552 research outputs found
Plastic buckling of a rectangular plate under edge thrusts
The fundamental equations for the plastic buckling of a rectangular plate under edge thrusts are developed on the basis of a new set of stress-strain relations for the behavior of a metal in the plastic range. These relations are derived for buckling from a state of uniform compression. The fundamental equation for the buckling of a simply compressed plate together with typical boundary conditions is then developed and the results are applied to calculating the buckling loads of a thin strip, a simply supported plate, and a cruciform section. Comparisons with the theories of Timoshenko and Ilyushin are made. Finally, an energy method is given which can be used for finding approximate values of the critical load
Maximal quadratic modules on *-rings
We generalize the notion of and results on maximal proper quadratic modules
from commutative unital rings to -rings and discuss the relation of this
generalization to recent developments in noncommutative real algebraic
geometry. The simplest example of a maximal proper quadratic module is the cone
of all positive semidefinite complex matrices of a fixed dimension. We show
that the support of a maximal proper quadratic module is the symmetric part of
a prime -ideal, that every maximal proper quadratic module in a
Noetherian -ring comes from a maximal proper quadratic module in a simple
artinian ring with involution and that maximal proper quadratic modules satisfy
an intersection theorem. As an application we obtain the following extension of
Schm\" udgen's Strict Positivstellensatz for the Weyl algebra: Let be an
element of the Weyl algebra which is not negative semidefinite
in the Schr\" odinger representation. It is shown that under some conditions
there exists an integer and elements such
that is a finite sum of hermitian squares. This
result is not a proper generalization however because we don't have the bound
.Comment: 11 page
Multicentre observational study of adherence to Sepsis Six guidelines in emergency general surgery
Background
Evidence-based interventions may reduce mortality in surgical patients. This study documented the prevalence of sepsis, adherence to guidelines in its management, and timing of source control in general surgical patients presenting as an emergency.
Methods
Patients aged 16 years or more presenting with emergency general surgery problems were identified over a 7-day period and then screened for sepsis compliance (using the Sepsis Six standards, devised for severe sepsis) and the timing of source control (whether radiological or surgical). Exploratory analyses examined associations between the mode (emergency department or general practitioner) and time of admission, adherence to the sepsis guidelines, and outcomes (complications or death within 30 days).
Results
Of a total of 5067 patients from 97 hospitals across the UK, 911 (18·0 per cent) fulfilled the criteria for sepsis, 165 (3·3 per cent) for severe sepsis and 24 (0·5 per cent) for septic shock. Timely delivery of all Sepsis Six guidelines for patients with severe sepsis was achieved in four patients. For patients with severe sepsis, 17·6–94·5 per cent of individual guidelines within the Sepsis Six were delivered. Oxygen was the criterion most likely to be missed, followed by blood cultures in all sepsis severity categories. Surgery for source control occurred a median of 19·8 (i.q.r. 10·0–35·4) h after diagnosis. Omission of Sepsis Six parameters did not appear to be associated with an increase in morbidity or mortality.
Conclusion
Although sepsis was common in general surgical patients presenting as an emergency, adherence to severe sepsis guidelines was incomplete in the majority. Despite this, no evidence of harm was apparent
A Survey of Satisfiability Modulo Theory
Satisfiability modulo theory (SMT) consists in testing the satisfiability of
first-order formulas over linear integer or real arithmetic, or other theories.
In this survey, we explain the combination of propositional satisfiability and
decision procedures for conjunctions known as DPLL(T), and the alternative
"natural domain" approaches. We also cover quantifiers, Craig interpolants,
polynomial arithmetic, and how SMT solvers are used in automated software
analysis.Comment: Computer Algebra in Scientific Computing, Sep 2016, Bucharest,
Romania. 201
Planning and Leveraging Event Portfolios: Towards a Holistic Theory
This conceptual paper seeks to advance the discourse on the leveraging and legacies of events by examining the planning, management, and leveraging of event portfolios. This examination shifts the common focus from analyzing single events towards multiple events and purposes that can enable cross-leveraging among different events in pursuit of attainment and magnification of specific ends. The following frameworks are proposed: (1) event portfolio planning and leveraging, and (2) analyzing events networks and inter-organizational linkages. These frameworks are intended to provide, at this infancy stage of event portfolios research, a solid ground for building theory on the management of different types and scales of events within the context of a portfolio aimed to obtain, optimize and sustain tourism, as well as broader community benefits
Possible effect of medically administered antibiotics on the mutans streptococci: implications for reduction in decay
Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/74585/1/j.1399-302X.1989.tb00103.x.pd
LNCS
We address the problem of analyzing the reachable set of a polynomial nonlinear continuous system by over-approximating the flowpipe of its dynamics. The common approach to tackle this problem is to perform a numerical integration over a given time horizon based on Taylor expansion and interval arithmetic. However, this method results to be very conservative when there is a large difference in speed between trajectories as time progresses. In this paper, we propose to use combinations of barrier functions, which we call piecewise barrier tube (PBT), to over-approximate flowpipe. The basic idea of PBT is that for each segment of a flowpipe, a coarse box which is big enough to contain the segment is constructed using sampled simulation and then in the box we compute by linear programming a set of barrier functions (called barrier tube or BT for short) which work together to form a tube surrounding the flowpipe. The benefit of using PBT is that (1) BT is independent of time and hence can avoid being stretched and deformed by time; and (2) a small number of BTs can form a tight over-approximation for the flowpipe, which means that the computation required to decide whether the BTs intersect the unsafe set can be reduced significantly. We implemented a prototype called PBTS in C++. Experiments on some benchmark systems show that our approach is effective
- …