ALBERT

All Library Books, journals and Electronic Records Telegrafenberg

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Articles  (1,346)
  • Oxford University Press  (1,346)
  • 2020-2022
  • 2010-2014  (1,346)
  • 1985-1989
  • 1980-1984
  • 1950-1954
  • 2011  (1,346)
  • Computer Science  (1,104)
  • Energy, Environment Protection, Nuclear Power Engineering  (158)
  • Philosophy  (84)
Collection
  • Articles  (1,346)
Years
  • 2020-2022
  • 2010-2014  (1,346)
  • 1985-1989
  • 1980-1984
  • 1950-1954
Year
Journal
  • 1
    Publication Date: 2011-11-24
    Description: Dynamically typed languages are becoming increasingly popular for different software development scenarios such as Web engineering, rapid prototyping or the construction of applications that require runtime adaptiveness. In contrast, statically typed languages have undeniable advantages such as early type error detection and more opportunities for compiler optimizations. Since both approaches offer different benefits, hybrid statically and dynamically typed programming languages have emerged, and some statically typed languages have also incorporated dynamic typing capabilities. In this paper, we present the minimal core of StaDyn , a hybrid typing language that performs static type inference of both statically and dynamically typed references. The type information gathered by the compiler is used to generate efficient .NET code, obtaining a significant runtime performance improvement compared with C# 4.0 and Visual Basic 10.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 2
    Publication Date: 2011-11-24
    Description: Readahead is an important technique to deal with the huge gap between disk drives and applications. It has become a standard in modern operating systems and advanced storage systems. However, it is difficult to develop the common kernel readahead and to achieve full testing coverage of all cases. In this paper, we formulate the kernel read handling, caching and readahead behavior as an absorbing Markov decision process, and present performance evaluations to compare or verify various readaheads. We also introduce algorithms to find optimal prefetching policies for specific read pattern and present the convergence analysis. By exploiting sample-path-based methods, it becomes much easier to evaluate and optimize prefetching policies, which can provide valuable informations to help the design and improvement of practical readaheads. For illustration and verification, we present two examples and some experiments on the readaheads in Linux kernel. The results show that the model-based evaluations agree with the practice and the improved prefetching policy significantly outperforms the original one in Linux kernel for the specified workloads.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 3
    Publication Date: 2011-11-24
    Description: Crowds must be simulated believable in terms of their appearance and behavior to improve a virtual environment's realism. Due to the complex nature of human behavior, realistic behavior of agents in crowd simulations is still a challenging problem. In this paper, we propose a novel behavioral model which builds analytical maps to control agents’ behavior adaptively with agent–crowd interaction formulations. We introduce information theoretical concepts to construct analytical maps automatically. Our model can be integrated into crowd simulators and enhance their behavioral complexity. We made comparative analyses of the presented behavior model with measured crowd data and two agent-based crowd simulators.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 4
    Publication Date: 2011-11-24
    Description: Inspired by the swarm behaviours of social insects, research into the self-assembly of swarm robots has become an attractive issue in the robotic community. Unfortunately, there are very few platforms for self-assembly and locomotion in the field of swarm robotics. The Sambot is a novel self-assembling modular robot that shares characteristics with swarm robots and self-reconfigurable robots. Each Sambot can move autonomously and connect with the other. This paper discusses the concept of combining self-assembly and locomotion for swarm robots. Distributed control algorithms for self-assembly and locomotion are proposed. Using five physical Sambots, experiments were carried out on autonomous docking, self-assembly and locomotion. Our control algorithm for self-assembly can also be used to realize the autonomous construction and self-repair of robotic structures consisting of a large number of Sambots.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 5
    Publication Date: 2011-11-24
    Description: Scanning of ports on a computer occurs frequently on the Internet. An attacker performs port scans of Internet protocol addresses to find vulnerable hosts to compromise. However, it is also useful for system administrators and other network defenders to detect port scans as possible preliminaries to more serious attacks. It is a very difficult task to recognize instances of malicious port scanning. In general, a port scan may be an instance of a scan by attackers or an instance of a scan by network defenders. In this survey, we present research and development trends in this area. Our presentation includes a discussion of common port scan attacks. We provide a comparison of port scan methods based on type, mode of detection, mechanism used for detection and other characteristics. This survey also reports on the available data sets and evaluation criteria for port scan detection approaches.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 6
    Publication Date: 2011-11-24
    Description: Proxy blind signature is an important cryptographic primitive and plays an essential role in construction of the electronic cash (e-cash). Recently, Tan (2001, An offline electronic cash scheme based on proxy blind signature. Comput. J. , 54, 505–512) proposed a new proxy blind signature scheme and applied it to electronic cash. The scheme was claimed as being provably secure under the Discrete Log assumption, DBDH assumption and Chosen–Target CDH assumption in the random oracle model. In this paper, we show that Tan's proxy blind signature scheme is insecure by demonstrating several attacks in which a malicious original signer can forge both valid proxy signature keys of arbitrary proxy signers and a proxy blind signature on an arbitrary message with respect to any proxy signer directly. We also discuss some weaknesses in the e-cash scheme proposed by Tan.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 7
    Publication Date: 2011-11-24
    Description: In recent times, there has been increasing interest in storing data securely in the cloud environment. To provide owners of data stored in the cloud with flexible control over access to their data by other users, we propose a role-based encryption (RBE) scheme for secure cloud storage. Our scheme allows the owner of data to store it in an encrypted form in the cloud and to grant access to that data for users with specific roles. The scheme specifies a set of roles to which the users are assigned, with each role having a set of permissions. The data owner can encrypt the data and store it in the cloud in such a way that only users with specific roles can decrypt the data. Anyone else, including the cloud providers themselves, will not be able to decrypt the data. We describe such an RBE scheme using a broadcast encryption algorithm. The paper describes the security analysis of the proposed scheme and gives proofs showing that the proposed scheme is secure against attacks. We also analyse the efficiency and performance of our scheme and show that it has superior characteristics compared with other previously published schemes.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 8
    Publication Date: 2011-11-24
    Description: Although the objective of secure communication can be achieved by using cryptographic tools, the undeniability that results from cryptographic properties may create a potential threat to the sender of the message. Unfortunately, most existing deniable protocols only provide 1-out-of-2 deniability. When both parties (the sender and the receiver) are allowed to deny generating the message, a dispute might occur between these two parties. The 1-out-of-2 deniable protocol can result in an unfair resolution of the dispute. Therefore, we propose a new model of deniability, called 1-out-of- deniability, that can provide full deniability. The 1-out-of- deniability protocol allows the originator of the message to deny that he or she generated the message, since there are an infinite number of possible message generators; at the same time, all transmitted messages can be protected and authenticated between the sender and the intended receiver. Our design can be implemented by using any public-key cryptography technique. We also analyze the correctness of the proposed protocols based on logical rules, and two practical examples are given to illustrate our design.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 9
    Publication Date: 2011-11-24
    Description: Each year, large amounts of money and labor are spent on patching the vulnerabilities in operating systems and various popular software to prevent exploitation by worms. Modeling the propagation process can help us to devise effective strategies against those worms’ spreading. This paper presents a microcosmic analysis of worm propagation procedures. Our proposed model is different from traditional methods and examines deep inside the propagation procedure among nodes in the network by concentrating on the propagation probability and time delay described by a complex matrix. Moreover, since the analysis gives a microcosmic insight into a worm's propagation, the proposed model can avoid errors that are usually concealed in the traditional macroscopic analytical models. The objectives of this paper are to address three practical aspects of preventing worm propagation: (i) where do we patch? (ii) how many nodes do we need to patch? (iii) when do we patch? We implement a series of experiments to evaluate the effects of each major component in our microcosmic model. Based on the results drawn from the experiments, for high-risk vulnerabilities, it is critical that networks reduce the number of vulnerable nodes to below 80%. We believe our microcosmic model can benefit the security industry by allowing them to save significant money in the deployment of their security patching schemes.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 10
    Publication Date: 2011-11-24
    Description: Although analyzing complex systems could be a complicated process, current approaches to quantify system security or vulnerability usually consider the whole system as a single component. In this paper, we propose a new compositional method to evaluate the vulnerability measure of complex systems. By the word composition we mean that the vulnerability measure of a complex system can be computed using pre-calculated vulnerability measures of its components. We define compatible systems to demonstrate which components could combine. Moreover, choice, sequential, parallel and synchronized parallel composition methods are defined and the measurement of the vulnerability in each case is presented. Our method uses a state machine to model the system. The model considers unauthorized states and attacker capabilities. Furthermore, both the probability of attack and delay time to reach the target state are used to quantify vulnerability. The proposed approach would be useful to analyze complex systems which may have complicated models. This approach reduces the state space and complexity of computation. On the other hand, if a component is replaced by another one, the vulnerability measures of other components do not change. Thus, these quantities are reused in new computation. Therefore, the calculation of the vulnerability measure for a new system is simplified.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 11
    Publication Date: 2011-11-24
    Description: The construction of gene regulatory networks from expression data is one of the most important issues in systems biology research. However, building such networks is a tedious task, especially when both the number of genes and the complexity of gene regulation increase. In this work, we adopt the S-system model to represent the gene network and establish a methodology to infer the model. Our work mainly includes an adaptive genetic algorithm-particle swarm optimization hybrid method to infer appropriate network parameters, and a gene clustering method to decompose a large network into several smaller networks for dimension reduction. To validate the proposed methods, different series of experiments have been conducted and the results show that the proposed methods can be used to infer S-system models of gene networks efficiently and successfully.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 12
    Publication Date: 2011-11-24
    Description: We present a content-based image retrieval system for plant image retrieval, intended especially for the house plant identification problem. A plant image consists of a collection of overlapping leaves and possibly flowers, which makes the problem challenging. We studied the suitability of various well-known color, shape and texture features for this problem, as well as introducing some new texture matching techniques and shape features. Feature extraction is applied after segmenting the plant region from the background using the max-flow min-cut technique. Results on a database of 380 plant images belonging to 78 different types of plants show promise of the proposed new techniques and the overall system: in 55% of the queries, the correct plant image is retrieved among the top-15 results. Furthermore, the accuracy goes up to 73% when a 132-image subset of well-segmented plant images are considered.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 13
    Publication Date: 2011-11-24
    Description: We investigate the assignment of assets to tasks where each asset can potentially execute any of the tasks, but assets execute tasks with a probabilistic outcome of success. There is a cost associated with each possible assignment of an asset to a task, and if a task is not executed there is also a cost associated with the non-execution of the task. As we proposed in [Gelenbe, E., Timotheou, S., and Nicholson, D. (2010). Fast distributed near optimum assignment of assets to tasks. Comput. J., doi:10.1093/comjnl/bxq010], we formulate the allocation of assets to tasks in order to minimize the overall expected cost, as a nonlinear combinatorial optimization problem. We propose the use of network flow algorithms which are based on solving a sequence of minimum cost flow problems on appropriately constructed networks with estimated arc costs. We introduce three different schemes for the estimation of the arc costs and we investigate their performance compared with a random neural network algorithm and a greedy algorithm. We also develop an approach for obtaining tight lower bounds to the optimal solution based on a piecewise linear approximation of the considered problem.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 14
    Publication Date: 2011-11-24
    Description: Building trust is a major concern in Peer-to-Peer networks as several kinds of applications rely on the presence of trusted services. Traditional techniques do not scale, produce very high overheads or rely on unrealistic assumptions. In this paper, we propose a new membership algorithm (Community Of Reputable PeerS, CORPS) for Distributed Hash Tables which builds a community of reputable nodes and thus enables the implementation of pseudo-trusted services. CORPS uses a reputation-based approach to decide whether a node can be a member of the group or not. We demonstrate the benefits of this approach and evaluate how much it improves the reliability of a trusted routing service.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 15
    Publication Date: 2011-11-24
    Description: Many data sets exhibit skewed class distributions in which most cases are allocated to a class and far fewer cases to a smaller one. A classifier induced from an imbalanced data set has usually a low error rate for the majority class and an unacceptable error rate for the minority class. This paper provides a review on various methodologies that have tried to handle this problem. Afterwards, it presents an experimental study of these methodologies with a proposed cascade generalization ensemble that is applied in reweighted data and it concludes that such a framework can be a more effective solution to the problem. Our method improves the identification of a difficult small class, while keeping the classification ability of the other class in an acceptable level.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 16
    Publication Date: 2011-11-24
    Description: Ants are generally believed to follow an intensive work routine. Numerous tales and fables refer to ants as conscientious workers. Nevertheless, biologists have discovered that ants also rest for extended periods of time. This does not only hold for individual ants. Interestingly, ant colonies exhibit synchronized activity phases that result from self-organization. In this work, self-synchronization in ant colonies is taken as the inspiring source for a new mechanism of self-synchronized duty-cycling in mobile sensor networks. Hereby, we assume that sensor nodes are equipped with energy harvesting capabilities such as, for example, solar cells. We show that the proposed self-synchronization mechanism can be made adaptive depending on variable energy resources. The main objective of this paper is to study and explore the swarm intelligence foundations of self-synchronized duty-cycling. With this purpose in mind, physical constraints such as packet collisions and packet loss are generally not considered.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 17
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2011-11-24
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 18
    Publication Date: 2011-11-24
    Description: Vector field tomography is a field that has received considerable attention in recent decades. It deals with the problem of the determination of a vector field from non-invasive integral data. These data are modelled by the vectorial Radon transform. Previous attempts at solving this reconstruction problem showed that tomographic data alone are insufficient for determining a 2D band-limited vector field completely and uniquely. This paper describes a method that allows one to recover both components of a 2D vector field based only on integral data, by solving a system of linear equations. We carry out the analysis in the digital domain and we take advantage of the redundancy in the projection data, since these may be viewed as weighted sums of the local vector field's Cartesian components. The potential of the introduced method is demonstrated by presenting examples of vector field reconstruction.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 19
    Publication Date: 2011-11-24
    Description: Historically, at the beginning of natural language processing, applications with industrial objectives were preferred, e.g. for a fully automated translation. Soon, during the 1960s, there were attempts to separate applications from basic theoretical research. Since this theoretical research encounters difficulties regarding its status as a separate discipline, and considering the constraints necessary to clarify the concept of ‘good application’, impossible to satisfy simultaneously (a real problem to solve, in response to a social demand, and a viable solution in terms of reliability, robustness, speed and cost), two main streams have emerged. The first one, as a computer technique, is intended to build applications based on a strict logic, using natural language to facilitate interaction with the computer, but not directly related to the human way of using language (this approach is designated as natural language processing ). Such pragmatic research accepts certain kinds of errors, but must lead to concrete results in limited time. The goal is to provide effective systems for real applications, able to respond effectively to requests addressed to them in fairly large areas; these systems are directly related to social and industrial productivity, which is the essential criterion of evaluation. Some technological developments, such as microcomputers, have made available to people specific applications of natural language processing and have enabled the emergence of small specialized firms. This produced, in the second half of the 1980s, the emergence of a ‘language industry’ and of the field of ‘linguistic engineering’. On the other hand, during the late 1960s, the gap between the social demand, the resources invested and the poor performance obtained led to the emergence of theoretical studies intended to formalize languages (as opposed to the more empirical machine translation). This leads to ‘pilot systems’, aimed at demonstrating the feasibility of complex theoretical approaches, but unable to operate outside a set of rather limited examples. The limits may be at different levels: more or less limited vocabulary or accepted sentences, knowledge about the field more or less complete, more or less developed reasoning and so on. These limits have a significant impact on communication itself. For natural language processing systems to be effective, they must make appropriate inferences from what is said and, conversely their behavior should allow the inferences that the users usually do when using their language. Thus, this position paper stresses that understanding the surface meaning of a natural language is not sufficient but that the goals, intentions and strategies of the participants in a dialogue must be understood.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 20
    Publication Date: 2011-11-24
    Description: A hybrid jet-pump CO 2 compression system that may enhance system COP and reduce the environmental impact of transport refrigeration is analysed. At an evaporator temperature of –15°C, an ambient temperature of 35°C and a generator temperature of 120°C, COP increases from 1.0 to 2.27 as subcooling increases from 0 to 20 K. Compressor work is reduced by 24% at 20 K subcooling. The optimum degree of subcooling was ~10 K for the operating conditions examined. COP is improved while the size of heat exchangers required to operate the jet pump are minimised with respect to the overall weight of the system.
    Print ISSN: 1748-1317
    Electronic ISSN: 1748-1325
    Topics: Energy, Environment Protection, Nuclear Power Engineering , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 21
    Publication Date: 2011-11-24
    Description: Libya has a growing demand for electricity and presently generates almost all of its electrical energy using fossil-fuelled generation plant. An opportunity exists to use the naturally high solar radiation resource that occurs in the south of the country to meet this demand with a renewable energy source. This paper describes the design of a 50 MW photovoltaic (PV) power plant which has been modelled on the conditions pertaining to Al-Kufra. The general energy situation within Libya is described, along with the solar conditions at the proposed location of the power plant. An HIT type PV module has been selected and modelled. The effectiveness of the use of a cooling jacket on the modules has been evaluated. The results show an average increase in efficiency of 0.6%; however, this is not considered to be a justifiable expense. The optimum tilt angle and array layout have been evaluated for the proposed site. The projected energy output has been determined to be 114 GWh per annum with a payback time of 2.7 years and a reduction of CO 2 pollution by 76 thousand tonnes per year. It is recommended that very large-scale PV plants of this type are installed within Libya for the sake of benign environmental impact and diversification of the electrical generation mix.
    Print ISSN: 1748-1317
    Electronic ISSN: 1748-1325
    Topics: Energy, Environment Protection, Nuclear Power Engineering , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 22
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2011-11-24
    Description: Does category theory provide a foundation for mathematics that is autonomous with respect to the orthodox foundation in a set theory such as ZFC? We distinguish three types of autonomy : logical, conceptual, and justificatory. We argue that, while a strong case can be made for its logical and conceptual autonomy, its justificatory autonomy turns on whether or not mathematical theories can be justified by appeal to mathematical practice. If they can, a category-theoretical approach will be fully autonomous; if not, the most natural route to justificatory autonomy is blocked.
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 23
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2011-11-24
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 24
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2011-11-24
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 25
    Publication Date: 2011-11-24
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 26
    Publication Date: 2011-11-24
    Description: In this paper, a thorough review of the available literature on photovoltaic/thermal (PV/T) systems is presented. The review is performed in a thematic way in order to allow an easier comparison, discussion and evaluation of the findings obtained by researchers, especially on parameters affecting the electrical and thermal performance of PV/T systems. The review covers a comprehensive historic overview of PV/T technology, detailed description of conventional flat-plate and concentrating PV/T systems, analysis of PV/T systems using water or air as the working fluid, analytical and numerical models, simulation and experimental studies, thermodynamic assessment of PV and PV/T systems and qualitative evaluation of thermal and electrical outputs. Furthermore, parameters affecting the performance of PV/T systems such as glazed versus unglazed PV/T collectors, optimum mass flow rate, packing factor, configuration design types and absorber plate parameters including tube spacing, tube diameter and fin thickness are extensively analyzed. Based on the thorough review, it can be easily said that the PV/T systems are very promising devices and PV/T technology is expected to become strongly competitive with the conventional power generation in the near future.
    Print ISSN: 1748-1317
    Electronic ISSN: 1748-1325
    Topics: Energy, Environment Protection, Nuclear Power Engineering , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 27
    Publication Date: 2011-11-24
    Description: In this study, an experimental research concerning the effects of passive cooling on performance parameters of silicon solar cells was presented. An aluminum heat sink was used in order to dissipate waste heat from a photovoltaic (PV) cell. Dimensions of the heat sink were determined considering the results of a steady-state heat transfer analysis. The experiments were carried out for different ambient temperatures and various illumination intensities up to 1 sun under solar simulator. Experimental results indicate that energy, exergy and power conversion efficiency of the PV cell considerably increase with the proposed cooling technique. An increase of ~20% in power output of the PV cell is achieved at 800 W/m 2 radiation condition. Maximum level of cooling is observed for the intensity level of 600 W/m 2 . Performance of PV cells both with and without fins increases with decreasing ambient temperature.
    Print ISSN: 1748-1317
    Electronic ISSN: 1748-1325
    Topics: Energy, Environment Protection, Nuclear Power Engineering , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 28
    Publication Date: 2011-11-24
    Description: High-temperature thermal storage (HTTS) in soils is a promising energy-saving technology for space heating of buildings. Based on a laboratory experimental setup using a vertical borehole heat exchanger (BHE), dynamic changes of the soil temperature and moisture content during the thermal storage process are studied. Effects of the heat injection temperature and initial moisture content on the thermal performance of the BHE are analyzed. The results show that at the first thermal storage stage, the soil temperature and moisture content near the heat source may appear a temporary peak. Its occurrence depends on the initial soil moisture content, the heat injection temperature and the distance from the heat source. As the heat injection temperature increases, the heat transfer rate of the BHE increases greatly. As the initial soil moisture content increases, the temperature profile near the BHE tends to be deviated from the results predicted by heat conduction, thereby influencing the thermal performance of the BHE. The present results can provide useful guidelines for the design of an HTTS system.
    Print ISSN: 1748-1317
    Electronic ISSN: 1748-1325
    Topics: Energy, Environment Protection, Nuclear Power Engineering , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 29
    Publication Date: 2011-11-24
    Description: The thermal performance of a horizontal-coupled ground-source heat pump system has been assessed both experimentally and numerically in a UK climate. A numerical simulation of thermal behaviour of the horizontal-coupled heat exchanger for combinations of different ambient air temperatures, wind speeds, refrigerant temperature and soil thermal properties was studied using a validated 2D transient model. The specific heat extraction by the heat exchanger increased with ambient temperature and soil thermal conductivity, however it decreased with increasing refrigerant temperature. The effect of wind speed was negligible.
    Print ISSN: 1748-1317
    Electronic ISSN: 1748-1325
    Topics: Energy, Environment Protection, Nuclear Power Engineering , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 30
    Publication Date: 2011-11-24
    Description: CO 2 solid–gas two-phase flow is investigated in an ultra-low temperature cascade refrigeration system. Visualization test shows that dry ice sedimentation occurs in low mass flow rate. The sedimentation also occurs at low condensation temperature and low heating power input. On the basis of the present investigation, it is found that the present ultra-low temperature cascade refrigeration system works better at a heating power input above 900 W and condensation temperature above –20°C. Under suitable operating conditions, the present ultra-low temperature cascade refrigeration system has shown the capability of achieving an ultra-low temperature of –62°C continuously and stably.
    Print ISSN: 1748-1317
    Electronic ISSN: 1748-1325
    Topics: Energy, Environment Protection, Nuclear Power Engineering , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 31
    Publication Date: 2011-11-24
    Description: The main ‘philosophical’ outcome of this article is to demonstrate that the structural description of residuated lattices requires the use of the co-residuated setting. A construction, called skew symmetrization, which generalizes the well-known representation of an ordered Abelian group obtained from the positive (or negative) cone of the algebra is introduced here. Its definition requires leaving the accustomed residuated setting and entering the co-residuated setting. It is shown that every uninorm on [0, 1] with an involution defined by the residual complement with respect to the unit and having the unit as the fixed point of the involution can be described as the skew symmetrization of its underlying t-norm or underlying t-conorm.
    Print ISSN: 0955-792X
    Electronic ISSN: 1465-363X
    Topics: Computer Science , Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 32
    Publication Date: 2011-11-24
    Description: This article deals with some probabilistic model theory for intuitionistic predicate logic. We introduce the notions of intuitionistic probability, probabilistic structure for intuitionistic predicate logic and model of an intuitionistic probability. We prove a Gaifman-style completeness theorem: any intuitionistic probability has a weak probabilistic model.
    Print ISSN: 0955-792X
    Electronic ISSN: 1465-363X
    Topics: Computer Science , Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 33
    Publication Date: 2011-11-24
    Description: We introduce a new approach to conditional probability over many-valued events, which is based on bets. Then we show that this approach fits with Kroupa's approach, and we give two characterizations of coherence for books on conditional many-valued events, the first one based on states, and the second one based on logical coherence of a suitable theory on many-valued logic.
    Print ISSN: 0955-792X
    Electronic ISSN: 1465-363X
    Topics: Computer Science , Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 34
    Publication Date: 2011-11-24
    Description: We solve the minimization problem for finitely axiomatizable theories in Gödel infinite-valued propositional logic. That is, we obtain an algorithm that when input a formula α( X 1 ,..., X n ) outputs a formula β( X 1 ,..., X m ) such that (i) the theories singly axiomatized by {α} and {β} have isomorphic algebraic semantics, and (ii) if β'( X 1 ,..., X m ' ) is any formula satisfying (i), then m '≥ m .
    Print ISSN: 0955-792X
    Electronic ISSN: 1465-363X
    Topics: Computer Science , Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 35
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2011-11-24
    Print ISSN: 0955-792X
    Electronic ISSN: 1465-363X
    Topics: Computer Science , Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 36
    Publication Date: 2011-11-24
    Description: Nowadays, many working environments are located within facilities that are not visually connected with the exterior. This is due to the new architectural paradigms as regards the design, based on the possibility to substitute natural light for artificial lighting even in daytime. Accordingly, the need of reducing energy costs and the user's wish to optimize lighting and visual comfort levels raises the option of innovative natural lighting systems implementation. For a luminous retrofitting case, located in Mendoza, Argentina, a specific methodology used determined that the more adequate natural lighting strategy would be redirecting direct sunlight, working on the reflected light design. The methodology proposed is formed by an analysis of the initial situation, conditions modelization and design resolving proposals, through luminous evaluation, real and virtual scale model construction, and performance evaluation using heliodon and simulation software. This work points to use natural lighting to reduce energy consumption and get better luminous ambient through the application of a low-cost daylighting system. In the mentioned case, strategies of redirection of the solar component capable of optimizing indoor lighting levels up to a 40% were applied.
    Print ISSN: 1748-1317
    Electronic ISSN: 1748-1325
    Topics: Energy, Environment Protection, Nuclear Power Engineering , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 37
    Publication Date: 2011-11-24
    Description: This paper aimed to numerically investigate the performance comparison between counterflow and crossflow heat exchangers for indirect evaporative air cooler. Simulation results indicate that cooling performance difference between the two configurations considerably depends on the configuration structure of heat exchangers, the inlet air status and the mass flow rates of primary and secondary. Among types of the cross-sectional shape considered in this paper, the counter configuration with rectangle channels which has a length-to-width ratio of 16:1 can provide the best cooling performance. The wet bulb effectiveness of counterflow configuration is about 7% greater than that of crossflow configuration with increasing inlet air temperature on average. The higher the inlet air temperature, the bigger the EER, cooling capacity and supply air temperature difference between the two configurations. With increasing relative humidity, the two configurations keep an average wet bulb effectiveness difference of 7.1%. The wet bulb effectiveness difference between the two configurations narrows down from 8.3 to 5.3% with increasing air velocity.
    Print ISSN: 1748-1317
    Electronic ISSN: 1748-1325
    Topics: Energy, Environment Protection, Nuclear Power Engineering , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 38
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2011-11-24
    Description: How do we prove true but unprovable propositions? Gödel produced a statement whose undecidability derives from its ad hoc construction. Concrete or mathematical incompleteness results are interesting unprovable statements of formal arithmetic. We point out where exactly the unprovability lies in the ordinary ‘mathematical’ proofs of two interesting formally unprovable propositions, the Kruskal-Friedman theorem on trees and Girard's normalization theorem in type theory. Their validity is based on robust cognitive performances, which ground mathematics in our relation to space and time, such as symmetries and order, or on the generality of Herbrand's notion of ‘prototype proof’.
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 39
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2011-11-24
    Description: We discuss a recent attempt by Chris Daly and Simon Langford to do away with mathematical explanations of physical phenomena. Daly and Langford suggest that mathematics merely indexes parts of the physical world, and on this understanding of the role of mathematics in science, there is no need to countenance mathematical explanation of physical facts. We argue that their strategy is at best a sketch and only looks plausible in simple cases. We also draw attention to how frequently Daly and Langford find themselves in conflict with mathematical and scientific practice.
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 40
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2011-11-24
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 41
    Publication Date: 2011-11-24
    Description: The paper attempts to summarize the debate on Kant’s philosophy of geometry and to offer a restricted area of mathematical practice for which Kant’s philosophy would be a reasonable account. Geometrical theories can be characterized using Wittgenstein’s notion of pictorial form . Kant’s philosophy of geometry can be interpreted as a reconstruction of geometry based on one of these forms — the projective form . If this is correct, Kant’s philosophy is a reasonable reconstruction of such theories as projective geometry; and not only as they were practiced in Kant’s time, but also as architects use them today.
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 42
    Publication Date: 2011-11-24
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 43
    Publication Date: 2011-11-24
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 44
    Publication Date: 2011-11-24
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 45
    Publication Date: 2011-12-01
    Description: Ubiquitous smart environments equipped with low-cost and easily-deployable wireless sensor networks (WSNs) and ever-increasing widespread Mobile Ad hoc NETworks (MANETs) are opening brand new opportunities in environmental monitoring. This paper proposes an original solution for WSN/MANET integration based on the primary design guideline of opportunistically exploiting MANET overlays impromptu formed over the WSN to improve and boost the data collection task of a typical WSN. On the one hand, we adopt a cross-layer approach that exploits MANET connections to differentiate and fasten the delivery of sensed urgent data by pushing them over low-latency MANET paths. On the other hand, we take advantage of local cross-layer visibility of the WSN data collection procedures and protocols to carefully control and limit WSN–MANET coordination overhead. We claim that our proposed solution can obtain significant quality of service improvements via differentiation, by granting faster delivery times to urgent data with a very limited cost in most common execution scenarios.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 46
    Publication Date: 2011-12-01
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 47
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2011-12-01
    Description: The Capsule Reviews are intended to provide a short succinct review of each paper in the issue in order to bring it to a wider readership. The Capsule Reviews were compiled by Fairouz Kamareddine. Professor Kamareddine is an Associate Editor of The Computer Journal and is based in the Department of Mathematical and Computer Sciences at Heriot-Watt University, Edinburgh, UK.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 48
    Publication Date: 2011-12-01
    Description: Cache sharing has been a popular technique used to facilitate data access in mobile network environments. The key to this technique is to allow an efficient sharing of cache contents between neighboring nodes without introducing excessive amount of communication overhead. In this paper, we propose a cache-sharing protocol, called ‘Pull with Piggybacked Push (PPP)’, which exploits data request broadcasts by performing data pull and index push operations together. Taking advantage of both push- and pull-based approaches, PPP gains benefits from both ends: performance and communication overhead. PPP is unique in that it yields good performance over diverse operating environments, while accomplishing it with lower communication overhead than the previous methods. In addition, it adapts well to different data access patterns. As a result, better scalability is achieved by the proposed protocol.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 49
    Publication Date: 2011-12-01
    Description: With recent advances in technologies such as radio-frequency identification and new standards such as the electronic product code, large-scale traceability is emerging as a key differentiator in a wide range of enterprise applications (e.g. counterfeit prevention, product recalls and pilferage reduction). Such traceability applications often need to access data collected by individual enterprises in a distributed environment. Traditional centralized approaches (e.g. data warehousing) are not feasible for these applications due to their unique characteristics such as large volume of data and sovereignty of the participants. In this paper, we describe an approach that enables applications to share traceability data across independent enterprises in a pure peer-to-peer (P2P) fashion. Data are stored in local repositories of participants and indexed in the network based on structured P2P overlays. In particular, we present a generic approach for efficiently indexing and locating individual objects in large, distributed traceable networks, most notably, in the emerging environment of the internet of things. The results from extensive experiments show that our approach scales well in both data volume and network size. A real-world returnable assets management system is also developed using the proposed techniques to demonstrate its feasibility.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 50
    Publication Date: 2011-12-01
    Description: Detecting motion-based video change, such as different types of motion video or applications using different change detection algorithms in a Web system, is difficult. This paper designs and implements architecture for a real-time or near real-time on-demand motion video change detection system using the Sensor Observation Service (SOS) and the Web Processing Service (WPS) in the Sensor Web environment. Real-time or near real-time includes sensors that obtain motion video data, SOS provides motion video data to WPS and WPS processes this data. Three solution methods are introduced: the GetObservation operation of SOS by transaction, dynamical interaction between SOS and WPS, and WPS real-time or near real-time processing. On-demand means that a developer can choose different motion video change detection algorithms under different applications or different conditions. For this purpose, a flexible, standards-based and service-oriented WPS architecture is designed, which consists of three layers: the WPS interface layer, the field interface layer and the implementation layer. To test the proposed approach, a video change detection case of monitoring a road situation is shown, which was a demonstration for Open Geospatial Consortium Web Service phase 7. The results demonstrate that the proposed approach is feasible.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 51
    Publication Date: 2011-11-24
    Description: Most traditional recommender systems lack accuracy in the case where data used in the recommendation process is sparse. This study addresses the sparsity problem and aims to get rid of it by means of a content-boosted collaborative filtering approach applied to a web-based movie recommendation system. The main motivation is to investigate whether further success can be obtained by combining ‘local and global user similarity’ and ‘effective missing data prediction’ approaches, which were previously introduced and proved to be successful separately. The present work improves these approaches by taking the content information of the movies into account during the item similarity calculations. The comparison of the proposed approach with the original methods was carried out using mean absolute error, and more accurate predictions were achieved.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 52
    Publication Date: 2011-11-24
    Description: Housing associations (HAs) are responsible for building and managing approximately one-third of affordable homes in Scotland. The adoption of low carbon technologies (LCTs) by HAs presents an area that could potentially help towards reducing the carbon footprint of affordable housing and the fuel poverty of tenants. This research thus explores the issues pertaining to the adoption of LCTs from the perspective of two Scottish HAs. Semi-structured interviews were conducted with selected members of the management team in both HAs. The empirical findings revealed that HA-related issues (such as organization culture, being a learning organization and training) and tenant-related issues (such as social cohesion, change in behaviour and training) can both impinge on the adoption of LCTs in HAs. It is contended that there is a piecemeal adoption of LCTs and if mass adoption is to be realized, this will require a nationwide programme that is aimed at supporting the adoption of LCT, in addition to building the skills capacity of the construction industry which is seemingly ill-prepared.
    Print ISSN: 1748-1317
    Electronic ISSN: 1748-1325
    Topics: Energy, Environment Protection, Nuclear Power Engineering , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 53
    Publication Date: 2011-11-24
    Description: Focusing on the ‘worst-case scenario', a modelling study was carried out to examine whether a low cost ventilation solution could provide basic comfort in a specific atrium-building design. This study combined dynamic thermal modelling (DTM) and computational fluid dynamics (CFD) in investigating how thermal conditions, namely the air movement and temperature distribution within an atrium responded to the side-lit form and other changes of design variables such as inlet to outlet opening area ratios and also the outlet's arrangement. The predicted temperature distribution, airflow patterns and comfort indices would provide a better understanding how the design variables affect thermal condition and comfort within the atrium, particularly at the occupied areas under a low cost ventilation solution—pressurized ventilation. The simulation results revealed that sufficiently higher inlet to outlet opening area ratio (i.e. n 〉 1) could improve the thermal condition on the open corridors, the occupied areas, even on high levels; while with an equal inlet to outlet opening area ratio (i.e. n = 1), changing the outlet's arrangement (i.e. location and configuration) did not significantly affect thermal condition. The practical aspect of this study is 2-fold. First, the low cost ventilation solution using exhaust air from surrounding fully air-conditioned rooms could provide acceptable thermal comfort at the open corridors/walkways surrounding the atrium. Secondly, combining a DTM and CFD can be an effective tool to test various design options to achieve an optimal solution. The parametric presented here could be used in similar studies aiming at optimize environmental engineering solutions that balance comfort and cost.
    Print ISSN: 1748-1317
    Electronic ISSN: 1748-1325
    Topics: Energy, Environment Protection, Nuclear Power Engineering , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 54
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2011-11-24
    Description: Lax modalities occur in intuitionistic logics concerned with hardware verification, the computational lambda calculus and access control in secure systems. They also encapsulate the logic of Lawvere–Tierney–Grothendieck topologies on topoi. This article provides a complete semantics for quantified lax logic by combining the Beth–Kripke–Joyal cover semantics for first-order intuitionistic logic with the classical relational semantics for a ‘diamond’ modality. The main technique used is the lifting of a multiplicative closure operator (nucleus) from a Heyting algebra to its MacNeille completion, and the representation of an arbitrary locale as the lattice of ‘propositions’ of a suitable cover system. In addition, the theory is worked out for certain constructive versions of the classical logics K and S4. An alternative completeness proof is given for (non-modal) first-order intuitionistic logic itself with respect to the cover semantics, using a simple and explicit Henkin-style construction of a characteristic model whose points are principal theories rather than prime-saturated ones. The article provides further evidence that there is more to intuitionistic modal logic than the generalization of properties of boxes and diamonds from Boolean modal logic.
    Print ISSN: 0955-792X
    Electronic ISSN: 1465-363X
    Topics: Computer Science , Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 55
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2011-11-24
    Description: In Baaz and Iemhoff (2006, Annals of Pure and Applied Logic, 142, 269–295), an alternative skolemization method called eskolemization was introduced that is sound and complete for existence logic with respect to existential quantifiers. Existence logic is a conservative extension of intuitionistic logic by an existence predicate. Therefore, eskolemization provides a skolemization method for intuitionistic logic as well. All proofs in Baaz and Iemhoff (2006, Annals of Pure and Applied Logic, 142, 269–295) were semantical. In this article, a proof-theoretic proof of the completeness of eskolemization with respect to existential quantifiers is presented.
    Print ISSN: 0955-792X
    Electronic ISSN: 1465-363X
    Topics: Computer Science , Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 56
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2011-11-24
    Description: The intuitionistic sequent calculus (at most one formula on the right-hand side of sequents) comes with a natural dual system: the dual-intuitionistic sequent calculus (at most one formula on the left-hand side). We explain how the duality between these two systems exactly corresponds to the intensively studied duality between call-by-value systems and call-by-name systems for classical logic. Relying on the uniqueness of the computational behaviour underlying these four logics (intuitionistic, dual-intuitionistic, call-by-value classical and call-by-name classical), we define a generic syntax of nets which can be used for any of these logics.
    Print ISSN: 0955-792X
    Electronic ISSN: 1465-363X
    Topics: Computer Science , Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 57
    Publication Date: 2011-11-24
    Description: The study of propositional realizability logic was initiated in the 50th of the last century. Unfortunately, no description of the class of realizable propositional formulas is found up to now. Nevertheless, some attempts of such a description were made. In 1974, the author proved that every known realizable propositional formula has the property that every one of its closed arithmetical instances is deducible in the system obtained by adding Extended Church's Thesis and Markov Principle as axiom schemes to Intuitionistic Arithmetic. Visser calls this system Markov's Arithmetic. In 1990, another attempt of describing the class of realizable propositional formulas was made by Varpakhovskii who proposed a calculus in an extended propositional language and proved that all known realizable propositional formulas are deducible in this calculus. In this article we prove that every propositional formula deducible in Varpakhovskii's calculus has the property that each of its closed arithmetical instances is deducible in Markov's Arithmetic.
    Print ISSN: 0955-792X
    Electronic ISSN: 1465-363X
    Topics: Computer Science , Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 58
    Publication Date: 2011-11-24
    Description: Is it possible to give a coordinate-free formulation of the Second Incompleteness Theorem? We pursue one possible approach to this question. We show that (i) cutfree consistency for finitely axiomatized theories can be uniquely characterized modulo EA -provable equivalence and (ii) consistency for finitely axiomatized sequential theories can be uniquely characterized modulo EA -provable equivalence. The case of infinitely axiomatized RE theories is more delicate. We carefully discuss this in the article.
    Print ISSN: 0955-792X
    Electronic ISSN: 1465-363X
    Topics: Computer Science , Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 59
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2011-11-24
    Description: In this article, we study the canonical model for the closed fragment of GLP and establish its precise relationship with a universal model constructed by Ignatiev. In particular, we effectively characterize the canonical model in terms of a coordinate system based on sequences of ordinals up to 0 .We then define a simple topological model of this logic by defining a natural polytopology on the ordinal 0 itself.
    Print ISSN: 0955-792X
    Electronic ISSN: 1465-363X
    Topics: Computer Science , Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 60
    Publication Date: 2011-11-24
    Description: Most existing nuclear power plants in North America are typically water-cooled and operate at 250–500°C. For this temperature level, the copper–chlorine (Cu–Cl) cycle is one of the most promising cycles that can be integrated with nuclear reactors for hydrogen production by decomposing water into its constituents. In this study, we analyze the heat exchangers in the Cu–Cl thermochemical cycle so as to enhance heat transfer effectiveness and thereby improve the cycle efficiency. The thermal management options for internal and external heat transfer are studied and heat recovery opportunities are investigated and compared. Each heat exchanger in the cycle is examined individually based on the chemical/physical behavior of the process, and the most appropriate options are recommended. A thermodynamic analysis and associated parametric studies are performed for various configurations to contrast their efficiencies and effectivenesses.
    Print ISSN: 1748-1317
    Electronic ISSN: 1748-1325
    Topics: Energy, Environment Protection, Nuclear Power Engineering , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 61
    Publication Date: 2011-11-24
    Description: The flaring of oil-associated gas continues to generate insidious environmental and energy consequences against efforts toward sustainable development for Nigeria. This study compared some of the economic benefits lost due to flared gas at flow stations with fuelwood energy consumption. The objectives were to assess comparative cost suffered by host communities, estimate greenhouse gases emissions of burnt-off gas and evaluate possible effects of post-global financial meltdown support policies on climate change. Parameters for evaluating the environmental and energy impacts were measured directly or collected from flow stations through opinion surveys and meetings. An inventory of the motors, voltages and power ratings of the machines used at the flow stations was made, with a view to quantifying the energy involved in drilling operations. For estimation of health risks and gaseous emissions, SIMPACTS method was used. Results from the study show that an annual average of 2040 MJ of fuelwood is consumed in Nigeria, 77.3% of the sourcing is done by children and the time spent in fuelwood trips is between 4 and 5 h, at a frequency of three to four times a week. This amount of fuelwood consumed examined alongside 2.5billion standard cubic feet of gas flared per day, revealed the quantity of energy that ought to be saved and related avoidable extreme weather conditions that prevail in Nigeria. Therefore, gas flaring violates the tenets of sustainable development and seriously contributes to global warming. In conclusion, flare down can be achieved by utilizing micro-gas turbines, re-injection and pursued as part of a new agenda for responsible governance in Nigeria.
    Print ISSN: 1748-1317
    Electronic ISSN: 1748-1325
    Topics: Energy, Environment Protection, Nuclear Power Engineering , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 62
    Publication Date: 2011-11-24
    Description: We give a sound and complete labelled natural deduction system for a bundled branching temporal logic, namely the until-free version of BCTL *. The logic BCTL * is obtained by referring to a more general semantics than that of CTL *, where we only require that the set of paths in a model is closed under taking suffixes (i.e. is suffix-closed) and is closed under putting together a finite prefix of one path with the suffix of any other path beginning at the same state where the prefix ends (i.e. is fusion-closed). In other words, this logic does not enjoy the so-called limit-closure property of the standard CTL * validity semantics. We give both a classical and an intuitionistic version of our labelled natural deduction system for the until-free version of BCTL *, and carry out a proof-theoretical analysis of the intuitionistic system: we prove that derivations reduce to a normal form, which allows us to give a purely syntactical proof of consistency (for both the intuitionistic and classical versions) of the deduction system.
    Print ISSN: 0955-792X
    Electronic ISSN: 1465-363X
    Topics: Computer Science , Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 63
    Publication Date: 2011-11-24
    Description: The existence of states and probabilities on effect algebras as logical structures when events may be non-compatible, unsharp, fuzzy or imprecise is still an open question. Only a few families of effect algebras possessing states are known. We are going to show some families of effect algebras, the existence of a pseudocomplementation on which implies the existence of states. Namely, those are Archimedean atomic lattice effect algebras, which are sharply dominating or s-compactly generated or extendable to complete lattice effect algebras.
    Print ISSN: 0955-792X
    Electronic ISSN: 1465-363X
    Topics: Computer Science , Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 64
    Publication Date: 2011-11-24
    Description: In order to investigate the operation performance of ground-coupled heat-pump (GCHP) system, an analytical simulation model of GCHP system on short time-step basis and a computer program based on this model to predict system operating parameters are developed in this study. Besides, detailed on-site experiments on GCHP test rig installed in a temperate region of China are carried out. The temperature distributions of borehole as well as ground around borehole at different depths are evaluated. Operation parameters of GCHP system such as circulating water temperature, heat rejection into ground and system power consumption when the system operated in intermittent and continuous modes are investigated. The accuracy of proposed simulation model is validated by experimental data. The advantage of GCHP technology in energy efficiency over other conventional air-conditioning systems is proved to be obvious and the performance of GCHP system is found to be affected by its operation modes.
    Print ISSN: 1748-1317
    Electronic ISSN: 1748-1325
    Topics: Energy, Environment Protection, Nuclear Power Engineering , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 65
    Publication Date: 2011-11-24
    Description: One approach to moderating the expected behaviour of agents in open societies is the use of explicit languages for defining norms, conditional commitments and/or social expectations, together with infrastructure supporting conformance checking. This article presents a logical account of the fulfilment and violation of social expectations modelled as conditional rules over a hybrid linear propositional temporal logic. Our semantics captures the intuition that the fulfilment or violation of an expectation must be determined without recourse to information from later states.We define a means of updating expectations from one state to the next based on formula progression, and show how conformance checking was implemented by combining the MCFULLmodel checking algorithm of Franceschet and de Rijke and the semantics for LTL over truncated paths proposed by Eisner et al. We present algorithms for both traditional offline model checking, where the complete model is available at once, and online model checking, where states are added to the model sequentially at runtime.
    Print ISSN: 0955-792X
    Electronic ISSN: 1465-363X
    Topics: Computer Science , Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 66
    Publication Date: 2011-11-24
    Description: Sorption heat pumps based on monovariant reactions, such as ammonia-salt systems, can operate at low driving temperatures and achieve high power densities in comparison with multi-variant sorption systems. The disadvantage of monovariant systems, however, is the inflexibility towards required temperature levels. Where multivariant systems scale over a large range of temperatures, for the monovariant system, the temperature range is limited by the discrete transition from (fully) adsorbed to desorbed state. To increase flexibility towards changes in operating temperatures of the monovariant sorption systems, the extension of such systems with a compressor has been studied. Focus of this research is on the use of ammonia salts for type II heat pump for upgrading low temperature industrial waste heat to low–medium pressure steam. At ECN, a system based on LiCl–MgCl 2 ammonia reactions has proved to achieve sufficient temperature lift (〉50°C) and cyclic stability (〉100 cycles) but requires a minimum temperature of 120°C for proper operation. To add flexibility to this system, i.e. to be able to use waste heat below 120°C, the performance of a hybrid variant containing both thermally driven sorption reactors and a compressor has been evaluated. This evaluation focuses on extension in temperature range, and exergy efficiency and economic consequences of such a hybrid system. In addition, the possibility to use other ammonia-salt combinations has been investigated. The conclusions are that hybrid systems can reduce primary energy consumption and be economically feasible. It also shows that salt combinations other than LiCl–MgCl 2 could be more suitable for a hybrid thermo-chemical adsorption–compression system.
    Print ISSN: 1748-1317
    Electronic ISSN: 1748-1325
    Topics: Energy, Environment Protection, Nuclear Power Engineering , Mechanical Engineering, Materials Science, Production Engineering, Mining and Metallurgy, Traffic Engineering, Precision Mechanics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 67
    Publication Date: 2011-11-24
    Description: Among the class of finite integral commutative residuated chains (ICRCs), we identify those algebras which can be obtained as a nuclear retraction of a conuclear contraction of a totally ordered Abelian -group. We call the ICRCs satisfying this condition regular. Then we discuss the structure of finite regular ICRCs. Finally, we prove that the class of regular members generate a strictly smaller variety than the variety generated by ICRCs.
    Print ISSN: 0955-792X
    Electronic ISSN: 1465-363X
    Topics: Computer Science , Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 68
    Publication Date: 2011-11-24
    Description: We provide a constructive, direct and simple proof of the completeness of the cut-free part of the hypersequential calculus HG for Gödel logic (thereby proving both completeness of the calculus for its standard semantics, and the admissibility of the cut rule in the full calculus). We then extend the results and proofs to derivations from assumptions, showing that such derivations can be confined to those in which cuts are made only on formulas which occur in the assumptions. The article is self-contained, and no previous knowledge concerning HG (or even Gödel logic) is needed for understanding it.
    Print ISSN: 0955-792X
    Electronic ISSN: 1465-363X
    Topics: Computer Science , Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 69
    Publication Date: 2011-11-24
    Description: A particular notion of an interpretation of a theory over a fuzzy predicate logic in another such theory is discussed. For interpretability with the domain defined by a provably crisp formula, which is of course a syntactical notion, a semantic characterization is established. In the last section, we discuss the question of whether the extension of a decidable theory by a single new axiom is decidable and present an erratum to the paper (Hájek, 2007, Fundamenta informaticae , 81 , 155–163).
    Print ISSN: 0955-792X
    Electronic ISSN: 1465-363X
    Topics: Computer Science , Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 70
    Publication Date: 2011-11-24
    Print ISSN: 0955-792X
    Electronic ISSN: 1465-363X
    Topics: Computer Science , Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 71
    Publication Date: 2011-11-24
    Description: This article deals with many-valued modal logics, based only on the necessity operator, over a residuated lattice. We focus on three basic classes, according to the accessibility relation, of Kripke frames: the full class of frames evaluated in the residuated lattice (and so defining the minimum modal logic), the ones evaluated in the idempotent elements and the ones only evaluated in 0 and 1. We show how to expand an axiomatization, with canonical truth-constants in the language, of a finite residuated lattice into one of the modal logic, for each one of the three basic classes of Kripke frames. We also provide axiomatizations for the case of a finite MV chain but this time without canonical truth-constants in the language.
    Print ISSN: 0955-792X
    Electronic ISSN: 1465-363X
    Topics: Computer Science , Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 72
    Publication Date: 2011-11-24
    Description: The article deals with Codd's relational model of data and its fuzzy logic extensions. Our main purpose is to examine, from the point of view of fuzzy logic in the narrow sense, some of the extensions proposed in the literature and the relationships between them. We argue that fuzzy logic in the narrow sense is important for the fuzzy logic extensions because it provides conceptual and methodological foundations, clarity and simplicity. We present several comparative observations as well as new technical results.
    Print ISSN: 0955-792X
    Electronic ISSN: 1465-363X
    Topics: Computer Science , Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 73
    Publication Date: 2011-11-24
    Description: This article shows how derivations in the deep inference system SKS for classical propositional logic can be translated into proof nets. Since an SKS derivation contains more information about a proof than the corresponding proof net, we observe a loss of information which can be understood as ‘eliminating bureaucracy’. Technically, this is achieved by cut reduction on proof nets. As an intermediate step between the two extremes, SKS derivations and proof nets, we will see proof graphs representing derivations in ‘Formalism A’.
    Print ISSN: 0955-792X
    Electronic ISSN: 1465-363X
    Topics: Computer Science , Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 74
    Publication Date: 2011-11-24
    Description: The superintuitionistic predicate logics (without or with equality) of all predicate Kripke frames with nested domains over a fixed poset W (a set of possible worlds) are embeddable in the logic (without equality) of all Kripke frames with constant domains over W . Therefore, Takano's result [13] on finite axiomatizability of the logic of Kripke frames with constant domains over the set of real numbers implies the recursive axiomatizability of the corresponding logics with nested domains. Other consequences are mentioned as well.
    Print ISSN: 0955-792X
    Electronic ISSN: 1465-363X
    Topics: Computer Science , Mathematics
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 75
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2011-11-24
    Description: In a recent paper, Mark Balaguer has responded to the argument that I launched against Hermeneutic Non-Assertivism, claiming that, as a matter of empirical fact, ‘when typical mathematicians utter mathematical sentences, they are doing something that differs from asserting in a pretty subtle way, so that the difference between [asserting] and this other kind of speech act is not obvious’. In this paper, I show the implausibility of this empirical hypothesis.
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 76
    Publication Date: 2011-11-24
    Description: Simple-type theory is widely regarded as inadequate to capture the metaphysics of mathematics. The problem, however, is not that some kinds of structure cannot be studied within simple-type theory. Even structures that violate simple-types are isomorphic to structures that can be studied in simple-type theory. In disputes over the logicist foundations of mathematics, the central issue concerns the problem that simple-type theory fails to assure an infinity of natural numbers as objects . This paper argues that the problem of infinity is based on a metaphysical prejudice in favor of numbers as objects — a prejudice that mathematics can get along without.
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 77
    Publication Date: 2011-11-24
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 78
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2011-11-24
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 79
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2011-11-24
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 80
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2011-11-24
    Description: In a recent paper in this journal, Mark Balaguer develops and defends a new version of mathematical fictionalism, what he calls ‘Hermeneutic non-assertivism’, and responds to some recent objections to mathematical fictionalism that were launched by John Burgess and others. In this paper I provide some fairly compelling reasons for rejecting Hermeneutic non-assertivism — ones that highlight an important feature of what understanding mathematics involves (or, as we shall see, does not involve).
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 81
    Publication Date: 2011-11-24
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 82
    facet.materialart.
    Unknown
    Oxford University Press
    Publication Date: 2011-11-24
    Description: Philosophers have explored objective interpretations of probability mainly by considering empirical probability statements. Because of this focus, it is widely believed that the logical interpretation and the actual-frequency interpretation are unsatisfactory and the hypothetical-frequency interpretation is not much better. Probabilistic assertions in pure mathematics present a new challenge. Mathematicians prove theorems in number theory that assign probabilities. The most natural interpretation of these probabilities is that they describe actual frequencies in finite sets and limits of actual frequencies in infinite sets. This interpretation vindicates part of what the logical interpretation of probability aimed to establish.
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 83
    Publication Date: 2011-11-24
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 84
    Publication Date: 2011-11-24
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 85
    Publication Date: 2011-11-24
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 86
    Publication Date: 2011-11-24
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 87
    Publication Date: 2011-11-24
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 88
    Publication Date: 2011-11-24
    Print ISSN: 0031-8019
    Electronic ISSN: 1744-6406
    Topics: Mathematics , Philosophy
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 89
    Publication Date: 2011-12-01
    Description: How do animals use their habitat? Where do they go and what do they do? These basic questions are key not only to understanding a species’ ecology and evolution, but also for addressing many of the environmental challenges we currently face, including problems posed by invasive species, the spread of zoonotic diseases and declines in wildlife populations due to anthropogenic climate and land-use changes. Monitoring the movements and activities of wild animals can be difficult, especially when the species in question are small, cryptic or move over large areas. In this paper, we describe an Automated Radio-Telemetry System (ARTS) that we designed and built on Barro Colorado Island (BCI), Panama to overcome these challenges. We describe the hardware and software we used to implement the ARTS, and discuss the scientific successes we have had using the system, as well as the logistical challenges we faced in maintaining the system in real-world, rainforest conditions. The ARTS uses automated radio-telemetry receivers mounted on 40-m towers topped with arrays of directional antennas to track the activity and location of radio-collared study animals, 24 h a day, 7 days a week. These receiving units are connected by a wireless network to a server housed in the laboratory on BCI, making these data available in real time to researchers via a web-accessible database. As long as study animals are within the range of the towers, the ARTS system collects data more frequently than typical animal-borne global positioning system collars (~12 locations/h) with lower accuracy (approximately 50 m) but at much reduced cost per tag (~10X less expensive). The geographic range of ARTS, like all VHF telemetry, is affected by the size of the radio-tag as well as its position in the forest (e.g. tags in the canopy transmit farther than those on the forest floor). We present a model of signal propagation based on landscape conditions, which quantifies these effects and identifies sources of interference, including weather events and human activity. ARTS has been used to track 374 individual animals from 38 species, including 17 mammal species, 12 birds, 7 reptiles or amphibians, as well as two species of plant seeds. These data elucidate the spatio-temporal dynamics of animal activity and movement at the site and have produced numerous peer-reviewed publications, student theses, magazine articles, educational programs and film documentaries. These data are also relevant to long-term population monitoring and conservation plans. Both the successes and the failures of the ARTS system are applicable to broader sensor network applications and are valuable for advancing sensor network research.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 90
    Publication Date: 2011-12-01
    Description: Energy efficiency is a key characteristic of modern wireless sensors. Assuming that the transceiver is the most power-consuming component of a typical sensor node, then a large advantage can be achieved at the data link layer where the medium access control (MAC) protocol controls the usage of the radio unit. Many MAC protocols have been developed for traditional wireless networks. Given that the sensor network is different from the traditional wireless network in many places, researchers are looking for a MAC protocol that is specifically designed and adapted to the sensor network. Moreover, most of the contributions in the wireless sensor network have assumed static nodes. However, some applications in the area of medical care and disaster response make use of the mobile sensor network. Thus, the present paper studies and simulates the sensor MAC (S-MAC), timeout MAC and mobility-aware S-MAC (MS-MAC) protocols in terms of their energy efficiency in different mobility situations. Furthermore, an enhancement of the MS-MAC protocol, named as enhanced MS-MAC, is introduced and simulated. The results show that this enhancement can significantly improve the energy efficiency when there is a reasonable packet delivery rate.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 91
    Publication Date: 2011-11-24
    Description: According to Lee in 1996, computer scientists ‘are reaching the stage of development where each new generation of participants is unaware both of their overall technological ancestry and the history of the development of their speciality, and have no past to build upon’ [Lee, J.A.N. (1996) "Those who forget the lessons of history are doomed to repeat it" or, why I study the history of computing. IEEE Ann. Hist. Comput. 18, 54–62]. A technically and historically accurate account, as attempted here, can help us, computer scientists, grasp some of the fundamental ideas underlying our discipline. This paper describes some early contributions of Dijkstra by elaborating on his involvement in putting forward and implementing the recursive procedure as an ALGOL60 language construct. Particular attention is paid to Dijkstra's generalizing style of solving problems.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 92
    Publication Date: 2011-11-24
    Description: This paper explores efficient ways to use flash memory to store online analytical processing (OLAP) data. The particular type of queries considered are range queries using the aggregate functions SUM, COUNT and AVG. The asymmetric cost of reads and writes for flash memory gives higher importance to how updates are handled in a flash memory environment. A popular data structure used for answering OLAP range-sum queries is the prefix sum cube. It allows the range-sum query to be answered in constant time. However, updating the prefix sum cube is very expensive. To overcome this, the -tree was proposed by Chun et al . (Dynamic update cube for range-sum queries. Proc. Int. Conf. Very Large Data Bases, San Francisco, CA, USA, 2001, pp. 521–530. Morgan Kaufmann Publisher). The -tree stores all updates to the prefix sum cube in a separate r-tree. This approach worked well for the hard disk where in-place updates are relatively cheap. However, for flash memory where in-place updates are very expensive, the -tree performs very poorly. We take a four-pronged approach to overcome the problem of expensive in-place updates. The first is efficient caching of updates in RAM. The second is writing out whole trees from RAM to flash memory instead of incrementally updating a disk resident tree. The third is we allow users to trade bounded amounts of accuracy for less updates via lossy compression. Finally, we use a quadtree index structure instead of the R-tree. We prove that the quadtree compression problem is NP-complete. A greedy heuristic is proposed to find near optimal solutions in polynomial time. Various experiments were conducted to compare the proposed algorithms against the existing -tree. The results show that our algorithms consistently outperformed -tree by factors of between 10 and 100. This demonstrates the importance of designing flash memory customized algorithms for OLAP range queries. In addition, among our algorithms, the error bound solutions with a small error bound setting significantly outperform the accurate solution in terms of performance for a variety of parameter settings. This indicates that the error bound algorithms offer users an effective trade-off between execution time and accuracy.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 93
    Publication Date: 2011-11-24
    Description: This paper focuses on the performance evaluation of Compiler for Portable Checkpointing (CPPC), a tool for the checkpointing of parallel message-passing applications. Its performance and the factors that impact it are transparently and rigorously identified and assessed. The tests were performed on a public supercomputing infrastructure, using a large number of very different applications and showing excellent results in terms of performance and effort required for integration into user codes. Statistical analysis techniques have been used to better approximate the performance of the tool. Quantitative and qualitative comparisons with other rollback-recovery approaches to fault tolerance are also included. All these data and comparisons are then discussed in an effort to extract meaningful conclusions about the state-of-the-art and future research trends in the rollback-recovery field.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 94
    Publication Date: 2011-11-24
    Description: There are various ways to measure the shape difference between two n -node rooted binary trees (binary trees for short). A rotation on a binary tree is a local restructuring that changes the tree into another one preserving the in-order sequence. The rotation distance between two binary trees is the minimum number of rotations needed to transform one into another. Till now, no polynomial–time algorithm exists for computing the rotation distance between any two binary trees. Recently, Lucas ( Comput. J. , 47, 259–269, 2004) presented an O ( n 2 )–time algorithm for finding the rotation distance between two binary trees, where the source tree is a degenerate tree and the destination tree is an angle tree. This paper improves the time-complexity to O ( n ) under this constraint.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 95
    Publication Date: 2011-11-24
    Description: We discuss algorithm recognition (AR) and present a method for recognizing algorithms automatically from Java source code. The method consists of two phases. In the first phase, the recognizable algorithms are converted into the vectors of characteristics, which are computed based on static analysis of program code, including various statistics of language constructs and analysis of Roles of Variables in the target program. In the second phase, the algorithms are classified based on these vectors using the C4.5 decision tree classifier. We demonstrate the performance of the method by applying it to sorting algorithms. Using leave-one-out cross-validation technique, we have conducted an experimental evaluation of the classification performance showing that the average classification accuracy is 98.1% (the data set consisted of five different types of sorting algorithms). The results show the applicability and usefulness of roles of variables in AR, and illustrate that the C4.5 algorithm is a suitable decision tree classifier for our purpose. The limitations of the method are also discussed.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 96
    Publication Date: 2011-11-24
    Description: Electron tomography (ET) is an important technique in biosciences that is providing new insights into the cellular ultrastructure. Iterative reconstruction methods have been shown to be robust against the noise and limited-tilt range conditions present in ET. Nevertheless, these methods are not extensively used due to their computational demands. Instead, the simpler method weighted backprojection (WBP) remains prevalent. Recently, we have demonstrated that a matrix approach to WBP allows a significant reduction in processing time both on central processing units and on graphics processing units (GPUs). In this work, we extend that matrix approach to one of the most common iterative methods in ET, simultaneous iterative reconstruction technique (SIRT). We show that it is possible to implement this method targeted at GPU directly, using sparse algebra. We also analyse this approach on different GPU platforms and confirm that these implementations exhibit high performance. This may thus help to the widespread use of SIRT.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 97
    Publication Date: 2011-11-24
    Description: The source-location privacy problem in Wireless Sensor Networks has been traditionally tackled by the creation of random routes for every packet transmitted from the source nodes to the base station. These schemes provide a considerable protection level at a high cost in terms of message delivery time and energy consumption. This overhead is due to the fact that the data routing process is done in a blind way, without knowledge about the location of the attacker. In this work, we propose the Context-Aware Location Privacy (CALP) approach, which takes advantage of the ability of sensor nodes to perceive the presence of a mobile adversary in their vicinity in order to transmit data packets in a more energy-efficient and privacy-preserving manner. In particular, we apply the concepts of CALP to the development of a shortest-path CALP routing algorithm. A permissive and a strict version of the protocol are studied for different adversarial models and the proposed schemes are evaluated through simulation experiments in terms of privacy protection and energy consumption. Finally, we present the conclusions of the paper as well as possible extensions of this work.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 98
    Publication Date: 2011-11-24
    Description: The sum of k mins protocol was proposed by Hopper and Blum as a protocol for secure human identification. The goal of the protocol is to let an unaided human securely authenticate to a remote server. The main ingredient of the protocol is the sum of k mins problem. The difficulty of solving this problem determines the security of the protocol. In this paper, we show that the sum of k mins problem is NP-Complete and W[1]-Hard. This latter notion relates to fixed parameter intractability. We also discuss the use of the sum of k mins protocol in resource-constrained devices.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 99
    Publication Date: 2011-11-24
    Description: As an interesting application on cloud computing, content-based image retrieval (CBIR) has attracted a lot of attention, but the focus of previous research work was mainly on improving the retrieval performance rather than addressing security issues such as copyrights and user privacy. With an increase of security attacks in the computer networks, these security issues become critical for CBIR systems. In this paper, we propose a novel two-party watermarking protocol that can resolve the issues regarding user rights and privacy. Unlike the previously published protocols, our protocol does not require the existence of a trusted party. It exhibits three useful features: security against partial watermark removal, security in watermark verification and non-repudiation. In addition, we report an empirical research of CBIR with the security mechanism. The experimental results show that the proposed protocol is practicable and the retrieval performance will not be affected by watermarking query images.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
  • 100
    Publication Date: 2011-11-24
    Description: A non-autonomous cross-coupled chaotic circuit is presented with its derivation mechanism. To guarantee robust chaotic behavior of the circuit against parameter variations, an ideal set of parameters is determined by constructing bifurcation diagrams. A truly random number generator (TRNG), which relies on generating non-invertible binary sequences according to regional distributions of underlying chaotic signal, is also introduced. Simulation and experimental results verifying the feasibility of the circuit are given. The proposed TRNG offers much higher and constant throughput rates, allows for offset compensation and fulfills the NIST-800-22 statistical test suite without further post-processing.
    Print ISSN: 0010-4620
    Electronic ISSN: 1460-2067
    Topics: Computer Science
    Location Call Number Expected Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...