113 research outputs found

    Circular Composites

    Get PDF
    Composites are increasingly used to optimize the performance of applications as their properties can be tuned to achieve the desired functionality. The sustainability advantages during the use phase are not yet matched by lower impacts in the lifecycle of composite materials and products. In a circular economy this is problematic. This book will serve as a guide to designers who want to contribute with innovative and effective solutions. Circular recovery strategies, ranging from reuse to restructuring and recycling, are connected to the design process and concrete design approaches. By providing clear design guidelines and illustrative examples in a structured way the information is readily accessible and applicable to designers

    Mixin Composition Synthesis based on Intersection Types

    Full text link
    We present a method for synthesizing compositions of mixins using type inhabitation in intersection types. First, recursively defined classes and mixins, which are functions over classes, are expressed as terms in a lambda calculus with records. Intersection types with records and record-merge are used to assign meaningful types to these terms without resorting to recursive types. Second, typed terms are translated to a repository of typed combinators. We show a relation between record types with record-merge and intersection types with constructors. This relation is used to prove soundness and partial completeness of the translation with respect to mixin composition synthesis. Furthermore, we demonstrate how a translated repository and goal type can be used as input to an existing framework for composition synthesis in bounded combinatory logic via type inhabitation. The computed result is a class typed by the goal type and generated by a mixin composition applied to an existing class

    Covariant Conversions (CoCo): A Design Pattern for Type-Safe Modular Software Evolution in Object-Oriented Systems

    Get PDF
    Software evolution is an essential challenge for all software engineers, typically addressed solely using code versioning systems and language-specific code analysis tools. Most versioning systems view the evolution of a system as a directed acyclic graph of steps, with independent branches that could be merged. What these systems fail to provide is the ability to ensure stable APIs or that each subsequent evolution represents a cohesive extension yielding a valid system. Modular software evolution ensures that APIs remain stable, which is achieved by ensuring that only additional methods, fields, and data types are added, while treating existing modules through blackbox interfaces. Even with these restrictions, it must be possible to add new variations, fields, and methods without extensive duplication of prior module code. In contrast to most literature, our focus is on ensuring modular software evolution using mainstream object-oriented programming languages, instead of resorting to novel language extensions. We present a novel CoCo design pattern that supports type-safe covariantly overridden convert methods to transform earlier data type instances into their newest evolutionary representation to access operations that had been added later. CoCo supports both binary methods and producer methods. We validate and contrast our approach using a well-known compiler construction case study that other researchers have also investigated for modular evolution. Our resulting implementation relies on less boilerplate code, is completely type-safe, and allows clients to use normal object-oriented calling conventions. We also compare CoCo with existing approaches to the Expression Problem. We conclude by discussing how CoCo could change the direction of currently proposed Java language extensions to support closed-world assumptions about data types, as borrowed from functional programming

    Plurilinguisme et insécurité linguistique en Algérie : Paroles de lycéen (ne)s à Bejaïa

    Get PDF
    Notre recherche est partie de l’hypothèse qu’il existe une relation privilégiée entre insécurité linguistique et plurilinguisme. De nombreuses études ont démontré que le sentiment d’insécurité linguistique est plus fréquent dans le milieu plurilingue que dans le milieu unilingue. C’est dans cet ordre d’idées que nous avons choisi de mener une enquête auprès de quelques lycéens de la ville de Bejaïa qui se sont prononcés sur un certain nombre de phénomènes linguistiques en produisant un discours épilinguistique. C’est l’analyse de ces productions épilinguistiques qui nous a permis de dégager les diverses valeurs positives ou négatives associées à leur (s) langue(s). Nous avons, dès lors, essayé d’inventorier les multiples manifestations d’insécurité linguistique, en l’occurrence, l’autodépréciation de sa propre langue, qui en est sans doute l’une de ses symptômes majeurs les plus représentatifs.This work is based on the hypothesis that there is a relationship between multilingualism and linguistic insecurity. Numerous studies have shown that linguistic insecurity is more frequent in multilingual milieu rather than the unilingual environments. In this range, we have chosen to conduct a survey on some high school students from Bejaïa a city in Algeria. They have been asked to answer some questions that are related to a number of linguistic phenomena occurring in the speech epilinguistics. Throughout this analysis, we have identified various positive and negative attitudes associated with their language. We have therefore tried to list the multiple manifestations of linguistic insecurity, namely, the self-deprecation of their own language, which is undoubtedly one of the major symptoms of linguistic insecurity

    Insécurité linguistique en contexte minoritaire algérien : enquête sociolinguistique auprès des locuteurs de Tasahlit

    Get PDF
    Notre contribution fait état des résultats d’une enquête sociolinguistique sur la variété du kabyle parlée dans les régions de la Kabylie maritime, ou ce que l’on appelle communément « Le Sahel ». Elle se donne pour objectif de réfléchir au phénomène d’insécurité linguistique et d’examiner, grâce à l’étude des représentations linguistiques, ses diverses manifestations chez des locuteurs de tasahlit.The study reports the results of a sociolinguistic survey on the variety of Kabylian spoken in the regions of Kabylia Maritime or what is commonly called "The Sahel". Then we aim to analyze the phenomenon of linguistic insecurity through the study of linguistic representations, its various manifestations among tasahlit speakers

    Gestion optimale de l'allocation des ressources pour l'execution des processus dans le cadre du Cloud

    Get PDF
    Despite the many proven benefits of using resources deployed in the cloud, it still faces many problemsthat can compromise its commercial success. Among theses problems, we can mention the lack of methodsallowing users to choose the best available resources. Thus the development of new methods for optimalresources management is necessary. The aim of this PhD thesis is based on this topic by the development of methods to optimize the useof resources in the Cloud context. To achieve this goal, our approach is driven by three complementary aspects taking into account conflicting quality of service criteria. For the first aspect, we have proposed a set of resources allocation and tasks scheduling strategies for a scientific process consisting of automated tasks. For the second aspect, we have proposed an extension of these strategies to take into account the fact that some tasks require the human resource(s) intervention. For the third aspect, optimization methods in order to allow a fair access to the shared resources bya set of business process instances are proposedBien que les nombreux avantages d’utiliser des ressources hébergées dans le Cloud soient avérés, celui-ci reste confronté à de nombreux problèmes qui peuvent compromettre son succès commercial. Parmi ceux-ci, on peut citer le manque d’aide aux utilisateurs pour leur permettre de choisir au mieux les ressources disponibles. Il est donc indispensable de développer des méthodes nouvelles pour une gestion optimale des ressources dans le Cloud.Cette thèse se situe dans le cadre de développement de méthodes d’optimisation d’utilisation des ressources pour l’exécution des processus dans le cadre Cloud. Nous avons abordé ce sujet sous trois aspects complémentaires prenant en compte des critères de qualité de service conflictuels.Pour le premier aspect, nous avons proposé un ensemble de stratégies d’allocation de ressources et d’ordonnancement de tâches d’un processus scientifique dont les tâches sont supposées automatisées. Pour le deuxième aspect, nous avons proposé une extension des premières stratégies pour prendre en compte le fait que certaines tâches nécessitent l’intervention d’une(des) ressource(s) humaine(s) pours’accomplir. Pour le troisième aspect, des méthodes d’optimisation afin d’assurer un accès équitable à des ressources,partagées par un ensemble d’instances d’un même processus métier, ont été proposée

    Influence of gallic and tannic acids on enzymatic activity and growth of Pectobacterium chrysanthemi (Dickeya chrysanthemi bv. chrysanthemi)

    Get PDF
    The effect of phenolic acids (gallic and tannic acids) on growth of Pectobacterium chrysanhemi, and its protease and pectate lyase activities was tested. The results obtained showed a significant inhibitingeffect of the tannic and gallic acids on the growth of this strain. The growth rate decreases in the presence of 400 g/ml for gallic acid and 100 ìg/ml fortannic acid. The enzymatic activity retardationwas observed with the two phenolic compounds as well but the rate of inhibition varied from one compound to another. The highest antimicrobial potentials and the highest effect on enzymatic activities were observed with the tannic acid at 200 g/ml, which inhibited 91% of the tested microorganisms, and 88% of pectate lyase activity
    • …
    corecore