692 research outputs found

    Towards Intelligent Databases

    Get PDF
    This article is a presentation of the objectives and techniques of deductive databases. The deductive approach to databases aims at extending with intensional definitions other database paradigms that describe applications extensionaUy. We first show how constructive specifications can be expressed with deduction rules, and how normative conditions can be defined using integrity constraints. We outline the principles of bottom-up and top-down query answering procedures and present the techniques used for integrity checking. We then argue that it is often desirable to manage with a database system not only database applications, but also specifications of system components. We present such meta-level specifications and discuss their advantages over conventional approaches

    Shift-Symmetric Configurations in Two-Dimensional Cellular Automata: Irreversibility, Insolvability, and Enumeration

    Full text link
    The search for symmetry as an unusual yet profoundly appealing phenomenon, and the origin of regular, repeating configuration patterns have long been a central focus of complexity science and physics. To better grasp and understand symmetry of configurations in decentralized toroidal architectures, we employ group-theoretic methods, which allow us to identify and enumerate these inputs, and argue about irreversible system behaviors with undesired effects on many computational problems. The concept of so-called configuration shift-symmetry is applied to two-dimensional cellular automata as an ideal model of computation. Regardless of the transition function, the results show the universal insolvability of crucial distributed tasks, such as leader election, pattern recognition, hashing, and encryption. By using compact enumeration formulas and bounding the number of shift-symmetric configurations for a given lattice size, we efficiently calculate the probability of a configuration being shift-symmetric for a uniform or density-uniform distribution. Further, we devise an algorithm detecting the presence of shift-symmetry in a configuration. Given the resource constraints, the enumeration and probability formulas can directly help to lower the minimal expected error and provide recommendations for system's size and initialization. Besides cellular automata, the shift-symmetry analysis can be used to study the non-linear behavior in various synchronous rule-based systems that include inference engines, Boolean networks, neural networks, and systolic arrays.Comment: 22 pages, 9 figures, 2 appendice

    Logical and computational aspects of programming with sets/bags/lists

    Full text link

    A complementary view on the growth of directory trees

    Full text link
    Trees are a special sub-class of networks with unique properties, such as the level distribution which has often been overlooked. We analyse a general tree growth model proposed by Klemm {\em et. al.} (2005) to explain the growth of user-generated directory structures in computers. The model has a single parameter qq which interpolates between preferential attachment and random growth. Our analysis results in three contributions: First, we propose a more efficient estimation method for qq based on the degree distribution, which is one specific representation of the model. Next, we introduce the concept of a level distribution and analytically solve the model for this representation. This allows for an alternative and independent measure of qq. We argue that, to capture real growth processes, the qq estimations from the degree and the level distributions should coincide. Thus, we finally apply both representations to validate the model with synthetically generated tree structures, as well as with collected data of user directories. In the case of real directory structures, we show that qq measured from the level distribution are incompatible with qq measured from the degree distribution. In contrast to this, we find perfect agreement in the case of simulated data. Thus, we conclude that the model is an incomplete description of the growth of real directory structures as it fails to reproduce the level distribution. This insight can be generalised to point out the importance of the level distribution for modeling tree growth.Comment: 16 pages, 7 figure

    Case study on the efficacy of a lanthanum-enriched clay (Phoslock®) in controlling eutrophication in Lake Het Groene Eiland (The Netherlands)

    Get PDF
    Lake Het Groene Eiland was created in the beginning of 2008 by construction of dikes for isolating it from the surrounding 220-ha water body. This so-called claustrum of 5 ha was treated using lanthanum-modified clay (Phoslock®) to control eutrophication and mitigate cyanobacterial nuisance. Cyanobacteria chlorophyll-a were significantly lower in the claustrum than those in the reference water body, where a massive bloom developed in summer, 2008. However, PO4-P and TP did not statistically differ in these two waters. TN and NO3-N were significantly lower in the claustrum, where dense submerged macrophytes beds developed. Lanthanum concentrations were elevated after the applications of the modified clay in the claustrum, but filterable lanthanum dropped rapidly below the Dutch standard of 10.1 μg l−1. During winter, dozens of Canada geese resided at the claustrum. Geese droppings contained an average of 2 mg PO4-P g−1 dry weight and 12 mg NH3-N g−1 dry weight and might present a growing source of nutrients to the water. Constructing the claustrum enabled unrestricted bathing in subsequent three summers, as no swimming bans had to be issued due to cyanobacteria blooms. However, the role of the modified clay in this positive outcome remains unclear, and longevity of the measures questionable.

    Modeling views in the layered view model for XML using UML

    Get PDF
    In data engineering, view formalisms are used to provide flexibility to users and user applications by allowing them to extract and elaborate data from the stored data sources. Conversely, since the introduction of Extensible Markup Language (XML), it is fast emerging as the dominant standard for storing, describing, and interchanging data among various web and heterogeneous data sources. In combination with XML Schema, XML provides rich facilities for defining and constraining user-defined data semantics and properties, a feature that is unique to XML. In this context, it is interesting to investigate traditional database features, such as view models and view design techniques for XML. However, traditional view formalisms are strongly coupled to the data language and its syntax, thus it proves to be a difficult task to support views in the case of semi-structured data models. Therefore, in this paper we propose a Layered View Model (LVM) for XML with conceptual and schemata extensions. Here our work is three-fold; first we propose an approach to separate the implementation and conceptual aspects of the views that provides a clear separation of concerns, thus, allowing analysis and design of views to be separated from their implementation. Secondly, we define representations to express and construct these views at the conceptual level. Thirdly, we define a view transformation methodology for XML views in the LVM, which carries out automated transformation to a view schema and a view query expression in an appropriate query language. Also, to validate and apply the LVM concepts, methods and transformations developed, we propose a view-driven application development framework with the flexibility to develop web and database applications for XML, at varying levels of abstraction

    Telomere Length Shows No Association with BRCA1 and BRCA2 Mutation Status

    Get PDF
    This study aimed to determine whether telomere length (TL) is a marker of cancer risk or genetic status amongst two cohorts of BRCA1 and BRCA2 mutation carriers and controls. The first group was a prospective set of 665 male BRCA1/2 mutation carriers and controls (mean age 53 years), all healthy at time of enrolment and blood donation, 21 of whom have developed prostate cancer whilst on study. The second group consisted of 283 female BRCA1/2 mutation carriers and controls (mean age 48 years), half of whom had been diagnosed with breast cancer prior to enrolment. TL was quantified by qPCR from DNA extracted from peripheral blood lymphocytes. Weighted and unweighted Cox regressions and linear regression analyses were used to assess whether TL was associated with BRCA1/2 mutation status or cancer risk. We found no evidence for association between developing cancer or being a BRCA1 or BRCA2 mutation carrier and telomere length. It is the first study investigating TL in a cohort of genetically predisposed males and although TL and BRCA status was previously studied in females our results don't support the previous finding of association between hereditary breast cancer and shorter TL

    Models and metaphors: complexity theory and through-life management in the built environment

    Get PDF
    Complexity thinking may have both modelling and metaphorical applications in the through-life management of the built environment. These two distinct approaches are examined and compared. In the first instance, some of the sources of complexity in the design, construction and maintenance of the built environment are identified. The metaphorical use of complexity in management thinking and its application in the built environment are briefly examined. This is followed by an exploration of modelling techniques relevant to built environment concerns. Non-linear and complex mathematical techniques such as fuzzy logic, cellular automata and attractors, may be applicable to their analysis. Existing software tools are identified and examples of successful built environment applications of complexity modelling are given. Some issues that arise include the definition of phenomena in a mathematically usable way, the functionality of available software and the possibility of going beyond representational modelling. Further questions arising from the application of complexity thinking are discussed, including the possibilities for confusion that arise from the use of metaphor. The metaphor of a 'commentary machine' is suggested as a possible way forward and it is suggested that an appropriate linguistic analysis can in certain situations reduce perceived complexity
    corecore