448 research outputs found

    On the complexity of solving ordinary differential equations in terms of Puiseux series

    Full text link
    We prove that the binary complexity of solving ordinary polynomial differential equations in terms of Puiseux series is single exponential in the number of terms in the series. Such a bound was given by Grigoriev [10] for Riccatti differential polynomials associated to ordinary linear differential operators. In this paper, we get the same bound for arbitrary differential polynomials. The algorithm is based on a differential version of the Newton-Puiseux procedure for algebraic equations

    On formal methods for certifying floating-point C programs

    Get PDF
    This paper presents an implementation of an extension of the ACSL specication language in the Frama-C tool in order to prove the correctness of floating-point C programs. A first model checks that there is no over flow, i.e., proof obligations are generated by the Why tool to prove that the result of a fl oating-point operation is not greater than the maximal fl oat allowed in the given type, this model is called the Strict model. A second model, called the Full model, extends the Strict model. The Full model allows over flows and deals with special values: signed infinities, NaNs (Not-a-Number) and signed zeros as in the IEEE-754 Standard. The verification conditions generated by Why are (partially) proved by automatic theorem provers: Alt-Ergo, Simplify, Yices, Z3, CVC3 and Gappa or discharged in the interactive proof assistant Coq [20] using two existing Coq formalization of fl oating-point arithmetic. When the Why proof obligations are written in the syntax of the Gappa library, we can use the gappa and interval tactics to achieve the proof. Several examples of fl oating-point C programs are presented in the paper to prove the efficiency of this implementation

    Stress-strain characteristics of rockfill, and of clays under high pore water tension

    Get PDF
    Imperial Users onl

    WeDRisk :an approach to managing web and distributed software development risks

    Get PDF
    PhD ThesisWeb and distributed software developments are risky and face speci c challenges like time zone and cultural di erences. These challenges have resulted in new risks and risk management needs. In this thesis, a systematic review of existing software risk management approaches was conducted to investigate their ability to satisfy the risk management needs of web and distributed developments. The review identi es a number of weaknesses in existing approaches. Examples are the lack of consideration for web and distributed factors and lack of preparation for atypical risks. A new approach called WeDRisk is introduced to manage the risks from project, process and product perspectives. The WeDRisk approach addresses the weaknesses of existing approaches to risk management, which are less able to deal with the speci c challenges of web and distributed develop- ment. A key part of the approach is exibility to deal with the rapid evolution which is typical of such developments. This exibility is achieved by customiz- ing the risk management and providing a method for coping with atypical risks. WeDRisk also provides an improved risk estimation equation to consider web and distributed factors. The novel aspects of the WeDRisk approach were subjected to a series of evaluation cycles, including peer review, two controlled experiments, expert evaluation and a case study. In addition to a number of improvement sug- gestions, the evaluation results illustrate how WeDRisk is useful, understandable, exible, easy to use, and able to satisfy many web and distributed development risk management needs.Industrial Research Centre and Libyan government-Higher Ed- ucation for the scholarship

    Empirical Equations for Analysis of Two-Way Reinforced Concrete Slabs

    Get PDF
    There are many different methods for analysis of two-way reinforced concrete slabs. The most efficient methods depend on using certain factors given in different codes of reinforced concrete design. The other ways of analysis of two-way slabs are the direct design method and the equivalent frame method. But these methods usually need a long time for analysis of the slabs.In this paper, a new simple method has been developed to analyze the two-way slabs by using simple empirical formulae, and the results of final analysis of some examples have been compared with other different methods given in different codes of practice.The comparison proof that this simple proposed method gives good results and it can be used in analysis of two-way slabs instead of other methods

    A Practical Evaluation of English for Iraq: Pupil's Book (4th Primary): Designing and Planning

    Get PDF
    In 2016, the Directorate of Curriculum and Methodology in the Ministry of Education in Iraq altered the old English textbook allocated for the forth-primary class with a new textbook called English for Iraq: Pupil's Book. After implementing this new textbook, the teachers, who are teaching this material, addressed a set of criticisms stating that the design and structure of this book does not fit the comprehensive levels of the pupils. As teachers emphasized that they encountered difficulties in teaching this material because they should have joined an intensive session for how to teach the new textbook before teaching it in the schools. Investigating the opinions of the teachers about the contents of the book, they believe that the grammatical topics apportioned for the forth grade are beyond the pupils' grasp where the writers set down rules of comparative and superlative degrees which pupils cannot perceive and should be given for the high school classes. Consequently, the teachers are obliged to choose simple and recognized topics and leave the topics – especially grammatical ones which confuse their minds if they are given to them. Thus, the initiative evaluation shows that the textbook contains difficult modules as it lacks practicing the four skills of the English language, in addition to the insufficiency of using the illustrative aids in the classroom.Keywords:  Evaluation, Designing, Structure, Weaknesses, Planning.

    Influence of Wireless Novel Routing Protocol by Using MDPC Algorithm

    Get PDF
    This research study investigates the influence of a novel wireless routing protocol that incorporates the MDPC (Multiplicative-Divisive Probabilistic Congestion Control) algorithm. The background of the research stems from the increasing demand for efficient and reliable routing protocols in wireless networks, which face challenges such as limited bandwidth, variable network topologies, and dynamic environmental conditions. The purpose of this study is to evaluate the performance of the proposed routing protocol and assess its effectiveness in addressing these challenges. To achieve this objective, a series of methodologies were employed. First, an in-depth analysis of existing routing protocols was conducted to identify their limitations and areas for improvement. The simulations were conducted in controlled environments, and real-world deployment scenarios may introduce additional challenges that need to be addressed. Furthermore, practical implications of implementing the protocol, such as hardware and software compatibility, scalability, and security considerations, should be thoroughly investigated before widespread adoption

    Comparison between Feature Based and Deep Learning Recognition Systems for Handwriting Arabic Numbers

    Get PDF
    Feature extraction from images is an essential part of the recognition system. Calculating the appropriate features is critical to the part of the classification process. However, there are no standard features nor a widely accepted feature set exist applied to all applications, features must be application dependent. In contrast, deep learning extract features from an image without need for human hard-coding the features extraction process. This can be very useful to build a model for classification which can classify any type of images after trained with enough images with labels then the trained model can be used in different recognition applications to classify. This paper presents two techniques to build recognition system for Arabic handwriting numbers, the feature-based method shows accepted results. However, the deep learning method gives more accurate results and required less study on how Arabic number is written and no hand-coding algorithms needed for feature extraction to be used in the classification process. Keywords: Handwriting Recognition, Image Processing, Features Extraction, Machine Learning, Deep Learning, Classification
    • …
    corecore