7,399 research outputs found

    Evaluating the role of quantitative modeling in language evolution

    No full text
    Models are a flourishing and indispensable area of research in language evolution. Here we highlight critical issues in using and interpreting models, and suggest viable approaches. First, contrasting models can explain the same data and similar modelling techniques can lead to diverging conclusions. This should act as a reminder to use the extreme malleability of modelling parsimoniously when interpreting results. Second, quantitative techniques similar to those used in modelling language evolution have proven themselves inadequate in other disciplines. Cross-disciplinary fertilization is crucial to avoid mistakes which have previously occurred in other areas. Finally, experimental validation is necessary both to sharpen models' hypotheses, and to support their conclusions. Our belief is that models should be interpreted as quantitative demonstrations of logical possibilities, rather than as direct sources of evidence. Only an integration of theoretical principles, quantitative proofs and empirical validation can allow research in the evolution of language to progress

    Computational experience with a three-dimensional rotary engine combustion model

    Get PDF
    A new computer code was developed to analyze the chemically reactive flow and spray combustion processes occurring inside a stratified-charge rotary engine. Mathematical and numerical details of the new code were recently described by the present authors. The results are presented of limited, initial computational trials as a first step in a long-term assessment/validation process. The engine configuration studied was chosen to approximate existing rotary engine flow visualization and hot firing test rigs. Typical results include: (1) pressure and temperature histories, (2) torque generated by the nonuniform pressure distribution within the chamber, (3) energy release rates, and (4) various flow-related phenomena. These are discussed and compared with other predictions reported in the literature. The adequacy or need for improvement in the spray/combustion models and the need for incorporating an appropriate turbulence model are also discussed

    Security Policy Specification Using a Graphical Approach

    Full text link
    A security policy states the acceptable actions of an information system, as the actions bear on security. There is a pressing need for organizations to declare their security policies, even informal statements would be better than the current practice. But, formal policy statements are preferable to support (1) reasoning about policies, e.g., for consistency and completeness, (2) automated enforcement of the policy, e.g., using wrappers around legacy systems or after the fact with an intrusion detection system, and (3) other formal manipulation of policies, e.g., the composition of policies. We present LaSCO, the Language for Security Constraints on Objects, in which a policy consists of two parts: the domain (assumptions about the system) and the requirement (what is allowed assuming the domain is satisfied). Thus policies defined in LaSCO have the appearance of conditional access control statements. LaSCO policies are specified as expressions in logic and as directed graphs, giving a visual view of policy. LaSCO has a simple semantics in first order logic (which we provide), thus permitting policies we write, even for complex policies, to be very perspicuous. LaSCO has syntax to express many of the situations we have found to be useful on policies or, more interesting, the composition of policies. LaSCO has an object-oriented structure, permitting it to be useful to describe policies on the objects and methods of an application written in an object-oriented language, in addition to the traditional policies on operating system objects. A LaSCO specification can be automatically translated into executable code that checks an invocation of a program with respect to a policy. The implementation of LaSCO is in Java, and generates wrappers to check Java programs with respect to a policy.Comment: 28 pages, 22 figures, in color (but color is not essential for viewing); UC Davis CS department technical report (July 22, 1998

    Analysis of rotary engine combustion processes based on unsteady, three-dimensional computations

    Get PDF
    A new computer code was developed for predicting the turbulent, and chemically reacting flows with sprays occurring inside of a stratified charge rotary engine. The solution procedure is based on an Eulerian Lagrangian approach where the unsteady, 3-D Navier-Stokes equations for a perfect gas mixture with variable properties are solved in generalized, Eulerian coordinates on a moving grid by making use of an implicit finite volume, Steger-Warming flux vector splitting scheme, and the liquid phase equations are solved in Lagrangian coordinates. Both the details of the numerical algorithm and the finite difference predictions of the combustor flow field during the opening of exhaust and/or intake, and also during fuel vaporization and combustion, are presented

    Fish and Fisheries of Gulf of Mannar

    Get PDF
    Several species of fish inhabiting the pelagic zone contribute to the fishery in the Gulf of Mannar. The major groups are sardines, anchovies, mackerel, carangids, tunas and seerfishes. Majority of them are caught by giIlnet, drift gillnets, drift nets and hook and line. The anchovies are caught both by trawl net and shore sein

    Effectiveness of lending for vocational education and training: lessons from World Bank experience

    Get PDF
    This paper reviews the Bank involvement in the vocational education and training (VET) sub-sector in the 1990s. The paper aims to do just that, by mainly seeking answers to the following questions: 1) How has the Bank performed in its lending services to its clients in VET? 2) How have VET projects performed in terms of meeting stated objectives? 3) What factors led to the success, or failure of Bank operations? Based on what has been learned, the paper provides suggestions about how the performance of future VET interventions can be improved. This review concerns itself primarily with implementation performance, and proposes measures to improve project outcomes.ICT Policy and Strategies,Health Economics&Finance,Health Monitoring&Evaluation,Teaching and Learning,Banks&Banking Reform

    New Recursion Relations and a Flat Space Limit for AdS/CFT Correlators

    Full text link
    We consider correlation functions of the stress-tensor or a conserved current in AdS_{d+1}/CFT_d computed using the Hilbert or the Yang-Mills action in the bulk. We introduce new recursion relations to compute these correlators at tree level. These relations have an advantage over the BCFW-like relations described in arXiv:1102.4724 and arXiv:1011.0780 because they can be used in all dimensions including d=3. We also introduce a new method of extracting flat-space S-matrix elements from AdS/CFT correlators in momentum space. We show that the (d+1)-dimensional flat-space amplitude of gravitons or gluons can be obtained as the coefficient of a particular singularity of the d-dimensional correlator of the stress-tensor or a conserved current; this technique is valid even at loop-level in the bulk. Finally, we show that our recursion relations automatically generate correlators that are consistent with this observation: they have the expected singularity and the flat-space gluon or graviton amplitude appears as its coefficient.Comment: 22+6 pages (v2) typos fixe
    corecore