. Formal Proofs for Nonlinear Optimization

    Directory of Open Access Journals (Sweden)

    Victor Magron

    2015-01-01

    Full Text Available We present a formally verified global optimization framework. Given a semialgebraic or transcendental function f and a compact semialgebraic domain K, we use the nonlinear maxplus template approximation algorithm to provide a certified lower bound of f over K.This method allows to bound in a modular way some of the constituents of f by suprema of quadratic forms with a well chosen curvature. Thus, we reduce the initial goal to a hierarchy of semialgebraic optimization problems, solved by sums of squares relaxations. Our implementation tool interleaves  semialgebraic approximations with sums of squares witnesses to form certificates. It is interfaced with Coq and thus benefits from the trusted arithmetic available inside the proof assistant. This feature is used to produce, from the certificates, both valid underestimators and lower bounds for each approximated constituent.The application range for such a tool is widespread; for instance Hales' proof of Kepler's conjecture yields thousands of multivariate transcendental inequalities. We illustrate the performance of our formal framework on some of these inequalities as well as on examples from the global optimization literature.

  9. 47 CFR 1.359 - Proof of official record; authentication of copy.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Proof of official record; authentication of copy. 1.359 Section 1.359 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL PRACTICE AND PROCEDURE Hearing Proceedings Evidence § 1.359 Proof of official record; authentication of copy. An official...

  10. UK Safeguards R and D Project progress report for the period July 1983 - April 1984

    International Nuclear Information System (INIS)

    Adams, J.M.

    1984-10-01

    Progress reports are presented on the following projects: centrifuge enrichment plant safeguards; stores safeguards and general accounting techniques; generic programmes (projects underlying many instrument systems (e.g. tamper proofing and indication; neutron interrogation systems); system studies); FBR fuel cycle safeguards; service programmes (services to the IAEA); exploratory and short projects. (U.K.)

  11. A False-name-Proof Double Auction Protocol for Arbitrary Evaluation Values

    Science.gov (United States)

    Sakurai, Yuko; Yokoo, Makoto

    We develop a new false-name-proof double auction protocol called the Generalized Threshold Price Double auction (GTPD) protocol. False-name-proofness generalizes strategy-proofness by incorporating the possibility of false-name bids, e.g., bids submitted using multiple e-mail addresses. An existing protocol called TPD protocol is false-name-proof but can handle only the cases where marginal utilities of each agent always decrease, while our new GTPD protocol can handle arbitrary evaluation values. When marginal utilities can increase, some bids cannot be divided into a single unit (e.g., an all-or-nothing bid). Due to the existence of such indivisible bids, meeting supply/demand becomes difficult. Furthermore, a seller/buyer can submit a false-name-bid by pretending to be a potential buyer/seller to manipulate allocations and payments. In the GTPD protocol, the auctioneer is required to absorb the supply-demand imbalance up to a given upper-bound. Also, the GTPD incorporate a new false-name-proof one-sided auction protocol that is guaranteed to sell/buy a certain number of units. Simulation results show that when the threshold price is set appropriately, this protocol can obtain a good social surplus, and the number of absorbed units is much smaller than the given upper-bound.

  12. Cross functional organisational embedded system development

    OpenAIRE

    Lennon, Sophie

    2015-01-01

    peer-reviewed Embedded system development is continuing to grow. Medical, automotive and Internet of Things are just some of the market segments. There is a tight coupling between hardware and software when developing an embedded system, often needing to meet strict performance targets, standards requirements and aggressive schedules. Embedded software developers need to consider hardware requirements in far greater detail as they can have a significant impact on the quality and value of t...

  13. Laser assisted embedding of nanoparticles into metallic materials

    International Nuclear Information System (INIS)

    Lin Dong; Suslov, Sergey; Ye Chang; Liao Yiliang; Liu, C. Richard; Cheng, Gary J.

    2012-01-01

    This paper reports a methodology of half-embedding nanoparticles into metallic materials. Transparent and opaque nanoparticles are chosen to demonstrate the process of laser assisted nanoparticle embedding. Dip coating method is used to coat transparent or opaque nanoparticle on the surface of metallic material. Nanoparticles are embedded into substrate by laser irradiation. In this study, the mechanism and process of nanoparticle embedding are investigated. It is found both transparent and opaque nanoparticles embedding are with high densities and good uniformities.

  14. Semantics and correctness proofs for programs with partial functions

    International Nuclear Information System (INIS)

    Yakhnis, A.; Yakhnis, V.

    1996-01-01

    This paper presents a portion of the work on specification, design, and implementation of safety-critical systems such as reactor control systems. A natural approach to this problem, once all the requirements are captured, would be to state the requirements formally and then either to prove (preferably via automated tools) that the system conforms to spec (program verification), or to try to simultaneously generate the system and a mathematical proof that the requirements are being met (program derivation). An obstacle to this is frequent presence of partially defined operations within the software and its specifications. Indeed, the usual proofs via first order logic presuppose everywhere defined operations. Recognizing this problem, David Gries, in ''The Science of Programming,'' 1981, introduced the concept of partial functions into the mainstream of program correctness and gave hints how his treatment of partial functions could be formalized. Still, however, existing theorem provers and software verifiers have difficulties in checking software with partial functions, because of absence of uniform first order treatment of partial functions within classical 2-valued logic. Several rigorous mechanisms that took partiality into account were introduced [Wirsing 1990, Breu 1991, VDM 1986, 1990, etc.]. However, they either did not discuss correctness proofs or departed from first order logic. To fill this gap, the authors provide a semantics for software correctness proofs with partial functions within classical 2-valued 1st order logic. They formalize the Gries treatment of partial functions and also cover computations of functions whose argument lists may be only partially available. An example is nuclear reactor control relying on sensors which may fail to deliver sense data. This approach is sufficiently general to cover correctness proofs in various implementation languages

  15. Strategy-Proof Assignment Of Multiple Resources

    DEFF Research Database (Denmark)

    Erlanson, Albin; Szwagrzak, Karol

    2015-01-01

    We examine the strategy-proof allocation of multiple resources; an application is the assignment of packages of tasks, workloads, and compensations among the members of an organization. In the domain of multidimensional single-peaked preferences, we find that any allocation mechanism obtained by ...

  16. Time-Scale Invariant Audio Data Embedding

    Directory of Open Access Journals (Sweden)

    Mansour Mohamed F

    2003-01-01

    Full Text Available We propose a novel algorithm for high-quality data embedding in audio. The algorithm is based on changing the relative length of the middle segment between two successive maximum and minimum peaks to embed data. Spline interpolation is used to change the lengths. To ensure smooth monotonic behavior between peaks, a hybrid orthogonal and nonorthogonal wavelet decomposition is used prior to data embedding. The possible data embedding rates are between 20 and 30 bps. However, for practical purposes, we use repetition codes, and the effective embedding data rate is around 5 bps. The algorithm is invariant after time-scale modification, time shift, and time cropping. It gives high-quality output and is robust to mp3 compression.

  17. The Activation of Embedded Words in Spoken Word Recognition.

    Science.gov (United States)

    Zhang, Xujin; Samuel, Arthur G

    2015-01-01

    The current study investigated how listeners understand English words that have shorter words embedded in them. A series of auditory-auditory priming experiments assessed the activation of six types of embedded words (2 embedded positions × 3 embedded proportions) under different listening conditions. Facilitation of lexical decision responses to targets (e.g., pig) associated with words embedded in primes (e.g., hamster ) indexed activation of the embedded words (e.g., ham ). When the listening conditions were optimal, isolated embedded words (e.g., ham ) primed their targets in all six conditions (Experiment 1a). Within carrier words (e.g., hamster ), the same set of embedded words produced priming only when they were at the beginning or comprised a large proportion of the carrier word (Experiment 1b). When the listening conditions were made suboptimal by expanding or compressing the primes, significant priming was found for isolated embedded words (Experiment 2a), but no priming was produced when the carrier words were compressed/expanded (Experiment 2b). Similarly, priming was eliminated when the carrier words were presented with one segment replaced by noise (Experiment 3). When cognitive load was imposed, priming for embedded words was again found when they were presented in isolation (Experiment 4a), but not when they were embedded in the carrier words (Experiment 4b). The results suggest that both embedded position and proportion play important roles in the activation of embedded words, but that such activation only occurs under unusually good listening conditions.

  18. Learning between projects: More than sending messages in bottles

    OpenAIRE

    Hartmann, Andreas; Dorée, André

    2015-01-01

    Although learning from projects has gained much importance in research and practice, progress in understanding and improving inter-project learning appears to be slight. We argue that the adoption of a sender/receiver approach limits the learning effectiveness in project-based organisations. Drawing upon the notion of learning as a social activity embedded in an organisational context, we develop the argument that learning from projects takes place within projects rooted in the historical, or...

  19. 47 CFR 1.254 - Nature of the hearing; burden of proof.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Nature of the hearing; burden of proof. 1.254 Section 1.254 Telecommunication FEDERAL COMMUNICATIONS COMMISSION GENERAL PRACTICE AND PROCEDURE Hearing Proceedings Hearing and Intermediate Decision § 1.254 Nature of the hearing; burden of proof. Any hearing upon...

  20. Embedding Complementarity in HCI Methods and Techniques

    DEFF Research Database (Denmark)

    Nielsen, Janni; Yssing, Carsten; Tweddell Levinsen, Karin

    Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded in the tec......Differences in cultural contexts constitute differences in cognition, and research has shown that different cultures may use different cognitive tools for perception and reasoning. The cultural embeddings are significant in relation to HCI, because the cultural context is also embedded...... the HCI paradigm in system development....

  1. Graphical Model Debugger Framework for Embedded Systems

    DEFF Research Database (Denmark)

    Zeng, Kebin

    2010-01-01

    Model Driven Software Development has offered a faster way to design and implement embedded real-time software by moving the design to a model level, and by transforming models to code. However, the testing of embedded systems has remained at the code level. This paper presents a Graphical Model...... Debugger Framework, providing an auxiliary avenue of analysis of system models at runtime by executing generated code and updating models synchronously, which allows embedded developers to focus on the model level. With the model debugger, embedded developers can graphically test their design model...

  2. Goedel, truth and proof

    International Nuclear Information System (INIS)

    Peregrin, Jaroslav

    2007-01-01

    The usual way of interpreting Goedel's (1931) incompleteness result is as showing that there is a gap between truth and provability, i.e. that we can never prove everything that is true. Moreover, this result is supposed to show that there are unprovable truths which we can know to be true. This, so the story goes, shows that we are more than machines that are restricted to acting as proof systems. Hence our minds are 'not mechanical'

  3. Project studies and engaged scholarship

    DEFF Research Database (Denmark)

    Geraldi, Joana; Söderlund, Jonas

    2016-01-01

    and to rejuvenate these research directions. Design/methodology/approach The authors propose the umbrella term: “project studies” to denote the research related to projects and temporary organizing. Project studies is conceived not only as a body of research, but also as a social process embedded in research...... scholars, who’s “job” goes beyond the writing of articles and research applications, and includes shaping discourses of project research, nurturing new project scholars, contributing to project practice and carefully considering the legacy of projects and project studies in society. Originality......Purpose In 2006, the “Rethinking Project Management” network called for a paradigm shift in project research, and proposed five research directions. The directions inspired research and marked a milestone in the development of the field. The purpose of this paper is to reflect on the past decade...

  4. Smart multicore embedded systems

    CERN Document Server

    Bertels, Koen; Karlsson, Sven; Pacull, François

    2014-01-01

    This book provides a single-source reference to the state-of-the-art of high-level programming models and compilation tool-chains for embedded system platforms. The authors address challenges faced by programmers developing software to implement parallel applications in embedded systems, where very often they are forced to rewrite sequential programs into parallel software, taking into account all the low level features and peculiarities of the underlying platforms. Readers will benefit from these authors’ approach, which takes into account both the application requirements and the platform specificities of various embedded systems from different industries. Parallel programming tool-chains are described that take as input parameters both the application and the platform model, then determine relevant transformations and mapping decisions on the concrete platform, minimizing user intervention and hiding the difficulties related to the correct and efficient use of memory hierarchy and low level code generati...

  5. Energy Efficiency of Task Allocation for Embedded JPEG Systems

    Directory of Open Access Journals (Sweden)

    Yang-Hsin Fan

    2014-01-01

    Full Text Available Embedded system works everywhere for repeatedly performing a few particular functionalities. Well-known products include consumer electronics, smart home applications, and telematics device, and so forth. Recently, developing methodology of embedded systems is applied to conduct the design of cloud embedded system resulting in the applications of embedded system being more diverse. However, the more energy consumes result from the more embedded system works. This study presents hyperrectangle technology (HT to embedded system for obtaining energy saving. The HT adopts drift effect to construct embedded systems with more hardware circuits than software components or vice versa. It can fast construct embedded system with a set of hardware circuits and software components. Moreover, it has a great benefit to fast explore energy consumption for various embedded systems. The effects are presented by assessing a JPEG benchmarks. Experimental results demonstrate that the HT, respectively, achieves the energy saving by 29.84%, 2.07%, and 68.80% on average to GA, GHO, and Lin.

  6. Energy efficiency of task allocation for embedded JPEG systems.

    Science.gov (United States)

    Fan, Yang-Hsin; Wu, Jan-Ou; Wang, San-Fu

    2014-01-01

    Embedded system works everywhere for repeatedly performing a few particular functionalities. Well-known products include consumer electronics, smart home applications, and telematics device, and so forth. Recently, developing methodology of embedded systems is applied to conduct the design of cloud embedded system resulting in the applications of embedded system being more diverse. However, the more energy consumes result from the more embedded system works. This study presents hyperrectangle technology (HT) to embedded system for obtaining energy saving. The HT adopts drift effect to construct embedded systems with more hardware circuits than software components or vice versa. It can fast construct embedded system with a set of hardware circuits and software components. Moreover, it has a great benefit to fast explore energy consumption for various embedded systems. The effects are presented by assessing a JPEG benchmarks. Experimental results demonstrate that the HT, respectively, achieves the energy saving by 29.84%, 2.07%, and 68.80% on average to GA, GHO, and Lin.

  7. Modifying the ECC-based grouping-proof RFID system to increase inpatient medication safety.

    Science.gov (United States)

    Ko, Wen-Tsai; Chiou, Shin-Yan; Lu, Erl-Huei; Chang, Henry Ker-Chang

    2014-09-01

    RFID technology is increasingly used in applications that require tracking, identification, and authentication. It attaches RFID-readable tags to objects for identification and execution of specific RFID-enabled applications. Recently, research has focused on the use of grouping-proofs for preserving privacy in RFID applications, wherein a proof of two or more tags must be simultaneously scanned. In 2010, a privacy-preserving grouping proof protocol for RFID based on ECC in public-key cryptosystem was proposed but was shown to be vulnerable to tracking attacks. A proposed enhancement protocol was also shown to have defects which prevented proper execution. In 2012, Lin et al. proposed a more efficient RFID ECC-based grouping proof protocol to promote inpatient medication safety. However, we found this protocol is also vulnerable to tracking and impersonation attacks. We then propose a secure privacy-preserving RFID grouping proof protocol for inpatient medication safety and demonstrate its resistance to such attacks.

  8. A 3-axis force balanced accelerometer using a single proof-mass

    Energy Technology Data Exchange (ETDEWEB)

    Lemkin, M.A.; Boser, B.E.; Auslander, D. [Univ. of California, Berkeley, CA (United States); Smith, J. [Sandia National Lab., Albuquerque, NM (United States)

    1997-04-01

    This paper presents a new method for wideband force balancing a proof-mass in multiple axes simultaneously. Capacitive position sense and force feedback are accomplished using the same air-gap capacitors through time multiplexing. Proof of concept is experimentally demonstrated with a single-mass monolithic surface micromachined 3-axis accelerometer.

  9. Gene-Auto: Automatic Software Code Generation for Real-Time Embedded Systems

    Science.gov (United States)

    Rugina, A.-E.; Thomas, D.; Olive, X.; Veran, G.

    2008-08-01

    This paper gives an overview of the Gene-Auto ITEA European project, which aims at building a qualified C code generator from mathematical models under Matlab-Simulink and Scilab-Scicos. The project is driven by major European industry partners, active in the real-time embedded systems domains. The Gene- Auto code generator will significantly improve the current development processes in such domains by shortening the time to market and by guaranteeing the quality of the generated code through the use of formal methods. The first version of the Gene-Auto code generator has already been released and has gone thought a validation phase on real-life case studies defined by each project partner. The validation results are taken into account in the implementation of the second version of the code generator. The partners aim at introducing the Gene-Auto results into industrial development by 2010.

  10. The Activation of Embedded Words in Spoken Word Recognition

    Science.gov (United States)

    Zhang, Xujin; Samuel, Arthur G.

    2015-01-01

    The current study investigated how listeners understand English words that have shorter words embedded in them. A series of auditory-auditory priming experiments assessed the activation of six types of embedded words (2 embedded positions × 3 embedded proportions) under different listening conditions. Facilitation of lexical decision responses to targets (e.g., pig) associated with words embedded in primes (e.g., hamster) indexed activation of the embedded words (e.g., ham). When the listening conditions were optimal, isolated embedded words (e.g., ham) primed their targets in all six conditions (Experiment 1a). Within carrier words (e.g., hamster), the same set of embedded words produced priming only when they were at the beginning or comprised a large proportion of the carrier word (Experiment 1b). When the listening conditions were made suboptimal by expanding or compressing the primes, significant priming was found for isolated embedded words (Experiment 2a), but no priming was produced when the carrier words were compressed/expanded (Experiment 2b). Similarly, priming was eliminated when the carrier words were presented with one segment replaced by noise (Experiment 3). When cognitive load was imposed, priming for embedded words was again found when they were presented in isolation (Experiment 4a), but not when they were embedded in the carrier words (Experiment 4b). The results suggest that both embedded position and proportion play important roles in the activation of embedded words, but that such activation only occurs under unusually good listening conditions. PMID:25593407

  11. Proofs of the Cantor-Bernstein theorem a mathematical excursion

    CERN Document Server

    Hinkis, Arie

    2013-01-01

    This book offers an excursion through the developmental area of research mathematics. It presents some 40 papers, published between the 1870s and the 1970s, on proofs of the Cantor-Bernstein theorem and the related Bernstein division theorem. While the emphasis is placed on providing accurate proofs, similar to the originals, the discussion is broadened to include aspects that pertain to the methodology of the development of mathematics and to the philosophy of mathematics. Works of prominent mathematicians and logicians are reviewed, including Cantor, Dedekind, Schröder, Bernstein, Borel, Zermelo, Poincaré, Russell, Peano, the Königs, Hausdorff, Sierpinski, Tarski, Banach, Brouwer and several others mainly of the Polish and the Dutch schools. In its attempt to present a diachronic narrative of one mathematical topic, the book resembles Lakatos’ celebrated book Proofs and Refutations. Indeed, some of the observations made by Lakatos are corroborated herein. The analogy between the two books is clearly an...

  12. Steganographic embedding in containers-images

    Science.gov (United States)

    Nikishova, A. V.; Omelchenko, T. A.; Makedonskij, S. A.

    2018-05-01

    Steganography is one of the approaches to ensuring the protection of information transmitted over the network. But a steganographic method should vary depending on a used container. According to statistics, the most widely used containers are images and the most common image format is JPEG. Authors propose a method of data embedding into a frequency area of images in format JPEG 2000. It is proposed to use the method of Benham-Memon- Yeo-Yeung, in which instead of discrete cosine transform, discrete wavelet transform is used. Two requirements for images are formulated. Structure similarity is chosen to obtain quality assessment of data embedding. Experiments confirm that requirements satisfaction allows achieving high quality assessment of data embedding.

  13. Equihash: Asymmetric Proof-of-Work Based on the Generalized Birthday Problem

    Directory of Open Access Journals (Sweden)

    Alex Biryukov

    2017-04-01

    Full Text Available Proof-of-work is a central concept in modern cryptocurrencies and denial-ofservice protection tools, but the requirement for fast verification so far has made it an easy prey for GPU-, ASIC-, and botnet-equipped users. The attempts to rely on memory-intensive computations in order to remedy the disparity between architectures have resulted in slow or broken schemes. In this paper we solve this open problem and show how to construct an asymmetric proof-of-work (PoW based on a computationally-hard problem, which requires a great deal of memory to generate a proof (called a ”memory-hardness” feature but is instant to verify. Our primary proposal, Equihash, is a PoW based on the generalized birthday problem and enhanced Wagner’s algorithm for it. We introduce the new technique of algorithm binding to prevent cost amortization and demonstrate that possible parallel implementations are constrained by memory bandwidth. Our scheme has tunable and steep time-space tradeoffs, which impose large computational penalties if less memory is used. Our solution is practical and ready to deploy: a reference implementation of a proof-of-work requiring 700 MB of RAM runs in 15 seconds on a 2.1 GHz CPU, increases the computations by a factor of 1000 if memory is halved, and presents a proof of just 120 bytes long.

  14. Embedding initial data for black hole collisions

    OpenAIRE

    Romano, Joseph D.; Price, Richard H.

    1994-01-01

    We discuss isometric embedding diagrams for the visualization of initial data for the problem of the head-on collision of two black holes. The problem of constructing the embedding diagrams is explicitly presented for the best studied initial data, the Misner geometry. We present a partial solution of the embedding diagrams and discuss issues related to completing the solution.

  15. Embedded Academic Librarianship: A Review of the Literature

    Directory of Open Access Journals (Sweden)

    Stephanie J. Schulte

    2012-12-01

    Full Text Available Objectives – The purpose of this review is to examine the development of embedded librarianship, its multiple meanings, and activities in practice. The review will also report on published outcomes and future research needs of embedded librarian programs.Methods – A search of current literature was conducted and summarized searching PubMed, CINAHL, Library, Information Science & Technology Abstracts (EBSCO, Academic Search Complete, and ERIC (EBSCO through August 23, 2012. Articles wereselected for inclusion in the review if they reported research findings related to embedded librarianship, if they provided unique case reports about embedded librarian programs, or if they provided substantive editorial comments on the topic. Relevant study findings were assessed for quality and presented in tabular and narrative form.Results – Currently, there is disparity in how embedded librarianship is being definedand used in common practice, ranging from embedding an online component into asingle course to full physical and cultural integration into an academic college orbusiness unit of an organization. Activities of embedded librarians include creatingcourse integrated instruction modules for either face-to-face or online courses, providingin depth research assistance to students or faculty, and co-locating within colleges orcustomer units via office hours for a few hours to all hours per week. Several case reports exist in the recent literature. Few high quality research studies reporting outcomes of librarians or library programs labeled as embedded exist at this point. Some evidence suggests that embedded librarians are effective with regards to student learning of information literacy objectives. Surveys suggest that both students and faculty appreciate embedded librarian services.Conclusion – Most published accounts discuss librarians embedding content and ready access to services in an online course management system. A few notable cases

  16. Modeling of Embedded Human Systems

    Science.gov (United States)

    2013-07-01

    ISAT study [7] for DARPA in 20051 concretized the notion of an embedded human, who is a necessary component of the system. The proposed work integrates...Technology, IEEE Transactions on, vol. 16, no. 2, pp. 229–244, March 2008. [7] C. J. Tomlin and S. S. Sastry, “Embedded humans,” tech. rep., DARPA ISAT

  17. Pythagoras on the rocks. A proof with bricks

    Directory of Open Access Journals (Sweden)

    Michele Cagol

    2016-04-01

    Full Text Available In this short paper a practical and simple proof of the Pythagorean theorem is proposed. It uses colourful interlocking plastic bricks with two shapes: a cube that measures two centimeters on each side and a right prism where the base is a right-angled isosceles triangle and the two equal rectangular faces are the same as those of the cubic brick. The proof is designed for primary school children (but also for preschool children and begins by telling the legend of Pythagoras, who discovered his theorem by looking at the floor tile pattern of Polycrates’ palace. This proof takes into account only right-angled isosceles triangle but it is possible to show the validity of Pythagorean theorem for all right-angled triangles by building a simple proof by rearrangement. Pitagora on the rocks. Una dimostrazione con i mattonciniIn questo breve contributo viene proposta una semplice dimostrazione pratica del teorema di Pitagora, utilizzando mattoncini a incastro di plastica colorata di due forme: un cubo di due centimetri per lato e un prisma retto la cui base è un triangolo isoscele rettangolo e nel quale le due facce equivalenti sono uguali a quelle del mattoncino cubico. La dimostrazione è rivolta a bambini della scuola primaria (ma, eventualmente, anche in età prescolare e prende le mosse dalla leggenda secondo la quale Pitagora avrebbe scoperto il suo teorema mentre stava osservando il pavimento piastrellato del palazzo di Policrate, tiranno di Samo. Da questa dimostrazione – che prende in considerazione solo triangoli rettangoli isosceli – è poi possibile passare a una dimostrazione del teorema di Pitagora per tutti i triangoli rettangoli.

  18. Quantum thetas on noncommutative Td with general embeddings

    International Nuclear Information System (INIS)

    Chang-Young, Ee; Kim, Hoil

    2008-01-01

    In this paper, we construct quantum theta functions over noncommutative T d with general embeddings. Manin has constructed quantum theta functions from the lattice embedding into vector space x finite group. We extend Manin's construction of quantum thetas to the case of general embedding of vector space x lattice x torus. It turns out that only for the vector space part of the embedding there exists the holomorphic theta vector, while for the lattice part there does not. Furthermore, the so-called quantum translations from embedding into the lattice part become non-additive, while those from the vector space part are additive

  19. AdS2 models in an embedding superspace

    International Nuclear Information System (INIS)

    McKeon, D.G.C.; Sherry, T.N.

    2003-01-01

    An embedding superspace, whose bosonic part is the flat (2+1)-dimensional embedding space for AdS 2 , is introduced. Superfields and several supersymmetric models are examined in the embedded AdS 2 superspace

  20. Opportunities to Learn Reasoning and Proof in High School Mathematics Textbooks

    Science.gov (United States)

    Thompson, Denisse R.; Senk, Sharon L.; Johnson, Gwendolyn J.

    2012-01-01

    The nature and extent of reasoning and proof in the written (i.e., intended) curriculum of 20 contemporary high school mathematics textbooks were explored. Both the narrative and exercise sets in lessons dealing with the topics of exponents, logarithms, and polynomials were examined. The extent of proof-related reasoning varied by topic and…

  1. Proof and Proving: Logic, Impasses, and the Relationship to Problem Solving

    Science.gov (United States)

    Savic, Milos

    2012-01-01

    Becoming a skillful prover is critical for success in advanced undergraduate and graduate mathematics courses. In this dissertation, I report my investigations of proof and the proving process in three separate studies. In the first study, I examined the amount of logic used in student-constructed proofs to help in the design of…

  2. Embedded Electro-Optic Sensor Network for the On-Site Calibration and Real-Time Performance Monitoring of Large-Scale Phased Arrays

    National Research Council Canada - National Science Library

    Yang, Kyoung

    2005-01-01

    This final report summarizes the progress during the Phase I SBIR project entitled "Embedded Electro-Optic Sensor Network for the On-Site Calibration and Real-Time Performance Monitoring of Large-Scale Phased Arrays...

  3. Novel photodefined polymer-embedded vias for silicon interposers

    International Nuclear Information System (INIS)

    Thadesar, Paragkumar A; Bakir, Muhannad S

    2013-01-01

    This paper describes the fabrication and characterization of novel photodefined polymer-embedded vias for silicon interposers. The fabricated polymer-embedded vias can help obtain ∼3.8× reduction in via-to-via capacitance as well as a reduction in insertion loss compared to TSVs with a silicon dioxide liner. Polymer-embedded vias 100 μm in diameter, 270 μm tall and at 250 μm pitch were fabricated. Resistance and leakage measurements were performed for the fabricated polymer-embedded vias. The average value of the measured resistance for 20 polymer-embedded vias is 2.54 mΩ and the maximum measured via-to-via leakage current for 10 pairs of polymer-embedded vias is 80.8 pA for an applied voltage of 200 V. (paper)

  4. A proof of the conjecture on the twin primes

    Energy Technology Data Exchange (ETDEWEB)

    Zuo-ling, Zhou [Department of Lingnan college, Sun Yat-sen University GuangZhou, GuangDong, 510275 (China)

    2016-06-08

    In this short note, we have proved the conjecture on twin primes using some thoughts of the set theory. Firstly, using the original sieve method and a new notation(concept)introduced by myself, the conjecture on twin primes is summed up as an elementary successive limit, afterwards we form a subsequence of positive integers,and using it,we prove that the successive limits are commutative and complete the proof of the conjecture on twin primes We also give a more straightforward proof of the conjecture.

  5. Carbon dioxide cleaning pilot project

    International Nuclear Information System (INIS)

    Knight, L.; Blackman, T.E.

    1994-01-01

    In 1989, radioactive-contaminated metal at the Rocky Flats Plant (RFP) was cleaned using a solvent paint stripper (Methylene chloride). One-third of the radioactive material was able to be recycled; two-thirds went to the scrap pile as low-level mixed waste. In addition, waste solvent solutions also required disposal. Not only was this an inefficient process, it was later prohibited by the Resource Conservation and Recovery Act (RCRA), 40 CFR 268. A better way of doing business was needed. In the search for a solution to this situation, it was decided to study the advantages of using a new technology - pelletized carbon dioxide cleaning. A proof of principle demonstration occurred in December 1990 to test whether such a system could clean radioactive-contaminated metal. The proof of principle demonstration was expanded in June 1992 with a pilot project. The purpose of the pilot project was three fold: (1) to clean metal so that it can satisfy free release criteria for residual radioactive contamination at the Rocky Flats Plant (RFP); (2) to compare two different carbon dioxide cleaning systems; and (3) to determine the cost-effectiveness of decontamination process in a production situation and compare the cost of shipping the metal off site for waste disposal. The pilot project was completed in August 1993. The results of the pilot project were: (1) 90% of those items which were decontaminated, successfully met the free release criteria , (2) the Alpheus Model 250 was selected to be used on plantsite and (3) the break even cost of decontaminating the metal vs shipping the contaminated material offsite for disposal was a cleaning rate of 90 pounds per hour, which was easily achieved

  6. Better business case for embedded energy

    International Nuclear Information System (INIS)

    Wallace, Paula

    2014-01-01

    The first customer-led rule change to reform the National Energy Market has been successful, making it easier for clean energy to connect to the national electricity grid. The rule change was adopted by the Australian Energy Market Commission (AEMC) recently and will come into effect from October 1. Led by ClimateWorks Australia, the Property Council of Australia and Seed Advisory, these reforms will make it cheaper and faster to connect co/trigeneration plants and renewable energy to the electricity grid. Some see the reforms unleashing a wave of embedded generation projects on commercial buildings and precincts, seeking energy savings and higher sustainability ratings. However, the benefits that can be assumed at this stage are, greater information from electricity network operators to avoid delays, and known fees and charges so that financial feasibility can be calculated up front.

  7. Surface Embedded Metal Oxide Sensors (SEMOS)

    DEFF Research Database (Denmark)

    Jespersen, Jesper Lebæk; Talat Ali, Syed; Pleth Nielsen, Lars

    SEMOS is a joint project between Aalborg University, Danish Technological Institute and Danish Technical University in which micro temperature sensors and metal oxide-based gas sensors are developed and tested in a simulated fuel cell environment as well as in actual working fuel cells. Initially......, sensors for measuring the temperatures in an operating HT-PEM (High Temperature-Proton Exchange Membrane) fuel cell are developed for detecting in-plane temperature variations. 5 different tracks for embedded thermal sensors are investigated. The fuel cell MEA (Membrane Electrode Assembly) is quite...... complex and sensors are not easily implemented in the construction. Hence sensor interface and sensor position must therefore be chosen carefully in order to make the sensors as non-intrusive as possible. Metal Oxide Sensors (MOX) for measuring H2, O2 and CO concentration in a fuel cell environment...

  8. Writing Activities Embedded in Bioscience Laboratory Courses to Change Students' Attitudes and Enhance Their Scientific Writing

    Science.gov (United States)

    Lee, Susan E.; Woods, Kyra J.; Tonissen, Kathryn F.

    2011-01-01

    We introduced writing activities into a project style third year undergraduate biomolecular science laboratory to assist the students to produce a final report in the form of a journal article. To encourage writing while the experimental work was proceeding, the embedded writing activities required ongoing analysis of experimental data. After…

  9. Exploring mathematics problem-solving and proof

    CERN Document Server

    Grieser, Daniel

    2018-01-01

    Have you ever faced a mathematical problem and had no idea how to approach it? Or perhaps you had an idea but got stuck halfway through? This book guides you in developing your creativity, as it takes you on a voyage of discovery into mathematics. Readers will not only learn strategies for solving problems and logical reasoning, but they will also learn about the importance of proofs and various proof techniques. Other topics covered include recursion, mathematical induction, graphs, counting, elementary number theory, and the pigeonhole, extremal and invariance principles. Designed to help students make the transition from secondary school to university level, this book provides readers with a refreshing look at mathematics and deep insights into universal principles that are valuable far beyond the scope of this book. Aimed especially at undergraduate and secondary school students as well as teachers, this book will appeal to anyone interested in mathematics. Only basic secondary school mathematics is requi...

  10. Final report on the maintenance asset management project : phase I.

    Science.gov (United States)

    2012-07-01

    This project resulted in the development of a proof of concept for a features inventory process to be used by field staff. The resulting concept is adaptable for different asset classes (e.g. culverts, guardrail) and able to leverage existing DOT res...

  11. ENVIRONMENTAL MANAGEMENT SCIENCE PROGRAM RESEARCH PROJECTS TO IMPROVE DECONTAMINATION AND DECOMMISIONING OF U.S. DEPARTMENT OF ENERGY FACILITIES

    International Nuclear Information System (INIS)

    Phillips, Ann Marie

    2003-01-01

    This paper describes fourteen basic science projects aimed at solving decontamination and decommissioning (D and D) problems within the U.S. Department of Energy (DOE). Funded by the Environmental Science Management Program (EMSP), these research projects address D and D problems where basic science is needed to expand knowledge and develop solutions to help DOE meet its cleanup milestones. EMSP uses directed solicitations targeted at identified Environmental Management (EM) needs to ensure that research results are directly applicable to DOE's EM problems. The program then helps transition the projects from basic to applied research by identifying end-users and coordinating proof-of-principle field tests. EMSP recently funded fourteen D and D research projects through the directed solicitation process. These research projects will be discussed, including description, current status, and potential impact. Through targeted research and proof-of-principle tests, it is hoped that EMSP's fourteen D and D basic research projects will directly impact and provide solutions to DOE's D and D problems

  12. ENVIRONMENTAL MANAGEMENT SCIENCE PROGRAM RESEARCH PROJECTS TO IMPROVE DECONTAMINATION AND DECOMMISIONING OF U.S. DEPARTMENT OF ENERGY FACILITIES

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, Ann Marie

    2003-02-27

    This paper describes fourteen basic science projects aimed at solving decontamination and decommissioning (D&D) problems within the U.S. Department of Energy (DOE). Funded by the Environmental Science Management Program (EMSP), these research projects address D&D problems where basic science is needed to expand knowledge and develop solutions to help DOE meet its cleanup milestones. EMSP uses directed solicitations targeted at identified Environmental Management (EM) needs to ensure that research results are directly applicable to DOE's EM problems. The program then helps transition the projects from basic to applied research by identifying end-users and coordinating proof-of-principle field tests. EMSP recently funded fourteen D&D research projects through the directed solicitation process. These research projects will be discussed, including description, current status, and potential impact. Through targeted research and proof-of-principle tests, it is hoped that EMSP's fourteen D&D basic research projects will directly impact and provide solutions to DOE's D&D problems.

  13. A short list color proof of Grötzsch's theorem

    DEFF Research Database (Denmark)

    Thomassen, Carsten

    2003-01-01

    We give a short proof of the result that every planar graph of girth 5 is 3-choosable and hence also of Grotzsch's theorem saying that every planar triangle-free graph is 3-colorable.......We give a short proof of the result that every planar graph of girth 5 is 3-choosable and hence also of Grotzsch's theorem saying that every planar triangle-free graph is 3-colorable....

  14. Parity proofs of the Kochen–Specker theorem based on the Lie algebra E8

    International Nuclear Information System (INIS)

    Waegell, Mordecai; Aravind, P K

    2015-01-01

    The 240 root vectors of the Lie algebra E8 lead to a system of 120 rays in a real eight-dimensional Hilbert space that contains a large number of parity proofs of the Kochen–Specker (KS) theorem. After introducing the rays in a triacontagonal representation due to Coxeter, we present their KS diagram in the form of a ‘basis table’ showing all 2025 bases (i.e., sets of eight mutually orthogonal rays) formed by the rays. Only a few of the bases are actually listed, but simple rules are given, based on the symmetries of E8, for obtaining all the other bases from the ones shown. The basis table is an object of great interest because all the parity proofs of E8 can be exhibited as subsets of it. We show how the triacontagonal representation of E8 facilitates the identification of substructures that are more easily searched for their parity proofs. We have found hundreds of different types of parity proofs, ranging from 9 bases (or contexts) at the low end to 35 bases at the high end, and involving projectors of various ranks and multiplicities. After giving an overview of the proofs we found, we present a few concrete examples of the proofs that illustrate both their generic features as well as some of their more unusual properties. In particular, we present a proof involving 34 rays and 9 bases that appears to provide the most compact proof of the KS theorem found to date in eight-dimensions. (paper)

  15. Logic Reduced To Bare (Proof-Theoretical) Bones

    Czech Academy of Sciences Publication Activity Database

    Peregrin, Jaroslav

    2015-01-01

    Roč. 24, č. 2 (2015), s. 193-209 ISSN 0925-8531 Institutional support: RVO:67985955 Keywords : inference * incompatibility * proof theory * intuitionistic logic Subject RIV: AA - Philosophy ; Religion Impact factor: 0.450, year: 2015

  16. Isometric embeddings in cosmology and astrophysics

    Indian Academy of Sciences (India)

    embedding theory, a given spacetime (or 'brane') is embedded in a higher- ..... If one recalls that the motivation (at least in part) for non-compact extra ... to successfully embed (apparently perfect fluid) astrophysical models, we typically need to.

  17. Embedded Hyperchaotic Generators: A Comparative Analysis

    Science.gov (United States)

    Sadoudi, Said; Tanougast, Camel; Azzaz, Mohamad Salah; Dandache, Abbas

    In this paper, we present a comparative analysis of FPGA implementation performances, in terms of throughput and resources cost, of five well known autonomous continuous hyperchaotic systems. The goal of this analysis is to identify the embedded hyperchaotic generator which leads to designs with small logic area cost, satisfactory throughput rates, low power consumption and low latency required for embedded applications such as secure digital communications between embedded systems. To implement the four-dimensional (4D) chaotic systems, we use a new structural hardware architecture based on direct VHDL description of the forth order Runge-Kutta method (RK-4). The comparative analysis shows that the hyperchaotic Lorenz generator provides attractive performances compared to that of others. In fact, its hardware implementation requires only 2067 CLB-slices, 36 multipliers and no block RAMs, and achieves a throughput rate of 101.6 Mbps, at the output of the FPGA circuit, at a clock frequency of 25.315 MHz with a low latency time of 316 ns. Consequently, these good implementation performances offer to the embedded hyperchaotic Lorenz generator the advantage of being the best candidate for embedded communications applications.

  18. Study of Solid State Drives performance in PROOF distributed analysis system

    Science.gov (United States)

    Panitkin, S. Y.; Ernst, M.; Petkus, R.; Rind, O.; Wenaus, T.

    2010-04-01

    Solid State Drives (SSD) is a promising storage technology for High Energy Physics parallel analysis farms. Its combination of low random access time and relatively high read speed is very well suited for situations where multiple jobs concurrently access data located on the same drive. It also has lower energy consumption and higher vibration tolerance than Hard Disk Drive (HDD) which makes it an attractive choice in many applications raging from personal laptops to large analysis farms. The Parallel ROOT Facility - PROOF is a distributed analysis system which allows to exploit inherent event level parallelism of high energy physics data. PROOF is especially efficient together with distributed local storage systems like Xrootd, when data are distributed over computing nodes. In such an architecture the local disk subsystem I/O performance becomes a critical factor, especially when computing nodes use multi-core CPUs. We will discuss our experience with SSDs in PROOF environment. We will compare performance of HDD with SSD in I/O intensive analysis scenarios. In particular we will discuss PROOF system performance scaling with a number of simultaneously running analysis jobs.

  19. A proof of the conformal collider bounds

    Energy Technology Data Exchange (ETDEWEB)

    Hofman, Diego M. [Institute for Theoretical Physics, University of Amsterdam, Science Park 904, Postbus 94485, 1090 GL, Amsterdam (Netherlands); Li, Daliang [Department of Physics and Astronomy, Johns Hopkins University, Baltimore, MD 21218 (United States); Meltzer, David [Department of Physics, Yale University, New Haven, CT 06511 (United States); Poland, David [Department of Physics, Yale University, New Haven, CT 06511 (United States); School of Natural Sciences, Institute for Advanced Study, Princeton, NJ 08540 (United States); Rejon-Barrera, Fernando [Institute for Theoretical Physics, University of Amsterdam, Science Park 904, Postbus 94485, 1090 GL, Amsterdam (Netherlands)

    2016-06-20

    In this paper, we prove that the “conformal collider bounds” originally proposed in http://dx.doi.org/10.1088/1126-6708/2008/05/012 hold for any unitary parity-preserving conformal field theory (CFT) with a unique stress tensor in dimensions d≥3. In particular this implies that the ratio of central charges for a unitary 4d CFT lies in the interval (31/18)≥(a/c)≥(1/3). For superconformal theories this is further reduced to (3/2)≥(a/c)≥(1/2). The proof relies only on CFT first principles — in particular, bootstrap methods — and thus constitutes the first complete field theory proof of these bounds. We further elaborate on similar bounds for non-conserved currents and relate them to results obtained recently from deep inelastic scattering.

  20. The art of designing embedded systems

    CERN Document Server

    Ganssle, Jack G

    2000-01-01

    Art of Designing Embedded Systems is apart primer and part reference, aimed at practicing embedded engineers, whether working on the code or the hardware design. Embedded systems suffer from a chaotic, ad hoc development process. This books lays out a very simple seven-step plan to get firmware development under control. There are no formal methodologies to master; the ideas are immediately useful. Most designers are unaware that code complexity grows faster than code size. This book shows a number of ways to linearize the complexity/size curve and get products out faster

  1. Embedded Solenoid Transformer for Power Conversion

    DEFF Research Database (Denmark)

    2015-01-01

    A resonant power converter for operation in the radio frequency range, preferably in the VHF, comprises at least one PCB-embedded transformer. The transformer is configured for radio frequency operation and comprises a printed circuit board defining a horizontal plane, the printed circuit board...... comprising at least two horizontal conductive layers separated by an isolating layer, a first embedded solenoid forming a primary winding of the transformer and a second embedded solenoid being arranged parallel to the first solenoid and forming a secondary winding of the transformer, wherein the first...

  2. Bootstrap embedding: An internally consistent fragment-based method

    Energy Technology Data Exchange (ETDEWEB)

    Welborn, Matthew; Tsuchimochi, Takashi; Van Voorhis, Troy [Department of Chemistry, Massachusetts Institute of Technology, 77 Massachusetts Avenue, Cambridge, Massachusetts 02139 (United States)

    2016-08-21

    Strong correlation poses a difficult problem for electronic structure theory, with computational cost scaling quickly with system size. Fragment embedding is an attractive approach to this problem. By dividing a large complicated system into smaller manageable fragments “embedded” in an approximate description of the rest of the system, we can hope to ameliorate the steep cost of correlated calculations. While appealing, these methods often converge slowly with fragment size because of small errors at the boundary between fragment and bath. We describe a new electronic embedding method, dubbed “Bootstrap Embedding,” a self-consistent wavefunction-in-wavefunction embedding theory that uses overlapping fragments to improve the description of fragment edges. We apply this method to the one dimensional Hubbard model and a translationally asymmetric variant, and find that it performs very well for energies and populations. We find Bootstrap Embedding converges rapidly with embedded fragment size, overcoming the surface-area-to-volume-ratio error typical of many embedding methods. We anticipate that this method may lead to a low-scaling, high accuracy treatment of electron correlation in large molecular systems.

  3. Embedded librarianship what every academic librarian should know

    CERN Document Server

    Russo, Michael F

    2013-01-01

    Is the embedded librarian an equal partner in the course, or is the librarian perceived as a "value-added" extra? What is the place of technology in this effort? Is there a line librarians should not cross? Taking into account both theory and practice to discuss multiple facets of the subject, Embedded Librarianship: What Every Academic Librarian Should Know thoroughly examines these questions and more from the perspectives of experienced embedded librarian contributors who have worked in higher education settings. The chapters illuminate the benefits and challenges of embedding, explain the planning required to set up an embedded course, identify the different forms of embedding, and consider information literacy instruction in various contexts. Readers who will benefit from this work include not only academic librarians but any professor who wants their students to be able to do better research in their fields.

  4. Decorated proofs for computational effects: States

    Directory of Open Access Journals (Sweden)

    Jean-Guillaume Dumas

    2012-08-01

    Full Text Available The syntax of an imperative language does not mention explicitly the state, while its denotational semantics has to mention it. In this paper we show that the equational proofs about an imperative language may hide the state, in the same way as the syntax does.

  5. Hash3: Proofs, Analysis and Implementation

    DEFF Research Database (Denmark)

    Gauravaram, Praveen

    2009-01-01

    This report outlines the talks presented at the winter school on Hash3: Proofs, Analysis, and Implementation, ECRYPT II Event on Hash Functions. In general, speakers may not write everything what they talk on the slides. So, this report also outlines such findings following the understanding of t...

  6. Multithreading for Embedded Reconfigurable Multicore Systems

    NARCIS (Netherlands)

    Zaykov, P.G.

    2014-01-01

    In this dissertation, we address the problem of performance efficient multithreading execution on heterogeneous multicore embedded systems. By heterogeneous multicore embedded systems we refer to those, which have real-time requirements and consist of processor tiles with General Purpose Processor

  7. Multithreading for embedded reconfigurable multicore systems

    NARCIS (Netherlands)

    Zaykov, P.G.

    2014-01-01

    In this dissertation, we address the problem of performance efficient multithreading execution on heterogeneous multicore embedded systems. By heterogeneous multicore embedded systems we refer to those, which have real-time requirements and consist of processor tiles with General Purpose Processor

  8. Heterogeneous Embedded Real-Time Systems Environment

    Science.gov (United States)

    2003-12-01

    AFRL-IF-RS-TR-2003-290 Final Technical Report December 2003 HETEROGENEOUS EMBEDDED REAL - TIME SYSTEMS ENVIRONMENT Integrated...HETEROGENEOUS EMBEDDED REAL - TIME SYSTEMS ENVIRONMENT 6. AUTHOR(S) Cosmo Castellano and James Graham 5. FUNDING NUMBERS C - F30602-97-C-0259

  9. A Simple Proof of the Theorem Concerning Optimality in a One-Dimensional Ergodic Control Problem

    International Nuclear Information System (INIS)

    Fujita, Y.

    2000-01-01

    We give a simple proof of the theorem concerning optimality in a one-dimensional ergodic control problem. We characterize the optimal control in the class of all Markov controls. Our proof is probabilistic and does not need to solve the corresponding Bellman equation. This simplifies the proof

  10. Circular, explosion-proof lamp provides uniform illumination

    Science.gov (United States)

    1966-01-01

    Circular explosion-proof fluorescent lamp is fitted around a TV camera lens to provide shadowless illumination with a low radiant heat flux. The lamp is mounted in a transparent acrylic housing sealed with clear silicone rubber.

  11. A Contest-Oriented Project for Learning Intelligent Mobile Robots

    Science.gov (United States)

    Huang, Hsin-Hsiung; Su, Juing-Huei; Lee, Chyi-Shyong

    2013-01-01

    A contest-oriented project for undergraduate students to learn implementation skills and theories related to intelligent mobile robots is presented in this paper. The project, related to Micromouse, Robotrace (Robotrace is the title of Taiwanese and Japanese robot races), and line-maze contests was developed by the embedded control system research…

  12. Critical points in an algebra of elementary embeddings

    OpenAIRE

    Dougherty, Randall

    1992-01-01

    Given two elementary embeddings from the collection of sets of rank less than $\\lambda$ to itself, one can combine them to obtain another such embedding in two ways: by composition, and by applying one to (initial segments of) the other. Hence, a single such nontrivial embedding $j$ generates an algebra of embeddings via these two operations, which satisfies certain laws (for example, application distributes over both composition and application). Laver has shown, among other things, that thi...

  13. Proof systems for Moss’ coalgebraic logic

    NARCIS (Netherlands)

    Bílková, M.; Palmigiano, A.; Venema, Y.

    2014-01-01

    We study Gentzen-style proof theory of the finitary version of the coalgebraic logic introduced by L. Moss. The logic captures the behaviour of coalgebras for a large class of set functors. The syntax of the logic, defined uniformly with respect to a finitary coalgebraic type functor T , uses a

  14. A Lightweight RFID Grouping-Proof Protocol Based on Parallel Mode and DHCP Mechanism

    Directory of Open Access Journals (Sweden)

    Zhicai Shi

    2017-07-01

    Full Text Available A Radio Frequency Identification (RFID grouping-proof protocol is to generate an evidence of the simultaneous existence of a group of tags and it has been applied to many different fields. For current grouping-proof protocols, there still exist some flaws such as low grouping-proof efficiency, being vulnerable to trace attack and information leakage. To improve the secure performance and efficiency, we propose a lightweight RFID grouping-proof protocol based on parallel mode and DHCP (Dynamic Host Configuration Protocol mechanism. Our protocol involves multiple readers and multiple tag groups. During the grouping-proof period, one reader and one tag group are chosen by the verifier by means of DHCP mechanism. When only a part of the tags of the chosen group exist, the protocol can also give the evidence of their co-existence. Our protocol utilizes parallel communication mode between reader and tags so as to ensure its grouping-proof efficiency. It only uses Hash function to complete the mutual authentication among verifier, readers and tags. It can preserve the privacy of the RFID system and resist the attacks such as eavesdropping, replay, trace and impersonation. Therefore the protocol is secure, flexible and efficient. It only uses some lightweight operations such as Hash function and a pseudorandom number generator. Therefore it is very suitable to some low-cost RFID systems.

  15. A nonperturbative proof of Dijkgraaf-Vafa conjecture

    International Nuclear Information System (INIS)

    Terashima, Seiji

    2016-01-01

    In this note we exactly compute the gaugino condensation of an arbitrary four dimensional N=1 supersymmetric gauge theory in confining phase, using the localization technique. This result gives a nonperturbative proof of the Dijkgraaf-Vafa conjecture.

  16. Ergodicity, Maximum Entropy Production, and Steepest Entropy Ascent in the Proofs of Onsager's Reciprocal Relations

    Science.gov (United States)

    Benfenati, Francesco; Beretta, Gian Paolo

    2018-04-01

    We show that to prove the Onsager relations using the microscopic time reversibility one necessarily has to make an ergodic hypothesis, or a hypothesis closely linked to that. This is true in all the proofs of the Onsager relations in the literature: from the original proof by Onsager, to more advanced proofs in the context of linear response theory and the theory of Markov processes, to the proof in the context of the kinetic theory of gases. The only three proofs that do not require any kind of ergodic hypothesis are based on additional hypotheses on the macroscopic evolution: Ziegler's maximum entropy production principle (MEPP), the principle of time reversal invariance of the entropy production, or the steepest entropy ascent principle (SEAP).

  17. Distributed, Embedded and Real-time Java Systems

    CERN Document Server

    Wellings, Andy

    2012-01-01

    Research on real-time Java technology has been prolific over the past decade, leading to a large number of corresponding hardware and software solutions, and frameworks for distributed and embedded real-time Java systems.  This book is aimed primarily at researchers in real-time embedded systems, particularly those who wish to understand the current state of the art in using Java in this domain.  Much of the work in real-time distributed, embedded and real-time Java has focused on the Real-time Specification for Java (RTSJ) as the underlying base technology, and consequently many of the Chapters in this book address issues with, or solve problems using, this framework. Describes innovative techniques in: scheduling, memory management, quality of service and communication systems supporting real-time Java applications; Includes coverage of multiprocessor embedded systems and parallel programming; Discusses state-of-the-art resource management for embedded systems, including Java’s real-time garbage collect...

  18. Laplacian embedded regression for scalable manifold regularization.

    Science.gov (United States)

    Chen, Lin; Tsang, Ivor W; Xu, Dong

    2012-06-01

    Semi-supervised learning (SSL), as a powerful tool to learn from a limited number of labeled data and a large number of unlabeled data, has been attracting increasing attention in the machine learning community. In particular, the manifold regularization framework has laid solid theoretical foundations for a large family of SSL algorithms, such as Laplacian support vector machine (LapSVM) and Laplacian regularized least squares (LapRLS). However, most of these algorithms are limited to small scale problems due to the high computational cost of the matrix inversion operation involved in the optimization problem. In this paper, we propose a novel framework called Laplacian embedded regression by introducing an intermediate decision variable into the manifold regularization framework. By using ∈-insensitive loss, we obtain the Laplacian embedded support vector regression (LapESVR) algorithm, which inherits the sparse solution from SVR. Also, we derive Laplacian embedded RLS (LapERLS) corresponding to RLS under the proposed framework. Both LapESVR and LapERLS possess a simpler form of a transformed kernel, which is the summation of the original kernel and a graph kernel that captures the manifold structure. The benefits of the transformed kernel are two-fold: (1) we can deal with the original kernel matrix and the graph Laplacian matrix in the graph kernel separately and (2) if the graph Laplacian matrix is sparse, we only need to perform the inverse operation for a sparse matrix, which is much more efficient when compared with that for a dense one. Inspired by kernel principal component analysis, we further propose to project the introduced decision variable into a subspace spanned by a few eigenvectors of the graph Laplacian matrix in order to better reflect the data manifold, as well as accelerate the calculation of the graph kernel, allowing our methods to efficiently and effectively cope with large scale SSL problems. Extensive experiments on both toy and real

  19. Prevention of Crime and the Optimal Standard of Proof in Criminal Law

    DEFF Research Database (Denmark)

    Lando, Henrik

    2003-01-01

    The standard of proof in criminal law a®ects retributive justice throughthe number of wrong convictions and wrong acquittals. It also a®ects thelevel of crime, since a higher standard of proof implies less deterrence andless incapacitation. This article derives an expression for the optimal...

  20. The explosion-proof container, satisfying the IAEA norms on safety

    International Nuclear Information System (INIS)

    Syrunin, M.A.; Fedorenko, A.G.; Ivanov, A.G.; Abakumov, A.I.; Nizovtsev, P.N.; Loginov, P.G.; Smolyakov, A.A.; Solov'ev, V.P.

    1998-01-01

    Safety of radioactive materials (RM) transportation is under strict control of the international norms of IAEA, aimed to ensure non-proliferation of hazardous materials in the environments. At the same time the nuclear countries use much more dangerous transportations of two types of hazardous materials. Probability of emergency explosion of high explosives (HE) during transportation and storage of such constructions is not equal to zero. HE explosion can be caused by: 1)excess of mechanical effects, allowable by the norms, on an explosive 2)lightening or fire 3)terrorist attack 4)radio controlled or time controlled mechanism in case of the terrorist device. It is obvious that an accident with explosion HE element of the nuclear weapon in an usual container, which meets the IAEA norms, but is not explosion-proof, will result in its destruction, RM dispersal, and inadmissible pollution of the environments. Therefore, it is urgent need for development of the container, which is able to withstand explosion of HE, placed in it, and to confine released RM inside of it. The experimental prototype of the load-bearing shell of the explosion-proof container (EC) can be the successfully tested spherical steel - glass plastic shell, having high-strength throats and lids. Having weight of 45-50 kg it is able to withstand internal explosion with energy more than 1.4 kg of the TNT equivalent. To preserve the explosion-proofness property in the abnormal environments during transportation, the explosion-proof container should be placed in the protective supporting transport device or the transport container (TC), consisting of the external thin-walled steel shell and the damping heat-proof layer from heat-resistant foam plastic. To justify the design parameters of such container, the tests for development and revision of the numerical model parameters were carried out. With use of this model the calculations were performed to calculate loads and the container response to 1