941 resultados para constraint programming
Resumo:
ACM Computing Classification System (1998): G.2.2, F.2.2.
Resumo:
ACM Computing Classification System (1998): G.1.2.
Resumo:
Report published in the Proceedings of the National Conference on "Education in the Information Society", Plovdiv, May, 2013
Resumo:
Report published in the Proceedings of the National Conference on "Education and Research in the Information Society", Plovdiv, May, 2014
Resumo:
In the computer science community, there is considerable debate about the appropriate sequence for introducing object-oriented concepts to novice programmers. Research into novice programming has struggled to identify the critical aspects that would provide a consistently successful approach to teaching introductory object-oriented programming. Starting from the premise that the conceptions of a task determine the type of output from the task, assisting novice programmers to become aware of what the required output should be, may lay a foundation for improving learning. This study adopted a phenomenographic approach. Thirty one practitioners were interviewed about the ways in which they experience object-oriented programming and categories of description and critical aspects were identified. These critical aspects were then used to examine the spaces of learning provided in twenty introductory textbooks. The study uncovered critical aspects that related to the way that practitioners expressed their understanding of an object-oriented program and the influences on their approach to designing programs. The study of the textbooks revealed a large variability in the cover of these critical aspects.
Resumo:
At the level of fundamental research, fibre lasers provide convenient and reproducible experimental settings for the study of a variety of nonlinear dynamical processes, while at the applied research level, pulses with different and optimised features – e.g., in terms of pulse duration, temporal and/or spectral intensity profile, energy, repetition rate and emission bandwidth – are sought with the general constraint of developing efficient cavity architectures. In this talk, we review our recent progress on the realisation of different regimes of pulse generation in passively mode-locked fibre lasers through control of the in-cavity propagation dynamics. We report on the possibility to achieve both parabolic self-similar and triangular pulse shaping in a mode-locked fibre laser via adjustment of the net normal dispersion and integrated gain of the cavity [1]. We also show that careful control of the gain/loss parameters of a net-normal dispersion laser cavity provides the means of achieving switching among Gaussian pulse, dissipative soliton and similariton pulse solutions in the cavity [2,3]. Furthermore, we report on our recent theoretical and experimental studies of pulse shaping by inclusion of an amplitude and phase spectral filter into the cavity of a laser. We numerically demonstrate that a mode-locked fibre laser can operate in dif- ferent pulse-generation regimes, including parabolic, flattop and triangular waveform generations, depending on the amplitude profile of the in-cavity spectral filter [4]. An application of technique using a flat-top spectral filter is demonstrated to achieve the direct generation of sinc-shaped optical Nyquist pulses of high quality and of a widely tuneable bandwidth from the laser [5]. We also report on a recently-developed versa- tile erbium-doped fibre laser, in which conventional soliton, dispersion-managed soli- ton (stretched-pulse) and dissipative soliton mode-locking regimes can be selectively and reliably targeted by programming different group-velocity dispersion profiles and bandwidths on an in-cavity programmable filter [6]. References: 1. S. Boscolo and S. K. Turitsyn, Phys. Rev. A 85, 043811 (2012). 2. J. Peng et al., Phys. Rev. A 86, 033808 (2012). 3. J. Peng, Opt. Express 24, 3046-3054 (2016). 4. S. Boscolo, C. Finot, H. Karakuzu, and P. Petropoulos, Opt. Lett. 39, 438-441 (2014). 5. S. Boscolo, C. Finot, and S. K. Turitsyn, IEEE Photon. J. 7, 7802008 (2015). 6. J. Peng and S. Boscolo, Sci. Rep. 6, 25995 (2016).
Resumo:
At the level of fundamental research, fibre lasers provide convenient and reproducible experimental settings for the study of a variety of nonlinear dynamical processes, while at the applied research level, pulses with different and optimised features – e.g., in terms of pulse duration, temporal and/or spectral shape, energy, repetition rate and emission bandwidth – are sought with the general constraint of developing efficient cavity architectures. In this work, we review our recent progress on the realisation of pulse shaping in passively- mode-locked fibre lasers by inclusion of an amplitude and phase spectral filter into the laser cavity. We present a fibre laser design in which pulse shaping occurs through filtering of a spectrally nonlinearly broadened pulse in the cavity. This strategy of pulse shaping is illustrated through the numerical demonstration of the laser operation in different pulse-generation regimes, including parabolic, flattop and triangular waveform generations, depending on the amplitude profile of the in-cavity spectral filter [1]. As an application of this general approach, we show that the use of an in-cavity flat-top spectral filter makes it possible to directly generate sinc-shaped Nyquist pulses of high quality and of a widely tunable bandwidth from the laser [2]. We also report on a recently-developed versatile erbium-doped fibre laser, in which conventional soliton, dispersion-managed soliton (stretched-pulse) and dissipative soliton mode-locking regimes can be selectively and reliably targeted by programming different group-velocity dispersion profiles and bandwidths on an in-cavity programmable filter [3]. Further, we report on our recent results on the passive mode locking of a Raman fibre laser by a recently predicted new type of parametric instability – the dissipative Faraday instability [4], where spatially periodic zig-zag modulation of spectrally dependent losses can lead to pattern formation in the temporal domain. High-order harmonic mode locking is achieved in a very simple experimental configuration, with the laser cavity including an optical fibre and two chirped fibre Bragg gratings, and no additional mode-locking elements. The results not only open up new possibilities for the design of mode-locked lasers, but extend beyond fibre optics to other fields of physics and engineering. References [1] S. Boscolo, C. Finot, H. Karakuzu, P. Petropoulos, “Pulse shaping in mode-locked fiber laser by in-cavity spectral filter,” Opt. Lett., vol. 39, pp. 438–441, 2014. [2] S. Boscolo, C. Finot, S. K. Turitsyn, “Bandwidth programmable optical Nyquist pulse generation in passively mode-locked fiber laser,” IEEE Photon. J., vol. 7, 7802008(8), 2015. [3] J. Peng, S. Boscolo, “Filter-based dispersion-managed versatile ultrafast fibre laser,” Sci. Rep., 2016, In press. [4] A. M. Perego, N. Tarasov, D. V. Churkin, S. K. Turitsyn, K. Staliunas, “Pattern generation by dissipative parametric instability,” Phys. Rev. Lett., vol. 116, 028701, 2016.
Resumo:
A költségvetési korlát megkeményítése nem egyforma mértékben ment végbe minden posztszocialista gazdaságban. Egyes országokban messzire jutottak ebben a tekintetben, másokban viszont alig változott az indulóállapot. A tanulmány áttekinti a költségvetési korlát puhaságának különböző megnyilvánulásait: az állami támogatásokat, a puha adózást, a nem teljesítő bankkölcsönöket, a vállalatközi tartozások felgyülemlését és a kifizetetlen béreket. A jelenséget sokféle tényező okozza, amelyek többnyire együttesen jelentkeznek. Az állami tulajdon fenntartása kedvez a puha költségvetési szindróma megrögződésének, a privatizálás elősegíti a keményítést, de nem elégséges feltétele a kemény korlát érvényesítésének. Ehhez megfelelő politikai, jogi és gazdasági környezetet kell céltudatosan kialakítani. A posztszocialista átmenet kezdetén sokan azt hitték, hogy a hatékony piacgazdaság létrehozásához elegendő lesz megvalósítani a liberalizáció, privatizáció és stabilizáció "szentháromságát". Mára már kiderült, hogy a költségvetési korlát megkeményítése az említett három feladattal egyenrangúan fontos. Ahol ez nem valósul meg (például Oroszország), ott a privatizáció nem hozza meg a várt eredményt. ___________________ The budget constraint has not hardened to equal degrees in the various post-socialist countries. In some of them, a great deal has been done in this respect, while in others there has been hardly any change from the initial state. This study surveys the typical manifestations of softness of the budget constraint, such as state subsidies, soft taxation, non-performing loans, the accumulation of trade arrears between firms, and the build-up of wage arrears. Softness of the budget constraint is caused by several factors that tend to act in combination. Thus retention of state ownership helps to preserve the soft budget-constraint syndrome, while privatization encourages the budget constraint to harden, although it does not form a sufficient condition for it to happen. Purposeful development of the requisite political, legal and economic conditions is also required. It was widely maintained at the outset of the post-socialist transition that the 'Holy Trinity' of liberalization, privatization and stabilization would suffice to produce an efficient market economy. Since then, it has become clear that hardening the budget constraint needs to be given equal priority with these. Otherwise, the effects of privatization will fall short of expectations, as they have in Russia, for example.
Resumo:
A kutatások eddig főképpen azt vizsgálták, hogyan jelenik meg a puha költségvetési korlát szindrómája a vállalati szférában és a hitelrendszerben. A jelen cikk a kórházi szektorra összpontosítja a figyelmet. Leírja az események öt főszereplőjének, a betegnek, az orvosnak, a kórházigazgatónak, a politikusnak és a kórház tulajdonosának motivációit és magatartásuk ellentmondásos jellegét. A motivációk magyarázzák, miért olyan erőteljes a túlköltési hajlam és a költségvetési korlát felpuhulásának tendenciája. A döntési és finanszírozási folyamatok minden szintjén felfelé hárítják a túlköltés és eladósodás terheit. A cikk kitér a különböző tulajdonformák (állami, nonprofit és forprofit nem állami tulajdonformák) és a puha költségvetési korlát szindrómájának kapcsolatára. Végül normatív szempontból vizsgálja a jelenséget: melyek a költségvetési korlát megkeményítésének kedvező és kedvezőtlen következményei, és hogyan tükröződnek a normatív dilemmák az események résztvevőinek tudatában. ___________ Researches so far have examined mainly how the soft budget constraint syndrome appears in the corporate sphere and the credit system. This article concentrates on the hospital sector. It describes the motivations and the contradictory behaviour of the five main types of participant in the events: patients, doctors, hospital managers, politicians, and hospital owners. The motivations explain why the propensity to overspend and the tendency to soften the budget constraint are so strong. The burdens of overspending and indebtedness are pushed upwards at every level of the decision-making and funding processes. The article considers the connection between the soft budget constraint syn-drome and the various forms of ownership (state ownership and the non-profit and for-profit forms of non-state ownership). Finally, the phenomenon is examined from the normative point of view: what are the favourable and unfavourable consequences of hardening the budget constraint and how these are reflected in the consciousness of the participants in the normative dilemmas and events.
Resumo:
The author’s ideas on the soft budget constraint (SBC) were first expressed in 1976. Much progress has been made in understanding the problem over the ensuing four decades. The study takes issue with those who confine the concept to the process of bailing out loss-making socialist firms. It shows how the syndrome can appear in various organizations and forms in many spheres of the economy and points to the various means available for financial rescue. Single bailouts do not as such generate the SBC syndrome. It develops where the SBC becomes built into expectations. Special heed is paid to features generated by the syndrome in rescuer and rescuee organizations. The study reports on the spread of the syndrome in various periods of the socialist and the capitalist system, in various sectors. The author expresses his views on normative questions and on therapies against the harmful effects. He deals first with actual practice, then places the theory of the SBC in the sphere of ideas and models, showing how it relates to other theoretical trends, including institutional and behavioural economics and theories of moral hazard and inconsistency in time. He shows how far the intellectual apparatus of the SBC has spread in theoretical literature and where it has reached in the process of “canonization” by the economics profession. Finally, he reviews the main research tasks ahead.
Resumo:
Public management reforms are usually underpinned by arguments that they will make the public administration system more effective and efficient. In practice, however, it is very hard to determine whether a given reform will improve the efficiency and effectiveness of the public administration system in the long run. Here, I shall examine how the concept of the soft budget constraint (SBC) introduced by János Kornai (Kornai 1979, 1986; Kornai, Maskin & Roland 2003) can be applied to this problem. In the following, I shall describe the Hungarian public administration reforms implemented by the Orbán government from 2010 onward and analyze its reforms, focusing on which measures harden and which ones soften the budget constraint of the actors of the Hungarian public administration system. In the literature of economics, there is some evidence-based knowledge on how to harden/soften the budget constraint, which improves/reduces the effectiveness and hence the efficiency of the given system. By using the concept of SBC, I also hope to shed some light on the rationale behind the Hungarian government’s introduction of such a contradictory reform package. Previously, the concept of SBC was utilized narrowly in public management studies, mostly in the field of fiscal federalism. My goal is to apply the concept to a broader area of public management studies. My conclusion is that the concept of SBC can significantly contribute to public management studies by deepening our knowledge on the reasons behind the success and failure of public administration reforms.
Resumo:
This paper introduces the theory of algorithm visualization and its education-related results obtained so far, then an algorithm visualization tool is going to be presented as an example, which we will finally evaluate. This article illustrates furthermore how algorithm visualization tools can be used by teachers and students during the teaching and learning process of programming, and equally evaluates teaching and learning methods. Two tools will be introduced: Jeliot and TRAKLA2.
Resumo:
The major barrier to practical optimization of pavement preservation programming has always been that for formulations where the identity of individual projects is preserved, the solution space grows exponentially with the problem size to an extent where it can become unmanageable by the traditional analytical optimization techniques within reasonable limit. This has been attributed to the problem of combinatorial explosion that is, exponential growth of the number of combinations. The relatively large number of constraints often presents in a real-life pavement preservation programming problems and the trade-off considerations required between preventive maintenance, rehabilitation and reconstruction, present yet another factor that contributes to the solution complexity. In this research study, a new integrated multi-year optimization procedure was developed to solve network level pavement preservation programming problems, through cost-effectiveness based evolutionary programming analysis, using the Shuffled Complex Evolution (SCE) algorithm.^ A case study problem was analyzed to illustrate the robustness and consistency of the SCE technique in solving network level pavement preservation problems. The output from this program is a list of maintenance and rehabilitation treatment (M&R) strategies for each identified segment of the network in each programming year, and the impact on the overall performance of the network, in terms of the performance levels of the recommended optimal M&R strategy. ^ The results show that the SCE is very efficient and consistent in the simultaneous consideration of the trade-off between various pavement preservation strategies, while preserving the identity of the individual network segments. The flexibility of the technique is also demonstrated, in the sense that, by suitably coding the problem parameters, it can be used to solve several forms of pavement management programming problems. It is recommended that for large networks, some sort of decomposition technique should be applied to aggregate sections, which exhibit similar performance characteristics into links, such that whatever M&R alternative is recommended for a link can be applied to all the sections connected to it. In this way the problem size, and hence the solution time, can be greatly reduced to a more manageable solution space. ^ The study concludes that the robust search characteristics of SCE are well suited for solving the combinatorial problems in long-term network level pavement M&R programming and provides a rich area for future research. ^
Resumo:
If we classify variables in a program into various security levels, then a secure information flow analysis aims to verify statically that information in a program can flow only in ways consistent with the specified security levels. One well-studied approach is to formulate the rules of the secure information flow analysis as a type system. A major trend of recent research focuses on how to accommodate various sophisticated modern language features. However, this approach often leads to overly complicated and restrictive type systems, making them unfit for practical use. Also, problems essential to practical use, such as type inference and error reporting, have received little attention. This dissertation identified and solved major theoretical and practical hurdles to the application of secure information flow. ^ We adopted a minimalist approach to designing our language to ensure a simple lenient type system. We started out with a small simple imperative language and only added features that we deemed most important for practical use. One language feature we addressed is arrays. Due to the various leaking channels associated with array operations, arrays have received complicated and restrictive typing rules in other secure languages. We presented a novel approach for lenient array operations, which lead to simple and lenient typing of arrays. ^ Type inference is necessary because usually a user is only concerned with the security types for input/output variables of a program and would like to have all types for auxiliary variables inferred automatically. We presented a type inference algorithm B and proved its soundness and completeness. Moreover, algorithm B stays close to the program and the type system and therefore facilitates informative error reporting that is generated in a cascading fashion. Algorithm B and error reporting have been implemented and tested. ^ Lastly, we presented a novel framework for developing applications that ensure user information privacy. In this framework, core computations are defined as code modules that involve input/output data from multiple parties. Incrementally, secure flow policies are refined based on feedback from the type checking/inference. Core computations only interact with code modules from involved parties through well-defined interfaces. All code modules are digitally signed to ensure their authenticity and integrity. ^