36 resultados para Graph operations
em CentAUR: Central Archive University of Reading - UK
Resumo:
A model based on graph isomorphisms is used to formalize software evolution. Step by step we narrow the search space by an informed selection of the attributes based on the current state-of-the-art in software engineering and generate a seed solution. We then traverse the resulting space using graph isomorphisms and other set operations over the vertex sets. The new solutions will preserve the desired attributes. The goal of defining an isomorphism based search mechanism is to construct predictors of evolution that can facilitate the automation of ’software factory’ paradigm. The model allows for automation via software tools implementing the concepts.
Resumo:
A model based on graph isomorphisms is used to formalize software evolution. Step by step we narrow the search space by an informed selection of the attributes based on the current state-of-the-art in software engineering and generate a seed solution. We then traverse the resulting space using graph isomorphisms and other set operations over the vertex sets. The new solutions will preserve the desired attributes. The goal of defining an isomorphism based search mechanism is to construct predictors of evolution that can facilitate the automation of ’software factory’ paradigm. The model allows for automation via software tools implementing the concepts.
Resumo:
In this paper, Bond Graphs are employed to develop a novel mathematical model of conventional switched-mode DC-DC converters valid for both continuous and discontinuous conduction modes. A unique causality bond graph model of hybrid models is suggested with the operation of the switch and the diode to be represented by a Modulated Transformer with a binary input and a resistor with fixed conductance causality. The operation of the diode is controlled using an if-then function within the model. The extracted hybrid model is implemented on a Boost and Buck converter with their operations to change from CCM to DCM and to return to CCM. The vector fields of the models show validity in a wide operation area and comparison with the simulation of the converters using PSPICE reveals high accuracy of the proposed model, with the Normalised Root Means Square Error and the Maximum Absolute Error remaining adequately low. The model is also experimentally tested on a Buck topology.
Resumo:
This short paper discusses some of the theory behind the Chindit operations in Burma of 1943-44, drawing parallels between Wingate's theoretical concepts post 1990s concepts of 'manoeuvre warfare.'
Resumo:
The Military Intelligence (Research) Department of the British War Office was tasked in 1940 with encouraging and supporting armed resistance in occupied Europe and the Axis-controlled Middle East. The major contention of this paper is that, in doing so, MI(R) performed a key role in British strategy in 1940-42 and in the development of what are now known as covert operations. MI(R) developed an organic, but coherent doctrine for such activity which was influential upon the Special Operations Executive (SOE) and its own sub-branch, G(R), which applied this doctrine in practice in East Africa and the Middle East in 1940-41. It was also here that a number of key figures in the development of covert operations and special forces first cut their teeth, the most notable being Major Generals Colin Gubbins and Orde Wingate.
Resumo:
The international construction market is very complex, and requires strong structure and strategy for companies wanting to operate overseas. This article investigates characteristics of international construction. The international operation of Brazilian contractors is explored via results from a qualitative study which was carried out using case studies. The case studies comprised ten big Brazilian contractors, six of which operate abroad. The study identified the patterns of international operation, the competitive advantages of these contractors, as well as the difficulties faced by them in the international construction market. Four of the contractors studied operate only in the domestic market. The study of these cases revealed both obstacles and motivations for future international operations. The study revealed that despite the existing competitive advantages, Brazilian contractors' presence in the international market is limited. The main reason for that is probably their main competitive disadvantage: the lack of financial support from the government.
Resumo:
Short-term memory (STM) has often been considered to be a central resource in cognition. This study addresses its role in rapid serial visual presentation (RSVP) tasks tapping into temporal attention-the attentional blink (AB). Various STM operations are tested for their impact on performance and, in particular, on the AB. Memory tasks were found to exert considerable impact on general performance but the size of the AB was more or less immune to manipulations of STM load. Likewise, the AB was unaffected by manipulating the match between items held in STM and targets or temporally close distractors in the RSVP stream. The emerging picture is that STM resources, or their lack, play no role in the AB. Alternative accounts assuming serial consolidation, selection for action, and distractor-induced task-set interference are discussed.
Resumo:
The work reported in this paper is motivated by biomimetic inspiration - the transformation of patterns. The major issue addressed is the development of feasible methods for transformation based on a macroscopic tool. The general requirement for the feasibility of the transformation method is determined by classifying pattern formation approaches an their characteristics. A formal definition for pattern transformation is provided and four special cases namely, elementary and geometric transformation based on repositioning all and some robotic agents are introduced. A feasible method for transforming patterns geometrically, based on the macroscopic parameter operation of a swarm is considered. The transformation method is applied to a swarm model which lends itself to the transformation technique. Simulation studies are developed to validate the feasibility of the approach, and do indeed confirm the approach.