448 research outputs found
On the complexity of solving ordinary differential equations in terms of Puiseux series
We prove that the binary complexity of solving ordinary polynomial
differential equations in terms of Puiseux series is single exponential in the
number of terms in the series. Such a bound was given by Grigoriev [10] for
Riccatti differential polynomials associated to ordinary linear differential
operators. In this paper, we get the same bound for arbitrary differential
polynomials. The algorithm is based on a differential version of the
Newton-Puiseux procedure for algebraic equations
On formal methods for certifying floating-point C programs
This paper presents an implementation of an extension of the ACSL specication language in the Frama-C tool in order to prove the correctness of floating-point C programs. A first model checks that there is no over flow, i.e., proof obligations are generated by the Why tool to prove that the result of a fl oating-point operation is not greater than the maximal fl oat allowed in the given type, this model is called the Strict model. A second model, called the Full model, extends the Strict model. The Full model allows over flows and deals with special values: signed infinities, NaNs (Not-a-Number) and signed zeros as in the IEEE-754 Standard. The verification conditions generated by Why are (partially) proved by automatic theorem provers: Alt-Ergo, Simplify, Yices, Z3, CVC3 and Gappa or discharged in the interactive proof assistant Coq [20] using two existing Coq formalization of fl oating-point arithmetic. When the Why proof obligations are written in the syntax of the Gappa library, we can use the gappa and interval tactics to achieve the proof. Several examples of fl oating-point C programs are presented in the paper to prove the efficiency of this implementation
Stress-strain characteristics of rockfill, and of clays under high pore water tension
Imperial Users onl
WeDRisk :an approach to managing web and distributed software development risks
PhD ThesisWeb and distributed software developments are risky and face speci c challenges
like time zone and cultural di erences. These challenges have resulted in new
risks and risk management needs. In this thesis, a systematic review of existing
software risk management approaches was conducted to investigate their ability
to satisfy the risk management needs of web and distributed developments. The
review identi es a number of weaknesses in existing approaches. Examples are
the lack of consideration for web and distributed factors and lack of preparation
for atypical risks. A new approach called WeDRisk is introduced to manage the
risks from project, process and product perspectives. The WeDRisk approach
addresses the weaknesses of existing approaches to risk management, which are
less able to deal with the speci c challenges of web and distributed develop-
ment. A key part of the approach is
exibility to deal with the rapid evolution
which is typical of such developments. This
exibility is achieved by customiz-
ing the risk management and providing a method for coping with atypical risks.
WeDRisk also provides an improved risk estimation equation to consider web and
distributed factors. The novel aspects of the WeDRisk approach were subjected
to a series of evaluation cycles, including peer review, two controlled experiments,
expert evaluation and a case study. In addition to a number of improvement sug-
gestions, the evaluation results illustrate how WeDRisk is useful, understandable,
exible, easy to use, and able to satisfy many web and distributed development
risk management needs.Industrial Research Centre and Libyan government-Higher Ed-
ucation for the scholarship
Empirical Equations for Analysis of Two-Way Reinforced Concrete Slabs
There are many different methods for analysis of two-way reinforced concrete slabs. The most efficient methods depend on using certain factors given in different codes of reinforced concrete design. The other ways of analysis of two-way slabs are the direct design method and the equivalent frame method. But these methods usually need a long time for analysis of the slabs.In this paper, a new simple method has been developed to analyze the two-way slabs by using simple empirical formulae, and the results of final analysis of some examples have been compared with other different methods given in different codes of practice.The comparison proof that this simple proposed method gives good results and it can be used in analysis of two-way slabs instead of other methods
A Practical Evaluation of English for Iraq: Pupil's Book (4th Primary): Designing and Planning
In 2016, the Directorate of Curriculum and Methodology in the Ministry of Education in Iraq altered the old English textbook allocated for the forth-primary class with a new textbook called English for Iraq: Pupil's Book. After implementing this new textbook, the teachers, who are teaching this material, addressed a set of criticisms stating that the design and structure of this book does not fit the comprehensive levels of the pupils. As teachers emphasized that they encountered difficulties in teaching this material because they should have joined an intensive session for how to teach the new textbook before teaching it in the schools. Investigating the opinions of the teachers about the contents of the book, they believe that the grammatical topics apportioned for the forth grade are beyond the pupils' grasp where the writers set down rules of comparative and superlative degrees which pupils cannot perceive and should be given for the high school classes. Consequently, the teachers are obliged to choose simple and recognized topics and leave the topics – especially grammatical ones which confuse their minds if they are given to them. Thus, the initiative evaluation shows that the textbook contains difficult modules as it lacks practicing the four skills of the English language, in addition to the insufficiency of using the illustrative aids in the classroom.Keywords: Evaluation, Designing, Structure, Weaknesses, Planning.
Influence of Wireless Novel Routing Protocol by Using MDPC Algorithm
This research study investigates the influence of a novel wireless routing protocol that incorporates the MDPC (Multiplicative-Divisive Probabilistic Congestion Control) algorithm. The background of the research stems from the increasing demand for efficient and reliable routing protocols in wireless networks, which face challenges such as limited bandwidth, variable network topologies, and dynamic environmental conditions. The purpose of this study is to evaluate the performance of the proposed routing protocol and assess its effectiveness in addressing these challenges. To achieve this objective, a series of methodologies were employed. First, an in-depth analysis of existing routing protocols was conducted to identify their limitations and areas for improvement. The simulations were conducted in controlled environments, and real-world deployment scenarios may introduce additional challenges that need to be addressed. Furthermore, practical implications of implementing the protocol, such as hardware and software compatibility, scalability, and security considerations, should be thoroughly investigated before widespread adoption
Comparison between Feature Based and Deep Learning Recognition Systems for Handwriting Arabic Numbers
Feature extraction from images is an essential part of the recognition system. Calculating the appropriate features is critical to the part of the classification process. However, there are no standard features nor a widely accepted feature set exist applied to all applications, features must be application dependent. In contrast, deep learning extract features from an image without need for human hard-coding the features extraction process. This can be very useful to build a model for classification which can classify any type of images after trained with enough images with labels then the trained model can be used in different recognition applications to classify. This paper presents two techniques to build recognition system for Arabic handwriting numbers, the feature-based method shows accepted results. However, the deep learning method gives more accurate results and required less study on how Arabic number is written and no hand-coding algorithms needed for feature extraction to be used in the classification process. Keywords: Handwriting Recognition, Image Processing, Features Extraction, Machine Learning, Deep Learning, Classification
- …