ERIC Educational Resources Information Center
Ko, Yi-Yin; Knuth, Eric
2009-01-01
In advanced mathematical thinking, proving and refuting are crucial abilities to demonstrate whether and why a proposition is true or false. Learning proofs and counterexamples within the domain of continuous functions is important because students encounter continuous functions in many mathematics courses. Recently, a growing number of studies…
NASA Astrophysics Data System (ADS)
De Raedt, Hans; Michielsen, Kristel; Hess, Karl
2016-12-01
Using Einstein-Podolsky-Rosen-Bohm experiments as an example, we demonstrate that the combination of a digital computer and algorithms, as a metaphor for a perfect laboratory experiment, provides solutions to problems of the foundations of physics. Employing discrete-event simulation, we present a counterexample to John Bell's remarkable "proof" that any theory of physics, which is both Einstein-local and "realistic" (counterfactually definite), results in a strong upper bound to the correlations that are being measured in Einstein-Podolsky-Rosen-Bohm experiments. Our counterexample, which is free of the so-called detection-, coincidence-, memory-, and contextuality loophole, violates this upper bound and fully agrees with the predictions of quantum theory for Einstein-Podolsky-Rosen-Bohm experiments.
Meaningful Intuitions: The Evidential Role of Intuitions in the Study of Language
ERIC Educational Resources Information Center
Maynes, Jeffrey
2012-01-01
Philosophical theories are often repudiated, or taken to be repudiated, by identifying counter-examples. These counter-examples are typically based upon our natural response to a real or hypothetical scenario, also called our intuition about the scenario. This methodology of appealing to intuition has been the focus of recent debates about…
NASA Astrophysics Data System (ADS)
Brenner, Howard
2011-10-01
Linear irreversible thermodynamic principles are used to demonstrate, by counterexample, the existence of a fundamental incompleteness in the basic pre-constitutive mass, momentum, and energy equations governing fluid mechanics and transport phenomena in continua. The demonstration is effected by addressing the elementary case of steady-state heat conduction (and transport processes in general) occurring in quiescent fluids. The counterexample questions the universal assumption of equality of the four physically different velocities entering into the basic pre-constitutive mass, momentum, and energy conservation equations. Explicitly, it is argued that such equality is an implicit constitutive assumption rather than an established empirical fact of unquestioned authority. Such equality, if indeed true, would require formal proof of its validity, currently absent from the literature. In fact, our counterexample shows the assumption of equality to be false. As the current set of pre-constitutive conservation equations appearing in textbooks are regarded as applicable both to continua and noncontinua (e.g., rarefied gases), our elementary counterexample negating belief in the equality of all four velocities impacts on all aspects of fluid mechanics and transport processes, continua and noncontinua alike.
Sufficient conditions for uniqueness of the weak value
NASA Astrophysics Data System (ADS)
Dressel, J.; Jordan, A. N.
2012-01-01
We review and clarify the sufficient conditions for uniquely defining the generalized weak value as the weak limit of a conditioned average using the contextual values formalism introduced in Dressel, Agarwal and Jordan (2010 Phys. Rev. Lett. 104 240401). We also respond to criticism of our work by Parrott (arXiv:1105.4188v1) concerning a proposed counter-example to the uniqueness of the definition of the generalized weak value. The counter-example does not satisfy our prescription in the case of an underspecified measurement context. We show that when the contextual values formalism is properly applied to this example, a natural interpretation of the measurement emerges and the unique definition in the weak limit holds. We also prove a theorem regarding the uniqueness of the definition under our sufficient conditions for the general case. Finally, a second proposed counter-example by Parrott (arXiv:1105.4188v6) is shown not to satisfy the sufficiency conditions for the provided theorem.
Proving Stabilization of Biological Systems
NASA Astrophysics Data System (ADS)
Cook, Byron; Fisher, Jasmin; Krepska, Elzbieta; Piterman, Nir
We describe an efficient procedure for proving stabilization of biological systems modeled as qualitative networks or genetic regulatory networks. For scalability, our procedure uses modular proof techniques, where state-space exploration is applied only locally to small pieces of the system rather than the entire system as a whole. Our procedure exploits the observation that, in practice, the form of modular proofs can be restricted to a very limited set. For completeness, our technique falls back on a non-compositional counterexample search. Using our new procedure, we have solved a number of challenging published examples, including: a 3-D model of the mammalian epidermis; a model of metabolic networks operating in type-2 diabetes; a model of fate determination of vulval precursor cells in the C. elegans worm; and a model of pair-rule regulation during segmentation in the Drosophila embryo. Our results show many orders of magnitude speedup in cases where previous stabilization proving techniques were known to succeed, and new results in cases where tools had previously failed.
Finding Feasible Abstract Counter-Examples
NASA Technical Reports Server (NTRS)
Pasareanu, Corina S.; Dwyer, Matthew B.; Visser, Willem; Clancy, Daniel (Technical Monitor)
2002-01-01
A strength of model checking is its ability to automate the detection of subtle system errors and produce traces that exhibit those errors. Given the high computational cost of model checking most researchers advocate the use of aggressive property-preserving abstractions. Unfortunately, the more aggressively a system is abstracted the more infeasible behavior it will have. Thus, while abstraction enables efficient model checking it also threatens the usefulness of model checking as a defect detection tool, since it may be difficult to determine whether a counter-example is feasible and hence worth developer time to analyze. We have explored several strategies for addressing this problem by extending an explicit-state model checker, Java PathFinder (JPF), to search for and analyze counter-examples in the presence of abstractions. We demonstrate that these techniques effectively preserve the defect detection ability of model checking in the presence of aggressive abstraction by applying them to check properties of several abstracted multi-threaded Java programs. These new capabilities are not specific to JPF and can be easily adapted to other model checking frameworks; we describe how this was done for the Bandera toolset.
Comments on the "Byzantine Self-Stabilizing Pulse Synchronization" Protocol: Counter-examples
NASA Technical Reports Server (NTRS)
Malekpour, Mahyar R.; Siminiceanu, Radu
2006-01-01
Embedded distributed systems have become an integral part of many safety-critical applications. There have been many attempts to solve the self-stabilization problem of clocks across a distributed system. An analysis of one such protocol called the Byzantine Self-Stabilizing Pulse Synchronization (BSS-Pulse-Synch) protocol from a paper entitled "Linear Time Byzantine Self-Stabilizing Clock Synchronization" by Daliot, et al., is presented in this report. This report also includes a discussion of the complexity and pitfalls of designing self-stabilizing protocols and provides counter-examples for the claims of the above protocol.
Global Existence Analysis of Cross-Diffusion Population Systems for Multiple Species
NASA Astrophysics Data System (ADS)
Chen, Xiuqing; Daus, Esther S.; Jüngel, Ansgar
2018-02-01
The existence of global-in-time weak solutions to reaction-cross-diffusion systems for an arbitrary number of competing population species is proved. The equations can be derived from an on-lattice random-walk model with general transition rates. In the case of linear transition rates, it extends the two-species population model of Shigesada, Kawasaki, and Teramoto. The equations are considered in a bounded domain with homogeneous Neumann boundary conditions. The existence proof is based on a refined entropy method and a new approximation scheme. Global existence follows under a detailed balance or weak cross-diffusion condition. The detailed balance condition is related to the symmetry of the mobility matrix, which mirrors Onsager's principle in thermodynamics. Under detailed balance (and without reaction) the entropy is nonincreasing in time, but counter-examples show that the entropy may increase initially if detailed balance does not hold.
Pseudoscience--Teaching by Counterexample.
ERIC Educational Resources Information Center
Hoffmaster, Steven
1986-01-01
By using pseudoscientific examples to show what science is not, instructors can generate a healthy skepticism in students while making them understand how science applies to their daily lives. A course incorporating such pseudoscientific examples (including extra-sensory perception -- ESP) is described. (JN)
Abortion: Strong's counterexamples fail.
Di Nucci, E
2009-05-01
This paper shows that the counterexamples proposed by Strong in 2008 in the Journal of Medical Ethics to Marquis's argument against abortion fail. Strong's basic idea is that there are cases--for example, terminally ill patients--where killing an adult human being is prima facie seriously morally wrong even though that human being is not being deprived of a "valuable future". So Marquis would be wrong in thinking that what is essential about the wrongness of killing an adult human being is that they are being deprived of a valuable future. This paper shows that whichever way the concept of "valuable future" is interpreted, the proposed counterexamples fail: if it is interpreted as "future like ours", the proposed counterexamples have no bearing on Marquis's argument. If the concept is interpreted as referring to the patient's preferences, it must be either conceded that the patients in Strong's scenarios have some valuable future or admitted that killing them is not seriously morally wrong. Finally, if "valuable future" is interpreted as referring to objective standards, one ends up with implausible and unpalatable moral claims.
Diagnosing a Failed Proof in Fault-Tolerance: A Disproving Challenge Problem
NASA Technical Reports Server (NTRS)
Pike, Lee; Miner, Paul; Torres-Pomales, Wilfredo
2006-01-01
This paper proposes a challenge problem in disproving. We describe a fault-tolerant distributed protocol designed at NASA for use in a fly-by-wire system for next-generation commercial aircraft. An early design of the protocol contains a subtle bug that is highly unlikely to be caught in fault injection testing. We describe a failed proof of the protocol's correctness in a mechanical theorem prover (PVS) with a complex unfinished proof conjecture. We use a model checking suite (SAL) to generate a concrete counterexample to the unproven conjecture to demonstrate the existence of a bug. However, we argue that the effort required in our approach is too high and propose what conditions a better solution would satisfy. We carefully describe the protocol and bug to provide a challenging but feasible case study for disproving research.
Testing First-Order Logic Axioms in AutoCert
NASA Technical Reports Server (NTRS)
Ahn, Ki Yung; Denney, Ewen
2009-01-01
AutoCert [2] is a formal verification tool for machine generated code in safety critical domains, such as aerospace control code generated from MathWorks Real-Time Workshop. AutoCert uses Automated Theorem Provers (ATPs) [5] based on First-Order Logic (FOL) to formally verify safety and functional correctness properties of the code. These ATPs try to build proofs based on user provided domain-specific axioms, which can be arbitrary First-Order Formulas (FOFs). These axioms are the most crucial part of the trusted base, since proofs can be submitted to a proof checker removing the need to trust the prover and AutoCert itself plays the part of checking the code generator. However, formulating axioms correctly (i.e. precisely as the user had really intended) is non-trivial in practice. The challenge of axiomatization arise from several dimensions. First, the domain knowledge has its own complexity. AutoCert has been used to verify mathematical requirements on navigation software that carries out various geometric coordinate transformations involving matrices and quaternions. Axiomatic theories for such constructs are complex enough that mistakes are not uncommon. Second, adjusting axioms for ATPs can add even more complexity. The axioms frequently need to be modified in order to have them in a form suitable for use with ATPs. Such modifications tend to obscure the axioms further. Thirdly, speculating validity of the axioms from the output of existing ATPs is very hard since theorem provers typically do not give any examples or counterexamples.
A Primer on the Pathway to Scholarly Writing: Helping Nascent Writers to Unlearn Conditioned Habits
ERIC Educational Resources Information Center
McDougall, Dennis; Ornelles, Cecily; Rao, Kavita
2015-01-01
In this article, we identify eight common error patterns of nascent writers when they attempt to navigate the pathway to scholarly writing. We illustrate each error pattern via examples and counter-examples (corrections). We also describe how to identify such patterns, why those patterns might occur and persist, and why each pattern is…
Model Checking Failed Conjectures in Theorem Proving: A Case Study
NASA Technical Reports Server (NTRS)
Pike, Lee; Miner, Paul; Torres-Pomales, Wilfredo
2004-01-01
Interactive mechanical theorem proving can provide high assurance of correct design, but it can also be a slow iterative process. Much time is spent determining why a proof of a conjecture is not forthcoming. In some cases, the conjecture is false and in others, the attempted proof is insufficient. In this case study, we use the SAL family of model checkers to generate a concrete counterexample to an unproven conjecture specified in the mechanical theorem prover, PVS. The focus of our case study is the ROBUS Interactive Consistency Protocol. We combine the use of a mechanical theorem prover and a model checker to expose a subtle flaw in the protocol that occurs under a particular scenario of faults and processor states. Uncovering the flaw allows us to mend the protocol and complete its general verification in PVS.
Students' Misconceptions about Random Variables
ERIC Educational Resources Information Center
Kachapova, Farida; Kachapov, Ilias
2012-01-01
This article describes some misconceptions about random variables and related counter-examples, and makes suggestions about teaching initial topics on random variables in general form instead of doing it separately for discrete and continuous cases. The focus is on post-calculus probability courses. (Contains 2 figures.)
Diversions: Hilbert and Sierpinski Space-Filling Curves, and beyond
ERIC Educational Resources Information Center
Gough, John
2012-01-01
Space-filling curves are related to fractals, in that they have self-similar patterns. Such space-filling curves were originally developed as conceptual mathematical "monsters", counter-examples to Weierstrassian and Reimannian treatments of calculus and continuity. These were curves that were everywhere-connected but…
NASA Astrophysics Data System (ADS)
Greenslade, Thomas B.
2010-04-01
Students all know that reflection from a plane mirror produces an image that is reversed right to left and so cannot be read by anyone but Leonardo da Vinci, who kept his notes in mirror writing. A useful counter-example is the Porro prism, which produces an image that is not reversed.
Building Program Verifiers from Compilers and Theorem Provers
2015-05-14
Checking with SMT UFO • LLVM-based front-end (partially reused in SeaHorn) • Combines Abstract Interpretation with Interpolation-Based Model Checking • (no...assertions Counter-examples are long Hard to determine (from main) what is relevant Assertion Main 35 Building Verifiers from Comp and SMT Gurfinkel, 2015
A Reader's Guide to Gacs's "Positive Rates" Paper
NASA Astrophysics Data System (ADS)
Gray, Lawrence F.
2001-04-01
Peter Gacs's monograph, which follows this article, provides a counterexample to the important Positive Rates Conjecture. This conjecture, which arose in the late 1960's, was based on very plausible arguments, some of which come from statistical mechanics. During the long gestation period of the Gacs example, there has been a great deal of skepticism about the validity of his work. The construction and verification of Gacs's counterexample are unavoidably complex, and as a consequence, his paper is quite lengthy. But because of the novelty of the techniques and the significance of the result, his work deserves to become widely known. This reader's guide is intended both as a cheap substitute for reading the whole thing, as well as a warm-up for those who want to plumb its depths.
Mexican Americans Acquiring Bachelor's Degrees: Whose Opportunity?
ERIC Educational Resources Information Center
Evans, Carol
2009-01-01
This study offers a small, highly contextualized counter-example to several recent large-scale analyses depicting Latino underachievement in higher education (R. Fry, 2002; J. Immerwahr, 2003; S. Miller & E. Garcia, 2004; W. Swail, A. Cabrera, & C. Lee, 2004; W. S. Swail, K. E. Redd, & L. W. Perna, 2003). The purpose is to analyze…
Putting Essential Understanding into Practice: Geometry, 9-12
ERIC Educational Resources Information Center
National Council of Teachers of Mathematics, 2015
2015-01-01
Do your students think a triangle can be constructed from any three given line segments? Do they believe that a transformation affects only the pre-image--not the whole plane? Do they understand that examples--no matter how many they find--cannot prove a conjecture but one counterexample is sufficient to disprove it? "What tasks can you…
Pre-Service Elementary Teachers' Conceptions of Counterexamples
ERIC Educational Resources Information Center
Zeybek, Zulfiye
2017-01-01
This study aimed at investigating two main issues related to counterexample construction: the appropriateness of counterexamples and the types of arguments that are often used when refuting a false conjecture. Twelve pre-service elementary teachers who demonstrated a wide range of reasoning skills participated in this study. The data revealed…
Simple yet Hidden Counterexamples in Undergraduate Real Analysis
ERIC Educational Resources Information Center
Shipman, Barbara A.; Shipman, Patrick D.
2013-01-01
We study situations in introductory analysis in which students affirmed false statements as true, despite simple counterexamples that they easily recognized afterwards. The study draws attention to how simple counterexamples can become hidden in plain sight, even in an active learning atmosphere where students proposed simple (as well as more…
Iterated Hamiltonian type systems and applications
NASA Astrophysics Data System (ADS)
Tiba, Dan
2018-04-01
We discuss, in arbitrary dimension, certain Hamiltonian type systems and prove existence, uniqueness and regularity properties, under the independence condition. We also investigate the critical case, define a class of generalized solutions and prove existence and basic properties. Relevant examples and counterexamples are also indicated. The applications concern representations of implicitly defined manifolds and their perturbations, motivated by differential systems involving unknown geometries.
ERIC Educational Resources Information Center
Frenette, Micheline
Trying to change the predictive rule for the sinking and floating phenomena, students have a great difficulty in understanding density and they are insensitive to empirical counter-examples designed to challenge their own rule. The purpose of this study is to examine the process whereby students from sixth and seventh grades relinquish their…
Broken bridges: a counter-example of the ER=EPR conjecture
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Pisin; Wu, Chih-Hung; Yeom, Dong-han, E-mail: pisinchen@phys.ntu.edu.tw, E-mail: b02202007@ntu.edu.tw, E-mail: innocent.yeom@gmail.com
In this paper, we provide a counter-example to the ER=EPR conjecture. In an anti-de Sitter space, we construct a pair of maximally entangled but separated black holes. Due to the vacuum decay of the anti-de Sitter background toward a deeper vacuum, these two parts can be trapped by bubbles. If these bubbles are reasonably large, then within the scrambling time, there should appear an Einstein-Rosen bridge between the two black holes. Now by tracing more details on the bubble dynamics, one can identify parameters such that one of the two bubbles either monotonically shrinks or expands. Because of the changemore » of vacuum energy, one side of the black hole would evaporate completely. Due to the shrinking of the apparent horizon, a signal of one side of the Einstein-Rosen bridge can be viewed from the opposite side. We analytically and numerically demonstrate that within a reasonable semi-classical parameter regime, such process can happen. Bubbles are a non-perturbative effect, which is the crucial reason that allows the transmission of information between the two black holes through the Einstein-Rosen bridge, even though the probability is highly suppressed. Therefore, the ER=EPR conjecture cannot be generic in its present form and its validity maybe restricted.« less
NASA Technical Reports Server (NTRS)
Tadmor, Eitan
1988-01-01
A convergence theory for semi-discrete approximations to nonlinear systems of conservation laws is developed. It is shown, by a series of scalar counter-examples, that consistency with the conservation law alone does not guarantee convergence. Instead, a notion of consistency which takes into account both the conservation law and its augmenting entropy condition is introduced. In this context it is concluded that consistency and L(infinity)-stability guarantee for a relevant class of admissible entropy functions, that their entropy production rate belongs to a compact subset of H(loc)sup -1 (x,t). One can now use compensated compactness arguments in order to turn this conclusion into a convergence proof. The current state of the art for these arguments includes the scalar and a wide class of 2 x 2 systems of conservation laws. The general framework of the vanishing viscosity method is studied as an effective way to meet the consistency and L(infinity)-stability requirements. How this method is utilized to enforce consistency and stability for scalar conservation laws is shown. In this context we prove, under the appropriate assumptions, the convergence of finite difference approximations (e.g., the high resolution TVD and UNO methods), finite element approximations (e.g., the Streamline-Diffusion methods) and spectral and pseudospectral approximations (e.g., the Spectral Viscosity methods).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Tadmor, E.
1988-07-01
A convergence theory for semi-discrete approximations to nonlinear systems of conservation laws is developed. It is shown, by a series of scalar counter-examples, that consistency with the conservation law alone does not guarantee convergence. Instead, a notion of consistency which takes into account both the conservation law and its augmenting entropy condition is introduced. In this context it is concluded that consistency and L(infinity)-stability guarantee for a relevant class of admissible entropy functions, that their entropy production rate belongs to a compact subset of H(loc)sup -1 (x,t). One can now use compensated compactness arguments in order to turn this conclusionmore » into a convergence proof. The current state of the art for these arguments includes the scalar and a wide class of 2 x 2 systems of conservation laws. The general framework of the vanishing viscosity method is studied as an effective way to meet the consistency and L(infinity)-stability requirements. How this method is utilized to enforce consistency and stability for scalar conservation laws is shown. In this context we prove, under the appropriate assumptions, the convergence of finite difference approximations (e.g., the high resolution TVD and UNO methods), finite element approximations (e.g., the Streamline-Diffusion methods) and spectral and pseudospectral approximations (e.g., the Spectral Viscosity methods).« less
Direct evidence for a dual process model of deductive inference.
Markovits, Henry; Brunet, Marie-Laurence; Thompson, Valerie; Brisson, Janie
2013-07-01
In 2 experiments, we tested a strong version of a dual process theory of conditional inference (cf. Verschueren et al., 2005a, 2005b) that assumes that most reasoners have 2 strategies available, the choice of which is determined by situational variables, cognitive capacity, and metacognitive control. The statistical strategy evaluates inferences probabilistically, accepting those with high conditional probability. The counterexample strategy rejects inferences when a counterexample shows the inference to be invalid. To discriminate strategy use, we presented reasoners with conditional statements (if p, then q) and explicit statistical information about the relative frequency of the probability of p/q (50% vs. 90%). A statistical strategy would accept the more probable inferences more frequently, whereas the counterexample one would reject both. In Experiment 1, reasoners under time pressure used the statistical strategy more, but switched to the counterexample strategy when time constraints were removed; the former took less time than the latter. These data are consistent with the hypothesis that the statistical strategy is the default heuristic. Under a free-time condition, reasoners preferred the counterexample strategy and kept it when put under time pressure. Thus, it is not simply a lack of capacity that produces a statistical strategy; instead, it seems that time pressure disrupts the ability to make good metacognitive choices. In line with this conclusion, in a 2nd experiment, we measured reasoners' confidence in their performance; those under time pressure were less confident in the statistical than the counterexample strategy and more likely to switch strategies under free-time conditions. PsycINFO Database Record (c) 2013 APA, all rights reserved.
A counterexample and a modification to the adiabatic approximation theorem in quantum mechanics
NASA Technical Reports Server (NTRS)
Gingold, H.
1991-01-01
A counterexample to the adiabatic approximation theorem is given when degeneracies are present. A formulation of an alternative version is proposed. A complete asymptotic decomposition for n dimensional self-adjoint Hamiltonian systems is restated and used.
SimCheck: An Expressive Type System for Simulink
NASA Technical Reports Server (NTRS)
Roy, Pritam; Shankar, Natarajan
2010-01-01
MATLAB Simulink is a member of a class of visual languages that are used for modeling and simulating physical and cyber-physical systems. A Simulink model consists of blocks with input and output ports connected using links that carry signals. We extend the type system of Simulink with annotations and dimensions/units associated with ports and links. These types can capture invariants on signals as well as relations between signals. We define a type-checker that checks the wellformedness of Simulink blocks with respect to these type annotations. The type checker generates proof obligations that are solved by SRI's Yices solver for satisfiability modulo theories (SMT). This translation can be used to detect type errors, demonstrate counterexamples, generate test cases, or prove the absence of type errors. Our work is an initial step toward the symbolic analysis of MATLAB Simulink models.
Reasoning about Intentions: Counterexamples to Reasons for Actions
ERIC Educational Resources Information Center
Juhos, Csongor; Quelhas, Ana Cristina; Byrne, Ruth M. J.
2015-01-01
Four experiments tested the idea that people distinguish between biconditional, conditional, and enabling intention conditionals by thinking about counterexamples. The experiments examined intention conditionals that contain different types of reasons for actions, such as beliefs, goals, obligations, and social norms, based on a corpus of 48…
Extreme cognitions are associated with diminished ability to use disconfirming evidence.
Haigh, Matthew; Dodd, Alyson L
2017-03-01
An Integrative Cognitive Model of mood swings and bipolar disorder proposes that cognitive styles characterized by extreme self-referent appraisals of internal states (e.g., 'If I have a bad night's sleep it means that I am about to have a breakdown') interfere with mood regulation. The aim of this study is to determine whether strong endorsement of such appraisals is predicted by a diminished ability to access disconfirming counterexamples. We examined whether the ability to access two different categories of counterexample (known as Disabling Conditions and Alternative Causes) would predict endorsement of extreme appraisals (measured by the Hypomanic Attitudes and Positive Predictions Inventory; HAPPI) and mania risk (measured by the Hypomanic Personality Scale; HPS). A non-clinical sample of 150 students completed the HAPPI, the HPS and a conditional reasoning task that indexed the ability to access Disabling Conditions and Alternative Causes. Current mood was controlled for using the Internal States Scale. The ability to make use of disabling counterexamples during the reasoning task was inversely related with scores on the HAPPI (r = -.19, p < .05); participants that were less able to make use of disabling counterexamples endorsed extreme self-referent appraisals to a greater extent. There was no association between the use of alternative cause counterexamples and the HAPPI, and no association between either measure of counterexample generation and the HPS. A diminished ability to use disconfirming evidence when reasoning about the world may reinforce problematic cognitive styles such as extreme, personalized appraisals of experience, which can interfere with mood regulation. Problematic cognitive styles such as extreme, personalized appraisals of experience may be reinforced by the inability to produce or access evidence that disconfirms these maladaptive beliefs. This reasoning bias may be associated with cognitive styles underlying psychopathology. There may be clinical utility in exploring the use of disabler generation in psychological interventions, to help disconfirm maladaptive beliefs. © 2016 The British Psychological Society.
On Pythagoras Theorem for Products of Spectral Triples
NASA Astrophysics Data System (ADS)
D'Andrea, Francesco; Martinetti, Pierre
2013-05-01
We discuss a version of Pythagoras theorem in noncommutative geometry. Usual Pythagoras theorem can be formulated in terms of Connes' distance, between pure states, in the product of commutative spectral triples. We investigate the generalization to both non-pure states and arbitrary spectral triples. We show that Pythagoras theorem is replaced by some Pythagoras inequalities, that we prove for the product of arbitrary (i.e. non-necessarily commutative) spectral triples, assuming only some unitality condition. We show that these inequalities are optimal, and we provide non-unital counter-examples inspired by K-homology.
Galili, Tal; Meilijson, Isaac
2016-01-02
The Rao-Blackwell theorem offers a procedure for converting a crude unbiased estimator of a parameter θ into a "better" one, in fact unique and optimal if the improvement is based on a minimal sufficient statistic that is complete. In contrast, behind every minimal sufficient statistic that is not complete, there is an improvable Rao-Blackwell improvement. This is illustrated via a simple example based on the uniform distribution, in which a rather natural Rao-Blackwell improvement is uniformly improvable. Furthermore, in this example the maximum likelihood estimator is inefficient, and an unbiased generalized Bayes estimator performs exceptionally well. Counterexamples of this sort can be useful didactic tools for explaining the true nature of a methodology and possible consequences when some of the assumptions are violated. [Received December 2014. Revised September 2015.].
Student Teachers’ Proof Schemes on Proof Tasks Involving Inequality: Deductive or Inductive?
NASA Astrophysics Data System (ADS)
Rosyidi, A. H.; Kohar, A. W.
2018-01-01
Exploring student teachers’ proof ability is crucial as it is important for improving the quality of their learning process and help their future students learn how to construct a proof. Hence, this study aims at exploring at the proof schemes of student teachers in the beginning of their studies. Data were collected from 130 proofs resulted by 65 Indonesian student teachers on two proof tasks involving algebraic inequality. To analyse, the proofs were classified into the refined proof schemes level proposed by Lee (2016) ranging from inductive, which only provides irrelevant inferences, to deductive proofs, which consider addressing formal representation. Findings present several examples of each of Lee’s level on the student teachers’ proofs spanning from irrelevant inferences, novice use of examples or logical reasoning, strategic use examples for reasoning, deductive inferences with major and minor logical coherence, and deductive proof with informal and formal representation. Besides, it was also found that more than half of the students’ proofs coded as inductive schemes, which does not meet the requirement for doing the proof for the proof tasks examined in this study. This study suggests teacher educators in teacher colleges to reform the curriculum regarding proof learning which can accommodate the improvement of student teachers’ proving ability from inductive to deductive proof as well from informal to formal proof.
Preservice and Novice Teachers' Knowledge on Preformal Proofs: Triangle Postulate as an Example
ERIC Educational Resources Information Center
Leung, Kui Chiu Issic; Lee, Chun Yeung
2017-01-01
By considering the example of proving the triangle postulate, this study aimed to explore Hong Kong preservice and novice teachers' knowledge competencies and their beliefs about preformal and formal proofs. The findings revealed that such teachers are not proficient in using preformal proofs and do not realize that preformal proofs are a useful…
Using protistan examples to dispel the myths of intelligent design.
Farmer, Mark A; Habura, Andrea
2010-01-01
In recent years the teaching of the religiously based philosophy of intelligent design (ID) has been proposed as an alternative to modern evolutionary theory. Advocates of ID are largely motivated by their opposition to naturalistic explanations of biological diversity, in accordance with their goal of challenging the philosophy of scientific materialism. Intelligent design has been embraced by a wide variety of creationists who promote highly questionable claims that purport to show the inadequacy of evolutionary theory, which they consider to be a threat to a theistic worldview. We find that examples from protistan biology are well suited for providing evidence of many key evolutionary concepts, and have often been misrepresented or roundly ignored by ID advocates. These include examples of adaptations and radiations that are said to be statistically impossible, as well as examples of speciation both in the laboratory and as documented in the fossil record. Because many biologists may not be familiar with the richness of the protist evolution dataset or with ID-based criticisms of evolution, we provide examples of current ID arguments and specific protistan counter-examples.
Inhomogeneity-induced cosmic acceleration in a dust universe
NASA Astrophysics Data System (ADS)
Chuang, Chia-Hsun; Gu, Je-An; Hwang, W.-Y. P.
2008-09-01
It is the common consensus that the expansion of a universe always slows down if the gravity provided by the energy sources therein is attractive and accordingly one needs to invoke dark energy as a source of anti-gravity for understanding the cosmic acceleration. To examine this point we find counterexamples for a spherically symmetric dust fluid described by the Lemaître Tolman Bondi solution without singularity. Thus, the validity of this naive consensus is indeed doubtful and the effects of inhomogeneities should be restudied. These counter-intuitive examples open a new perspective on the understanding of the evolution of our universe.
Violating the Weak Cosmic Censorship Conjecture in Four-Dimensional Anti-de Sitter Space
NASA Astrophysics Data System (ADS)
Crisford, Toby; Santos, Jorge E.
2017-05-01
We consider time-dependent solutions of the Einstein-Maxwell equations using anti-de Sitter (AdS) boundary conditions, and provide the first counterexample to the weak cosmic censorship conjecture in four spacetime dimensions. Our counterexample is entirely formulated in the Poincaré patch of AdS. We claim that our results have important consequences for quantum gravity, most notably to the weak gravity conjecture.
Violating the Weak Cosmic Censorship Conjecture in Four-Dimensional Anti-de Sitter Space.
Crisford, Toby; Santos, Jorge E
2017-05-05
We consider time-dependent solutions of the Einstein-Maxwell equations using anti-de Sitter (AdS) boundary conditions, and provide the first counterexample to the weak cosmic censorship conjecture in four spacetime dimensions. Our counterexample is entirely formulated in the Poincaré patch of AdS. We claim that our results have important consequences for quantum gravity, most notably to the weak gravity conjecture.
Diffusion Monte Carlo approach versus adiabatic computation for local Hamiltonians
NASA Astrophysics Data System (ADS)
Bringewatt, Jacob; Dorland, William; Jordan, Stephen P.; Mink, Alan
2018-02-01
Most research regarding quantum adiabatic optimization has focused on stoquastic Hamiltonians, whose ground states can be expressed with only real non-negative amplitudes and thus for whom destructive interference is not manifest. This raises the question of whether classical Monte Carlo algorithms can efficiently simulate quantum adiabatic optimization with stoquastic Hamiltonians. Recent results have given counterexamples in which path-integral and diffusion Monte Carlo fail to do so. However, most adiabatic optimization algorithms, such as for solving MAX-k -SAT problems, use k -local Hamiltonians, whereas our previous counterexample for diffusion Monte Carlo involved n -body interactions. Here we present a 6-local counterexample which demonstrates that even for these local Hamiltonians there are cases where diffusion Monte Carlo cannot efficiently simulate quantum adiabatic optimization. Furthermore, we perform empirical testing of diffusion Monte Carlo on a standard well-studied class of permutation-symmetric tunneling problems and similarly find large advantages for quantum optimization over diffusion Monte Carlo.
NASA Astrophysics Data System (ADS)
Umarov, Sabir; Tsallis, Constantino
2016-10-01
In a paper by Umarov et al (2008 Milan J. Math. 76 307-28), a generalization of the Fourier transform, called the q-Fourier transform, was introduced and applied for the proof of a q-generalized central limit theorem (q-CLT). Subsequently, Hilhorst illustrated (2009 Braz. J. Phys. 39 371-9 2010 J. Stat. Mech. P10023) that the q-Fourier transform for q\\gt 1, is not invertible in the space of density functions. Indeed, using an invariance principle, he constructed a family of densities with the same q-Fourier transform and noted that ‘as a consequence, the q-CLT falls short of achieving its stated goal’. The distributions constructed there have compact support. We prove now that the limit distribution in the q-CLT is unique and can not have a compact support. This result excludes all the possible counterexamples which can be constructed using the invariance principle and fills the gap mentioned by Hilhorst.
On selecting evidence to test hypotheses: A theory of selection tasks.
Ragni, Marco; Kola, Ilir; Johnson-Laird, Philip N
2018-05-21
How individuals choose evidence to test hypotheses is a long-standing puzzle. According to an algorithmic theory that we present, it is based on dual processes: individuals' intuitions depending on mental models of the hypothesis yield selections of evidence matching instances of the hypothesis, but their deliberations yield selections of potential counterexamples to the hypothesis. The results of 228 experiments using Wason's selection task corroborated the theory's predictions. Participants made dependent choices of items of evidence: the selections in 99 experiments were significantly more redundant (using Shannon's measure) than those of 10,000 simulations of each experiment based on independent selections. Participants tended to select evidence corresponding to instances of hypotheses, or to its counterexamples, or to both. Given certain contents, instructions, or framings of the task, they were more likely to select potential counterexamples to the hypothesis. When participants received feedback about their selections in the "repeated" selection task, they switched from selections of instances of the hypothesis to selection of potential counterexamples. These results eliminated most of the 15 alternative theories of selecting evidence. In a meta-analysis, the model theory yielded a better fit of the results of 228 experiments than the one remaining theory based on reasoning rather than meaning. We discuss the implications of the model theory for hypothesis testing and for a well-known paradox of confirmation. (PsycINFO Database Record (c) 2018 APA, all rights reserved).
Logical reasoning versus information processing in the dual-strategy model of reasoning.
Markovits, Henry; Brisson, Janie; de Chantal, Pier-Luc
2017-01-01
One of the major debates concerning the nature of inferential reasoning is between counterexample-based strategies such as mental model theory and statistical strategies underlying probabilistic models. The dual-strategy model, proposed by Verschueren, Schaeken, & d'Ydewalle (2005a, 2005b), which suggests that people might have access to both kinds of strategy has been supported by several recent studies. These have shown that statistical reasoners make inferences based on using information about premises in order to generate a likelihood estimate of conclusion probability. However, while results concerning counterexample reasoners are consistent with a counterexample detection model, these results could equally be interpreted as indicating a greater sensitivity to logical form. In order to distinguish these 2 interpretations, in Studies 1 and 2, we presented reasoners with Modus ponens (MP) inferences with statistical information about premise strength and in Studies 3 and 4, naturalistic MP inferences with premises having many disabling conditions. Statistical reasoners accepted the MP inference more often than counterexample reasoners in Studies 1 and 2, while the opposite pattern was observed in Studies 3 and 4. Results show that these strategies must be defined in terms of information processing, with no clear relations to "logical" reasoning. These results have additional implications for the underlying debate about the nature of human reasoning. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Software Model Checking Without Source Code
NASA Technical Reports Server (NTRS)
Chaki, Sagar; Ivers, James
2009-01-01
We present a framework, called AIR, for verifying safety properties of assembly language programs via software model checking. AIR extends the applicability of predicate abstraction and counterexample guided abstraction refinement to the automated verification of low-level software. By working at the assembly level, AIR allows verification of programs for which source code is unavailable-such as legacy and COTS software-and programs that use features-such as pointers, structures, and object-orientation-that are problematic for source-level software verification tools. In addition, AIR makes no assumptions about the underlying compiler technology. We have implemented a prototype of AIR and present encouraging results on several non-trivial examples.
NASA Astrophysics Data System (ADS)
Berenstein, David; Miller, Alexandra
2016-09-01
In this paper, we argue that for classical configurations of gravity in the AdS/CFT setup, it is in general impossible to reconstruct the bulk geometry from the leading asymptotic behavior of the classical fields in gravity alone. This is possible sufficiently near the vacuum, but not more generally. We argue this by using a counter-example that utilizes the supersymmetric geometries constructed by Lin, Lunin, and Maldacena. In the dual quantum field theory, the additional data required to complete the geometry is encoded in modes that near the vacuum geometry lie beyond the Planck scale.
A Game-Theoretic Approach to Branching Time Abstract-Check-Refine Process
NASA Technical Reports Server (NTRS)
Wang, Yi; Tamai, Tetsuo
2009-01-01
Since the complexity of software systems continues to grow, most engineers face two serious problems: the state space explosion problem and the problem of how to debug systems. In this paper, we propose a game-theoretic approach to full branching time model checking on three-valued semantics. The three-valued models and logics provide successful abstraction that overcomes the state space explosion problem. The game style model checking that generates counter-examples can guide refinement or identify validated formulas, which solves the system debugging problem. Furthermore, output of our game style method will give significant information to engineers in detecting where errors have occurred and what the causes of the errors are.
Automated Assume-Guarantee Reasoning by Abstraction Refinement
NASA Technical Reports Server (NTRS)
Pasareanu, Corina S.; Giannakopoulous, Dimitra; Glannakopoulou, Dimitra
2008-01-01
Current automated approaches for compositional model checking in the assume-guarantee style are based on learning of assumptions as deterministic automata. We propose an alternative approach based on abstraction refinement. Our new method computes the assumptions for the assume-guarantee rules as conservative and not necessarily deterministic abstractions of some of the components, and refines those abstractions using counter-examples obtained from model checking them together with the other components. Our approach also exploits the alphabets of the interfaces between components and performs iterative refinement of those alphabets as well as of the abstractions. We show experimentally that our preliminary implementation of the proposed alternative achieves similar or better performance than a previous learning-based implementation.
Efficient optimization of the quantum relative entropy
NASA Astrophysics Data System (ADS)
Fawzi, Hamza; Fawzi, Omar
2018-04-01
Many quantum information measures can be written as an optimization of the quantum relative entropy between sets of states. For example, the relative entropy of entanglement of a state is the minimum relative entropy to the set of separable states. The various capacities of quantum channels can also be written in this way. We propose a unified framework to numerically compute these quantities using off-the-shelf semidefinite programming solvers, exploiting the approximation method proposed in Fawzi, Saunderson and Parrilo (2017 arXiv: 1705.00812). As a notable application, this method allows us to provide numerical counterexamples for a proposed lower bound on the quantum conditional mutual information in terms of the relative entropy of recovery.
Conditional reasoning in autism: activation and integration of knowledge and belief.
McKenzie, Rebecca; Evans, Jonathan St B T; Handley, Simon J
2010-03-01
Everyday conditional reasoning is typically influenced by prior knowledge and belief in the form of specific exceptions known as counterexamples. This study explored whether adolescents with autism spectrum disorder (ASD; N = 26) were less influenced by background knowledge than typically developing adolescents (N = 38) when engaged in conditional reasoning. Participants were presented with pretested valid and invalid conditional inferences with varying available counterexamples. The group with ASD showed significantly less influence of prior knowledge on valid inferences (p = .01) and invalid inferences (p = .01) compared with the typical group. In a secondary probability judgment task, no significant group differences were found in probabilistic judgments of the believability of the premises. Further experiments found that results could not be explained by differences between the groups in the ability to generate counterexamples or any tendency among adolescents with ASD to exhibit a "yes" response pattern. It was concluded that adolescents with ASD tend not to spontaneously contextualize presented material when engaged in everyday reasoning. These findings are discussed with reference to weak central coherence theory and the conditional reasoning literature.
Greater learnability is not sufficient to produce cultural universals.
Rafferty, Anna N; Griffiths, Thomas L; Ettlinger, Marc
2013-10-01
Looking across human societies reveals regularities in the languages that people speak and the concepts that they use. One explanation that has been proposed for these "cultural universals" is differences in the ease with which people learn particular languages and concepts. A difference in learnability means that languages and concepts possessing a particular property are more likely to be accurately transmitted from one generation of learners to the next. Intuitively, this difference could allow languages and concepts that are more learnable to become more prevalent after multiple generations of cultural transmission. If this is the case, the prevalence of languages and concepts with particular properties can be explained simply by demonstrating empirically that they are more learnable. We evaluate this argument using mathematical analysis and behavioral experiments. Specifically, we provide two counter-examples that show how greater learnability need not result in a property becoming prevalent. First, more learnable languages and concepts can nonetheless be less likely to be produced spontaneously as a result of transmission failures. We simulated cultural transmission in the laboratory to show that this can occur for memory of distinctive items: these items are more likely to be remembered, but not generated spontaneously once they have been forgotten. Second, when there are many languages or concepts that lack the more learnable property, sheer numbers can swamp the benefit produced by greater learnability. We demonstrate this using a second series of experiments involving artificial language learning. Both of these counter-examples show that simply finding a learnability bias experimentally is not sufficient to explain why a particular property is prevalent in the languages or concepts used in human societies: explanations for cultural universals based on cultural transmission need to consider the full set of hypotheses a learner could entertain and all of the kinds of errors that can occur in transmission. Copyright © 2013 Elsevier B.V. All rights reserved.
A decomposition theory for phylogenetic networks and incompatible characters.
Gusfield, Dan; Bansal, Vikas; Bafna, Vineet; Song, Yun S
2007-12-01
Phylogenetic networks are models of evolution that go beyond trees, incorporating non-tree-like biological events such as recombination (or more generally reticulation), which occur either in a single species (meiotic recombination) or between species (reticulation due to lateral gene transfer and hybrid speciation). The central algorithmic problems are to reconstruct a plausible history of mutations and non-tree-like events, or to determine the minimum number of such events needed to derive a given set of binary sequences, allowing one mutation per site. Meiotic recombination, reticulation and recurrent mutation can cause conflict or incompatibility between pairs of sites (or characters) of the input. Previously, we used "conflict graphs" and "incompatibility graphs" to compute lower bounds on the minimum number of recombination nodes needed, and to efficiently solve constrained cases of the minimization problem. Those results exposed the structural and algorithmic importance of the non-trivial connected components of those two graphs. In this paper, we more fully develop the structural importance of non-trivial connected components of the incompatibility and conflict graphs, proving a general decomposition theorem (Gusfield and Bansal, 2005) for phylogenetic networks. The decomposition theorem depends only on the incompatibilities in the input sequences, and hence applies to many types of phylogenetic networks, and to any biological phenomena that causes pairwise incompatibilities. More generally, the proof of the decomposition theorem exposes a maximal embedded tree structure that exists in the network when the sequences cannot be derived on a perfect phylogenetic tree. This extends the theory of perfect phylogeny in a natural and important way. The proof is constructive and leads to a polynomial-time algorithm to find the unique underlying maximal tree structure. We next examine and fully solve the major open question from Gusfield and Bansal (2005): Is it true that for every input there must be a fully decomposed phylogenetic network that minimizes the number of recombination nodes used, over all phylogenetic networks for the input. We previously conjectured that the answer is yes. In this paper, we show that the answer in is no, both for the case that only single-crossover recombination is allowed, and also for the case that unbounded multiple-crossover recombination is allowed. The latter case also resolves a conjecture recently stated in (Huson and Klopper, 2007) in the context of reticulation networks. Although the conjecture from Gusfield and Bansal (2005) is disproved in general, we show that the answer to the conjecture is yes in several natural special cases, and establish necessary combinatorial structure that counterexamples to the conjecture must possess. We also show that counterexamples to the conjecture are rare (for the case of single-crossover recombination) in simulated data.
Demonstrating Proof by Contrapositive and Contradiction through Physical Analogs.
ERIC Educational Resources Information Center
Kaiser, Mark J.
1993-01-01
Presents examples where mathematical and physical reasoning complement each other in interpreting and analyzing some basic science concepts using proof by contradiction and contrapositive. Examples involve the rotation of the moon, the stability of electrons and protons, the electron's orbit about the nucleus, and the earth's liquid core. (MDH)
Schroyens, Walter; Fleerackers, Lieve; Maes, Sunile
2010-01-01
Two experiments (N1 = 117 and N2 = 245) on reasoning with knowledge-rich conditionals showed a main effect of logical validity, which was due to the negative effect of counter-examples being smaller for valid than for invalid arguments. These findings support the thesis that some people tend to inhibit background inconsistent with the hypothetical truth of the premises, while others tend to abandon the implicit truth-assumption when they have factual evidence to the contrary. Findings show that adhering to the truth-assumption in the face of conflicting evidence to the contrary requires an investment of time and effort which people with a higher general aptitude are more likely to do. PMID:21228921
DOE Office of Scientific and Technical Information (OSTI.GOV)
Argyres, Philip C.; Lü, Yongchao; Martone, Mario
Coulomb branch chiral rings of N = 2 SCFTs are conjectured to be freely generated. While no counter-example is known, no direct evidence for the conjecture is known either. We initiate a systematic study of SCFTs with Coulomb branch chiral rings satisfying non-trivial relations, restricting our analysis to rank 1. The main result of our study is that (rank-1) SCFTs with non-freely generated CB chiral rings when deformed by relevant deformations, always flow to theories with non-freely generated CB rings. This implies that if they exist, they must thus form a distinct subset under RG flows. We also nd manymore » interesting characteristic properties that these putative theories satisfy which may be helpful in proving or disproving their existence using other methods.« less
Douglas, Thomas
2008-01-01
Opponents of biomedical enhancement often claim that, even if such enhancement would benefit the enhanced, it would harm others. But this objection looks unpersuasive when the enhancement in question is a moral enhancement — an enhancement that will expectably leave the enhanced person with morally better motives than she had previously. In this article I (1) describe one type of psychological alteration that would plausibly qualify as a moral enhancement, (2) argue that we will, in the medium-term future, probably be able to induce such alterations via biomedical intervention, and (3) defend future engagement in such moral enhancements against possible objections. My aim is to present this kind of moral enhancement as a counter-example to the view that biomedical enhancement is always morally impermissible. PMID:19132138
The right-hand side of the Jacobi identity: to be naught or not to be ?
NASA Astrophysics Data System (ADS)
Kiselev, Arthemy V.
2016-01-01
The geometric approach to iterated variations of local functionals -e.g., of the (master-)action functional - resulted in an extension of the deformation quantisation technique to the set-up of Poisson models of field theory. It also allowed of a rigorous proof for the main inter-relations between the Batalin-Vilkovisky (BV) Laplacian Δ and variational Schouten bracket [,]. The ad hoc use of these relations had been a known analytic difficulty in the BV- formalism for quantisation of gauge systems; now achieved, the proof does actually not require the assumption of graded-commutativity. Explained in our previous work, geometry's self- regularisation is rendered by Gel'fand's calculus of singular linear integral operators supported on the diagonal. We now illustrate that analytic technique by inspecting the validity mechanism for the graded Jacobi identity which the variational Schouten bracket does satisfy (whence Δ2 = 0, i.e., the BV-Laplacian is a differential acting in the algebra of local functionals). By using one tuple of three variational multi-vectors twice, we contrast the new logic of iterated variations - when the right-hand side of Jacobi's identity vanishes altogether - with the old method: interlacing its steps and stops, it could produce some non-zero representative of the trivial class in the top- degree horizontal cohomology. But we then show at once by an elementary counterexample why, in the frames of the old approach that did not rely on Gel'fand's calculus, the BV-Laplacian failed to be a graded derivation of the variational Schouten bracket.
From Inductive Reasoning to Proof
ERIC Educational Resources Information Center
Yopp, David A.
2009-01-01
Mathematical proof is an expression of deductive reasoning (drawing conclusions from previous assertions). However, it is often inductive reasoning (conclusions drawn on the basis of examples) that helps learners form their deductive arguments, or proof. In addition, not all inductive arguments generate more formal arguments. This article draws a…
Seiberg-Witten geometries for Coulomb branch chiral rings which are not freely generated
Argyres, Philip C.; Lü, Yongchao; Martone, Mario
2017-06-27
Coulomb branch chiral rings of N = 2 SCFTs are conjectured to be freely generated. While no counter-example is known, no direct evidence for the conjecture is known either. We initiate a systematic study of SCFTs with Coulomb branch chiral rings satisfying non-trivial relations, restricting our analysis to rank 1. The main result of our study is that (rank-1) SCFTs with non-freely generated CB chiral rings when deformed by relevant deformations, always flow to theories with non-freely generated CB rings. This implies that if they exist, they must thus form a distinct subset under RG flows. We also nd manymore » interesting characteristic properties that these putative theories satisfy which may be helpful in proving or disproving their existence using other methods.« less
Uniqueness of the joint measurement and the structure of the set of compatible quantum measurements
NASA Astrophysics Data System (ADS)
Guerini, Leonardo; Terra Cunha, Marcelo
2018-04-01
We address the problem of characterising the compatible tuples of measurements that admit a unique joint measurement. We derive a uniqueness criterion based on the method of perturbations and apply it to show that extremal points of the set of compatible tuples admit a unique joint measurement, while all tuples that admit a unique joint measurement lie in the boundary of such a set. We also provide counter-examples showing that none of these properties are both necessary and sufficient, thus completely describing the relation between the joint measurement uniqueness and the structure of the compatible set. As a by-product of our investigations, we completely characterise the extremal and boundary points of the set of general tuples of measurements and of the subset of compatible tuples.
On optimal soft-decision demodulation. [in digital communication system
NASA Technical Reports Server (NTRS)
Lee, L.-N.
1976-01-01
A necessary condition is derived for optimal J-ary coherent demodulation of M-ary (M greater than 2) signals. Optimality is defined as maximality of the symmetric cutoff rate of the resulting discrete memoryless channel. Using a counterexample, it is shown that the condition derived is generally not sufficient for optimality. This condition is employed as the basis for an iterative optimization method to find the optimal demodulator decision regions from an initial 'good guess'. In general, these regions are found to be bounded by hyperplanes in likelihood space; the corresponding regions in signal space are found to have hyperplane asymptotes for the important case of additive white Gaussian noise. Some examples are presented, showing that the regions in signal space bounded by these asymptotic hyperplanes define demodulator decision regions that are virtually optimal.
Coloured Petri Net Refinement Specification and Correctness Proof with Coq
NASA Technical Reports Server (NTRS)
Choppy, Christine; Mayero, Micaela; Petrucci, Laure
2009-01-01
In this work, we address the formalisation of symmetric nets, a subclass of coloured Petri nets, refinement in COQ. We first provide a formalisation of the net models, and of their type refinement in COQ. Then the COQ proof assistant is used to prove the refinement correctness lemma. An example adapted from a protocol example illustrates our work.
NASA Astrophysics Data System (ADS)
Huf, P. A.; Carminati, J.
2018-01-01
In this paper we explore the use of a new algebraic software package in providing independent covariant proof of a conjecture in general relativity. We examine the proof of two sub-cases of the shear-free conjecture σ =0 => ω Θ =0 by Senovilla et al. (Gen. Relativ. Gravit 30:389-411, 1998): case 1: for dust; case 2: for acceleration parallel to vorticity. We use TensorPack, a software package recently released for the Maple environment. In this paper, we briefly summarise the key features of the software and then demonstrate its use by providing and discussing examples of independent proofs of the paper in question. A full set of our completed proofs is available online at http://www.bach2roq.com/science/maths/GR/ShearFreeProofs.html. We are in agreeance with the equations provided in the original paper, noting that the proofs often require many steps. Furthermore, in our proofs we provide fully worked algebraic steps in such a way that the proofs can be examined systematically, and avoiding hand calculation. It is hoped that the elucidated proofs may be of use to other researchers in verifying the algebraic consistency of the expressions in the paper in question, as well as related literature. Furthermore we suggest that the appropriate use of algebraic software in covariant formalism could be useful for developing research and teaching in GR theory.
ERIC Educational Resources Information Center
Pourciau, Bruce
2018-01-01
In a first proof-oriented mathematics course, students will often ask questions--for example, "What is this problem asking me to do?" or "What would a proof of this even look like"--that have more to do with logic than mathematics. The logical structure of a proof is a dance involving those basic logical forms--such as "p…
Proof in Algebra: Reasoning beyond Examples
ERIC Educational Resources Information Center
Otten, Samuel; Herbel-Eisenmann, Beth A.; Males, Lorraine M.
2010-01-01
The purpose of this article is to provide an image of what proof could look like in beginning algebra, a course that nearly every secondary school student encounters. The authors present an actual classroom vignette in which a rich opportunity for student reasoning arose. After analyzing the proof schemes at play, the authors provide a…
Computerized proof techniques for undergraduates
NASA Astrophysics Data System (ADS)
Smith, Christopher J.; Tefera, Akalu; Zeleke, Aklilu
2012-12-01
The use of computer algebra systems such as Maple and Mathematica is becoming increasingly important and widespread in mathematics learning, teaching and research. In this article, we present computerized proof techniques of Gosper, Wilf-Zeilberger and Zeilberger that can be used for enhancing the teaching and learning of topics in discrete mathematics. We demonstrate by examples how one can use these computerized proof techniques to raise students' interests in the discovery and proof of mathematical identities and enhance their problem-solving skills.
Learning using privileged information: SVM+ and weighted SVM.
Lapin, Maksim; Hein, Matthias; Schiele, Bernt
2014-05-01
Prior knowledge can be used to improve predictive performance of learning algorithms or reduce the amount of data required for training. The same goal is pursued within the learning using privileged information paradigm which was recently introduced by Vapnik et al. and is aimed at utilizing additional information available only at training time-a framework implemented by SVM+. We relate the privileged information to importance weighting and show that the prior knowledge expressible with privileged features can also be encoded by weights associated with every training example. We show that a weighted SVM can always replicate an SVM+ solution, while the converse is not true and we construct a counterexample highlighting the limitations of SVM+. Finally, we touch on the problem of choosing weights for weighted SVMs when privileged features are not available. Copyright © 2014 Elsevier Ltd. All rights reserved.
Accounting for Proof Test Data in a Reliability Based Design Optimization Framework
NASA Technical Reports Server (NTRS)
Ventor, Gerharad; Scotti, Stephen J.
2012-01-01
This paper investigates the use of proof (or acceptance) test data during the reliability based design optimization of structural components. It is assumed that every component will be proof tested and that the component will only enter into service if it passes the proof test. The goal is to reduce the component weight, while maintaining high reliability, by exploiting the proof test results during the design process. The proposed procedure results in the simultaneous design of the structural component and the proof test itself and provides the designer with direct control over the probability of failing the proof test. The procedure is illustrated using two analytical example problems and the results indicate that significant weight savings are possible when exploiting the proof test results during the design process.
Reasoning strategies modulate gender differences in emotion processing.
Markovits, Henry; Trémolière, Bastien; Blanchette, Isabelle
2018-01-01
The dual strategy model of reasoning has proposed that people's reasoning can be understood asa combination of two different ways of processing information related to problem premises: a counterexample strategy that examines information for explicit potential counterexamples and a statistical strategy that uses associative access to generate a likelihood estimate of putative conclusions. Previous studies have examined this model in the context of basic conditional reasoning tasks. However, the information processing distinction that underlies the dual strategy model can be seen asa basic description of differences in reasoning (similar to that described by many general dual process models of reasoning). In two studies, we examine how these differences in reasoning strategy may relate to processing very different information, specifically we focus on previously observed gender differences in processing negative emotions. Study 1 examined the intensity of emotional reactions to a film clip inducing primarily negative emotions. Study 2 examined the speed at which participants determine the emotional valence of sequences of negative images. In both studies, no gender differences were observed among participants using a counterexample strategy. Among participants using a statistical strategy, females produce significantly stronger emotional reactions than males (in Study 1) and were faster to recognize the valence of negative images than were males (in Study 2). Results show that the processing distinction underlying the dual strategy model of reasoning generalizes to the processing of emotions. Copyright © 2017 Elsevier B.V. All rights reserved.
Physical and Economic Feasibility of Nonstructural Flood Plain Management Measures,
1978-03-01
5. U.S. Army Engineers, "Flood Proofing: Example of Raising a Private Residence", South Atlantic Division, Technical Services Report, March 1977. 6...Army Engineers, "Flood Proofing: Example of Raising a Private Residence", South Atlantic Division, Technical Services Report, March 1977. 25 . .. .. .i 0...10,000 (except below) Alaska, Hawaii, Guam, and 50,000 10,000 Virgin Islands Other Residential (except single-family) All states and jurisdictions
Consistency of a counterexample to Naimark's problem
Akemann, Charles; Weaver, Nik
2004-01-01
We construct a C*-algebra that has only one irreducible representation up to unitary equivalence but is not isomorphic to the algebra of compact operators on any Hilbert space. This answers an old question of Naimark. Our construction uses a combinatorial statement called the diamond principle, which is known to be consistent with but not provable from the standard axioms of set theory (assuming that these axioms are consistent). We prove that the statement “there exists a counterexample to Naimark's problem which is generated by \\documentclass[10pt]{article} \\usepackage{amsmath} \\usepackage{wasysym} \\usepackage{amsfonts} \\usepackage{amssymb} \\usepackage{amsbsy} \\usepackage{mathrsfs} \\usepackage{pmc} \\usepackage[Euler]{upgreek} \\pagestyle{empty} \\oddsidemargin -1.0in \\begin{document} \\begin{equation*}{\\aleph}_{1}\\end{equation*}\\end{document} elements” is undecidable in standard set theory. PMID:15131270
ERIC Educational Resources Information Center
Ugurel, Isikhan; Morali, H. Sevgi; Karahan, Ozge; Boz, Burcak
2016-01-01
The purpose of this study is to describe the procedure and examples of visual proofs (VP-or proof without words) developed by gifted mathematics secondary school students after their experiences. The participants of this study are three male 9th grade students enrolled in a private science high school. In the first stage of the research a briefing…
Optimal periodic proof test based on cost-effective and reliability criteria
NASA Technical Reports Server (NTRS)
Yang, J.-N.
1976-01-01
An exploratory study for the optimization of periodic proof tests for fatigue-critical structures is presented. The optimal proof load level and the optimal number of periodic proof tests are determined by minimizing the total expected (statistical average) cost, while the constraint on the allowable level of structural reliability is satisfied. The total expected cost consists of the expected cost of proof tests, the expected cost of structures destroyed by proof tests, and the expected cost of structural failure in service. It is demonstrated by numerical examples that significant cost saving and reliability improvement for fatigue-critical structures can be achieved by the application of the optimal periodic proof test. The present study is relevant to the establishment of optimal maintenance procedures for fatigue-critical structures.
Using Composition Techniques To Improve Classroom Instruction and Students' Understanding of Proof.
ERIC Educational Resources Information Center
Goff, Christopher Dale
2002-01-01
Describes an effort to incorporate standard composition exercises into a sophomore-level discrete mathematics class. Provides an example of how peer review can be integrated with a mathematical curriculum through the writing of proofs. (Author/KHR)
ESP: Teaching "Scientific Method" by Counterexample
ERIC Educational Resources Information Center
Blatt, S. L.
1975-01-01
Offers a course description of an introductory course in physics for nonscientists. The history of research into extrasensory perception is used as evidence of the scientific method. Lecture demonstrations are discussed. (Author/CP)
2016-02-01
proof in mathematics. For example, consider the proof of the Pythagorean Theorem illustrated at: http://www.cut-the-knot.org/ pythagoras / where 112...methods and tools have made significant progress in their ability to model software designs and prove correctness theorems about the systems modeled...assumption criticality” or “ theorem root set size” SITAPS detects potentially brittle verification cases. SITAPS provides tools and techniques that
Photosynthate partitioning during flowering in relation to senescence of spinach
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sklensky, D.; Davies, P.J.
1990-05-01
Male spinach plants are frequently cited as a counter-example to the nutrient drain hypothesis. Photosynthate partitioning in both male and female plants was examined. Leaves just below the inflorescences in plants at various stages of flowering were labelled with {sup 14}CO{sub 2} and the photosynthate allowed to partition for three hours. The leaves, flowers and stems of the inflorescence, and the other above ground vegetative tissue were harvested. These parts were combusted in a sample oxidizer for the collection of the {sup 14}CO{sub 2}. Allocation to the male and female flowers at very early stages are similar. As the flowersmore » develop further, male flowers receive more photosynthate than do female flowers in early fruit production. Thus it is possible that nutrient drain to the flowers in male spinach plants is sufficient to account for senescence.« less
Boundary perturbations coupled to core 3/2 tearing modes on the DIII-D tokamak
NASA Astrophysics Data System (ADS)
Tobias, B.; Yu, L.; Domier, C. W.; Luhmann, N. C., Jr.; Austin, M. E.; Paz-Soldan, C.; Turnbull, A. D.; Classen, I. G. J.; the DIII-D Team
2013-09-01
High confinement (H-mode) discharges on the DIII-D tokamak are routinely subject to the formation of long-lived, non-disruptive magnetic islands that degrade confinement and limit fusion performance. Simultaneous, 2D measurement of electron temperature fluctuations in the core and edge regions allows for reconstruction of the radially resolved poloidal mode number spectrum and phase of the global plasma response associated with these modes. Coherent, n = 2 excursions of the plasma boundary are found to be the result of coupling to an n = 2, kink-like mode which arises locked in phase to the 3/2 island chain. This coupling dictates the relative phase of the displacement at the boundary with respect to the tearing mode. This unambiguous phase relationship, for which no counter-examples are observed, is presented as a test for modeling of the perturbed fields to be expected outside the confined plasma.
Partially natural two Higgs doublet models
Draper, Patrick; Haber, Howard E.; Ruderman, Joshua T.
2016-06-21
It is possible that the electroweak scale is low due to the fine-tuning of microscopic parameters, which can result from selection effects. The experimental discovery of new light fundamental scalars other than the Standard Model Higgs boson would seem to disfavor this possibility, since generically such states imply parametrically worse fine-tuning with no compelling connection to selection effects. We discuss counterexamples where the Higgs boson is light because of fine-tuning, and a second scalar doublet is light because a discrete symmetry relates its mass to the mass of the Standard Model Higgs boson. Our examples require new vectorlike fermions atmore » the electroweak scale, and the models possess a rich electroweak vacuum structure. Furthermore, the mechanism that we discuss does not protect a small CP-odd Higgs mass in split or high-scale supersymmetry-breaking scenarios of the MSSM due to an incompatibility between the discrete symmetries and holomorphy.« less
A faster 1.375-approximation algorithm for sorting by transpositions.
Cunha, Luís Felipe I; Kowada, Luis Antonio B; Hausen, Rodrigo de A; de Figueiredo, Celina M H
2015-11-01
Sorting by Transpositions is an NP-hard problem for which several polynomial-time approximation algorithms have been developed. Hartman and Shamir (2006) developed a 1.5-approximation [Formula: see text] algorithm, whose running time was improved to O(nlogn) by Feng and Zhu (2007) with a data structure they defined, the permutation tree. Elias and Hartman (2006) developed a 1.375-approximation O(n(2)) algorithm, and Firoz et al. (2011) claimed an improvement to the running time, from O(n(2)) to O(nlogn), by using the permutation tree. We provide counter-examples to the correctness of Firoz et al.'s strategy, showing that it is not possible to reach a component by sufficient extensions using the method proposed by them. In addition, we propose a 1.375-approximation algorithm, modifying Elias and Hartman's approach with the use of permutation trees and achieving O(nlogn) time.
A caveat concerning center of resistance
Nägerl, Hans; Kubein-Meesenburg, Dietmar
2013-01-01
The center of resistance is a concept in theoretical orthodontics used to describe tooth movement under loads. It is commonly used to qualitatively predict tooth movement without recourse to complex equations or simulations. We start with a survey of the historical origin of the technical term. After this, the periodontal ligament is idealized as a linear elastic suspension. The mathematical formalism of vector and tensor calculus will clarify our reasoning. We show that a point such as the center of resistance basically only exists in two dimensions or in very special symmetric spatial configurations. In three dimensions, a simple counterexample of a suspension without a center of resistance is given. A second more tooth-like example illustrates the magnitude of the effects in question in dentistry. In conclusion, the center of resistance should be replaced by a newer and wider mathematical concept, the “center of elasticity,” together with a limiting parameter, the “radius of resistance.” PMID:24019849
What's in a name? Nominative determinism in the UK dental workforce.
Sleigh, J
2016-12-16
Background Nominative determinism describes the theory that people are more likely to pursue careers that are connected to their names. Compelling research has been carried out across the medical professions that provides strong evidence for this phenomenon, but as yet its applicability to the UK dental workforce remains unknown.Aim The aim of this study was to establish the prevalence of dentally-related surnames in the UK dental workforce (dentists and dental care professionals) and compare this to the UK population.Results Dentistry may provide a surprising counter-example to prevailing theories of nominative determinism, as UK dentists are significantly less likely than the UK general population to have dentally-related surnames. This new phenomenon of 'nominative antideterminism' was not observed in the dental care professional (DCP) cohort, for whom the prevalence of dentally-related surnames was similar to that in the wider UK population.
Code of Federal Regulations, 2014 CFR
2014-04-01
... decimal point one place to the left; that for 8 pounds from the column 800 pounds by moving the decimal point two places to the left. Example. A package of spirits at 86 proof weighed 3211/2 pounds net. We... to the left; that for 1 pound from the column 100 pounds by moving the decimal point two places to...
Code of Federal Regulations, 2013 CFR
2013-04-01
... decimal point one place to the left; that for 8 pounds from the column 800 pounds by moving the decimal point two places to the left. Example. A package of spirits at 86 proof weighed 3211/2 pounds net. We... to the left; that for 1 pound from the column 100 pounds by moving the decimal point two places to...
Code of Federal Regulations, 2011 CFR
2011-04-01
... decimal point one place to the left; that for 8 pounds from the column 800 pounds by moving the decimal point two places to the left. Example. A package of spirits at 86 proof weighed 3211/2 pounds net. We... to the left; that for 1 pound from the column 100 pounds by moving the decimal point two places to...
Code of Federal Regulations, 2012 CFR
2012-04-01
... decimal point one place to the left; that for 8 pounds from the column 800 pounds by moving the decimal point two places to the left. Example. A package of spirits at 86 proof weighed 3211/2 pounds net. We... to the left; that for 1 pound from the column 100 pounds by moving the decimal point two places to...
Code of Federal Regulations, 2010 CFR
2010-04-01
... decimal point one place to the left; that for 8 pounds from the column 800 pounds by moving the decimal point two places to the left. Example. A package of spirits at 86 proof weighed 3211/2 pounds net. We... to the left; that for 1 pound from the column 100 pounds by moving the decimal point two places to...
Reliability analysis of structures under periodic proof tests in service
NASA Technical Reports Server (NTRS)
Yang, J.-N.
1976-01-01
A reliability analysis of structures subjected to random service loads and periodic proof tests treats gust loads and maneuver loads as random processes. Crack initiation, crack propagation, and strength degradation are treated as the fatigue process. The time to fatigue crack initiation and ultimate strength are random variables. Residual strength decreases during crack propagation, so that failure rate increases with time. When a structure fails under periodic proof testing, a new structure is built and proof-tested. The probability of structural failure in service is derived from treatment of all the random variables, strength degradations, service loads, proof tests, and the renewal of failed structures. Some numerical examples are worked out.
Cultivating Deductive Thinking with Angle Chasing
ERIC Educational Resources Information Center
Edwards, Michael todd; Quinlan, James; Harper, Suzanne R.; Cox, Dana C.; Phelps, Steve
2014-01-01
Despite Common Core State Standards for Mathematics (CCSSI 2010) recommendations, too often students' introduction to proof consists of the study of formal axiomatic systems--for example, triangle congruence proofs--typically in an introductory geometry course with no connection back to previous work in earlier algebra courses. Van Hiele…
Centromeres of filamentous fungi.
Smith, Kristina M; Galazka, Jonathan M; Phatale, Pallavi A; Connolly, Lanelle R; Freitag, Michael
2012-07-01
How centromeres are assembled and maintained remains one of the fundamental questions in cell biology. Over the past 20 years, the idea of centromeres as precise genetic loci has been replaced by the realization that it is predominantly the protein complement that defines centromere localization and function. Thus, placement and maintenance of centromeres are excellent examples of epigenetic phenomena in the strict sense. In contrast, the highly derived "point centromeres" of the budding yeast Saccharomyces cerevisiae and its close relatives are counter-examples for this general principle of centromere maintenance. While we have learned much in the past decade, it remains unclear if mechanisms for epigenetic centromere placement and maintenance are shared among various groups of organisms. For that reason, it seems prudent to examine species from many different phylogenetic groups with the aim to extract comparative information that will yield a more complete picture of cell division in all eukaryotes. This review addresses what has been learned by studying the centromeres of filamentous fungi, a large, heterogeneous group of organisms that includes important plant, animal and human pathogens, saprobes, and symbionts that fulfill essential roles in the biosphere, as well as a growing number of taxa that have become indispensable for industrial use.
NASA Astrophysics Data System (ADS)
Iturriaga, Leonelo; Massa, Eugenio
2018-01-01
In this paper, we propose a counterexample to the validity of the comparison principle and of the sub- and supersolution method for nonlocal problems like the stationary Kirchhoff equation. This counterexample shows that in general smooth bounded domains in any dimension, these properties cannot hold true if the nonlinear nonlocal term M (∥u∥ 2 ) is somewhere increasing with respect to the H01-norm of the solution. Comparing with the existing results, this fills a gap between known conditions on M that guarantee or prevent these properties and leads to a condition that is necessary and sufficient for the validity of the comparison principle. It is worth noting that equations similar to the one considered here have gained interest recently for appearing in models of thermo-convective flows of non-Newtonian fluids or of electrorheological fluids, among others.
Tunneling and speedup in quantum optimization for permutation-symmetric problems
Muthukrishnan, Siddharth; Albash, Tameem; Lidar, Daniel A.
2016-07-21
Tunneling is often claimed to be the key mechanism underlying possible speedups in quantum optimization via quantum annealing (QA), especially for problems featuring a cost function with tall and thin barriers. We present and analyze several counterexamples from the class of perturbed Hamming weight optimization problems with qubit permutation symmetry. We first show that, for these problems, the adiabatic dynamics that make tunneling possible should be understood not in terms of the cost function but rather the semiclassical potential arising from the spin-coherent path-integral formalism. We then provide an example where the shape of the barrier in the final costmore » function is short and wide, which might suggest no quantum advantage for QA, yet where tunneling renders QA superior to simulated annealing in the adiabatic regime. However, the adiabatic dynamics turn out not be optimal. Instead, an evolution involving a sequence of diabatic transitions through many avoided-level crossings, involving no tunneling, is optimal and outperforms adiabatic QA. We show that this phenomenon of speedup by diabatic transitions is not unique to this example, and we provide an example where it provides an exponential speedup over adiabatic QA. In yet another twist, we show that a classical algorithm, spin-vector dynamics, is at least as efficient as diabatic QA. Lastly, in a different example with a convex cost function, the diabatic transitions result in a speedup relative to both adiabatic QA with tunneling and classical spin-vector dynamics.« less
Tunneling and speedup in quantum optimization for permutation-symmetric problems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Muthukrishnan, Siddharth; Albash, Tameem; Lidar, Daniel A.
Tunneling is often claimed to be the key mechanism underlying possible speedups in quantum optimization via quantum annealing (QA), especially for problems featuring a cost function with tall and thin barriers. We present and analyze several counterexamples from the class of perturbed Hamming weight optimization problems with qubit permutation symmetry. We first show that, for these problems, the adiabatic dynamics that make tunneling possible should be understood not in terms of the cost function but rather the semiclassical potential arising from the spin-coherent path-integral formalism. We then provide an example where the shape of the barrier in the final costmore » function is short and wide, which might suggest no quantum advantage for QA, yet where tunneling renders QA superior to simulated annealing in the adiabatic regime. However, the adiabatic dynamics turn out not be optimal. Instead, an evolution involving a sequence of diabatic transitions through many avoided-level crossings, involving no tunneling, is optimal and outperforms adiabatic QA. We show that this phenomenon of speedup by diabatic transitions is not unique to this example, and we provide an example where it provides an exponential speedup over adiabatic QA. In yet another twist, we show that a classical algorithm, spin-vector dynamics, is at least as efficient as diabatic QA. Lastly, in a different example with a convex cost function, the diabatic transitions result in a speedup relative to both adiabatic QA with tunneling and classical spin-vector dynamics.« less
Lakatos' Proofs and Refutations Comes Alive in an Elementary Classroom.
ERIC Educational Resources Information Center
Atkins, Sandra L.
1997-01-01
Presents an alternative pedagogy implicit in Imre Lakatos's "Proofs and Refutations: The Logic of Mathematical Discovery." Lakatos reveals that learning mathematics is a discourse-laden activity in which it is acceptable, if not preferable, to refute conjecture. Provides examples of using a Lakatosian approach in an elementary classroom.…
Roberts, Melinda A
2003-01-01
Broome and others have argued that it makes no sense, or at least that it cannot be true, to say that it is better for a given person that he or she exist than not. That argument can be understood to suggest that, likewise, it makes no sense, or at least that it cannot be true, to say that it is worse for a given person that he or she exist than that he or she never have existed at all. This argument is of critical importance to the question of whether consequentialist theory should take a traditional, aggregative form or a less conventional, person-affecting, or person-based form. I believe that, potentially, the argument represents a far more serious threat to the person-based approach than does, for example, Parfit's two medical programmes example. Parfit's example nicely illuminates the distinction between aggregative and person-based approaches and raises important questions. But the example--though not, I think, by Parfit--is sometimes pressed into service as a full-fledged counterexample against the person-based approach. As such, I argue, the example is not persuasive. In contrast, the Broomeian argument, if correct, is definitive. For that argument relies on certain metaphysical assumptions and various uncontroversial normative claims--and hence nicely avoids putting into play the controversial normative claims that lie at the very heart of the debate. The purpose of the present paper, then, is to evaluate the Broomeian argument. I argue that this potentially definitive challenge to a person-based approach does not in fact succeed.
Identification of P/S-wave successions for application in microseismicity
NASA Astrophysics Data System (ADS)
Deflandre, J.-P.; Dubesset, M.
1992-09-01
Interpretation of P/S-wave successions is used in induced or passive microseismicity. It makes the location of microseismic events possible when the triangulation technique cannot be used. To improve the reliability of the method, we propose a technique that identifies the P/S-wave successions among recorded wave successions. A polarization software is used to verify the orthogonality between the P and S polarization axes. The polarization parameters are computed all along the 3-component acoustic signal. Then the algorithm detects time windows within which the signal polarization axis is perpendicular to the polarization axis of the wave in the reference time window (representative of the P wave). The technique is demonstrated for a synthetic event, and three application cases are presented. The first one corresponds to a calibration shot within which the arrivals of perpendicularly polarized waves are correctly detected in spite of their moderate amplitude. The second example presents a microseismic event recorded during gas withdrawal from an underground gas storage reservoir. The last example is chosen as a counter-example, concerning a microseismic event recorded during a hydraulic fracturing job. The detection algorithm reveals that, in this case, the wave succession does not correspond to a P/S one. This implies that such an event must not be located by the method based on the interpretation of a P/S-wave succession as no such a succession is confirmed.
Break-Even Point for a Proof Slip Operation
ERIC Educational Resources Information Center
Anderson, James F.
1972-01-01
Break-even analysis is applied to determine what magnitude of titles added per year is sufficient to utilize economically Library of Congress proof slips and a Xerox 914 copying machine in the cataloging operation of a library. A formula is derived, and an example of its use is given. (1 reference) (Author/SJ)
Dynamic geometry as a context for exploring conjectures
NASA Astrophysics Data System (ADS)
Wares, Arsalan
2018-01-01
The purpose of this paper is to provide examples of 'non-traditional' proof-related activities that can explored in a dynamic geometry environment by university and high school students of mathematics. These propositions were encountered in the dynamic geometry environment. The author believes that teachers can ask their students to construct proofs for these propositions.
On the degree conjecture for separability of multipartite quantum states
NASA Astrophysics Data System (ADS)
Hassan, Ali Saif M.; Joag, Pramod S.
2008-01-01
We settle the so-called degree conjecture for the separability of multipartite quantum states, which are normalized graph Laplacians, first given by Braunstein et al. [Phys. Rev. A 73, 012320 (2006)]. The conjecture states that a multipartite quantum state is separable if and only if the degree matrix of the graph associated with the state is equal to the degree matrix of the partial transpose of this graph. We call this statement to be the strong form of the conjecture. In its weak version, the conjecture requires only the necessity, that is, if the state is separable, the corresponding degree matrices match. We prove the strong form of the conjecture for pure multipartite quantum states using the modified tensor product of graphs defined by Hassan and Joag [J. Phys. A 40, 10251 (2007)], as both necessary and sufficient condition for separability. Based on this proof, we give a polynomial-time algorithm for completely factorizing any pure multipartite quantum state. By polynomial-time algorithm, we mean that the execution time of this algorithm increases as a polynomial in m, where m is the number of parts of the quantum system. We give a counterexample to show that the conjecture fails, in general, even in its weak form, for multipartite mixed states. Finally, we prove this conjecture, in its weak form, for a class of multipartite mixed states, giving only a necessary condition for separability.
Guidelines for Proof Test Analysis
NASA Technical Reports Server (NTRS)
Chell, G. G.; McClung, R. C.; Kuhlman, C. J.; Russell, D. A.; Garr, K.; Donnelly, B.
1999-01-01
These guidelines integrate state-of-the-art elastic-plastic fracture mechanics (EPFM) and proof test implementation issues into a comprehensive proof test analysis procedure in the form of a road map which identifies the types of data, fracture mechanics based parameters, and calculations needed to perform flaw screening and minimum proof load analyses of fracture critical components. Worked examples are presented to illustrate the application of the road map to proof test analysis. The state-of-the art fracture technology employed in these guidelines is based on the EPFM parameter, J, and a pictorial representation of a J fracture analysis, called the failure assessment diagram (FAD) approach. The recommended fracture technology is validated using finite element J results, and laboratory and hardware fracture test results on the nickel-based superalloy Inconel 718, the aluminum alloy 2024-T3511, and ferritic pressure vessel steels. In all cases the laboratory specimens and hardware failed by ductile mechanisms. Advanced proof test analyses involving probability analysis and multiple-cycle proof testing (MCPT) are addressed. Finally, recommendations are provided on how to account for the effects of the proof test overload on subsequent service fatigue and fracture behaviors.
Conjecturing, Generalizing and Justifying: Building Theory around Teacher Knowledge of Proving
ERIC Educational Resources Information Center
Lesseig, Kristin
2016-01-01
The purpose of this study was to detail teachers' proving activity and contribute to a framework of Mathematical Knowledge for Teaching Proof (MKT for Proof). While working to justify claims about sums of consecutive numbers, teachers searched for key ideas and productively used examples to make, test and refine conjectures. Analysis of teachers'…
Where There Are No Rules or Systems to Guide Us: Argument from Example in a Hermeneutic Rhetoric
ERIC Educational Resources Information Center
Arthos, John
2003-01-01
Many rhetoricians treat argument from example as a kind of induction, an illustration of a general principle. Although this is one function of example, consistent with Aristotle's statements about the paradeigma and "The New Rhetoric's" "argumentation by example," it camouflages the practice of exemplary proof that has contributed to our richest…
Deductive Updating Is Not Bayesian
ERIC Educational Resources Information Center
Markovits, Henry; Brisson, Janie; de Chantal, Pier-Luc
2015-01-01
One of the major debates concerning the nature of inferential reasoning is between counterexample-based theories such as mental model theory and probabilistic theories. This study looks at conclusion updating after the addition of statistical information to examine the hypothesis that deductive reasoning cannot be explained by probabilistic…
Experimental Validation of L1 Adaptive Control: Rohrs' Counterexample in Flight
NASA Technical Reports Server (NTRS)
Xargay, Enric; Hovakimyan, Naira; Dobrokhodov, Vladimir; Kaminer, Issac; Kitsios, Ioannis; Cao, Chengyu; Gregory, Irene M.; Valavani, Lena
2010-01-01
The paper presents new results on the verification and in-flight validation of an L1 adaptive flight control system, and proposes a general methodology for verification and validation of adaptive flight control algorithms. The proposed framework is based on Rohrs counterexample, a benchmark problem presented in the early 80s to show the limitations of adaptive controllers developed at that time. In this paper, the framework is used to evaluate the performance and robustness characteristics of an L1 adaptive control augmentation loop implemented onboard a small unmanned aerial vehicle. Hardware-in-the-loop simulations and flight test results confirm the ability of the L1 adaptive controller to maintain stability and predictable performance of the closed loop adaptive system in the presence of general (artificially injected) unmodeled dynamics. The results demonstrate the advantages of L1 adaptive control as a verifiable robust adaptive control architecture with the potential of reducing flight control design costs and facilitating the transition of adaptive control into advanced flight control systems.
Gauging the cosmic acceleration with recent type Ia supernovae data sets
NASA Astrophysics Data System (ADS)
Velten, Hermano; Gomes, Syrios; Busti, Vinicius C.
2018-04-01
We revisit a model-independent estimator for cosmic acceleration based on type Ia supernovae distance measurements. This approach does not rely on any specific theory for gravity, energy content, nor parametrization for the scale factor or deceleration parameter and is based on falsifying the null hypothesis that the Universe never expanded in an accelerated way. By generating mock catalogs of known cosmologies, we test the robustness of this estimator, establishing its limits of applicability. We detail the pros and cons of such an approach. For example, we find that there are specific counterexamples in which the estimator wrongly provides evidence against acceleration in accelerating cosmologies. The dependence of the estimator on the H0 value is also discussed. Finally, we update the evidence for acceleration using the recent UNION2.1 and Joint Light-Curve Analysis samples. Contrary to recent claims, available data strongly favor an accelerated expansion of the Universe in complete agreement with the standard Λ CDM model.
NASA Astrophysics Data System (ADS)
Yunes, Nicolas; Yagi, Kent; Stein, Leo
2016-03-01
Stars can be hairy beasts, especially in theories that go beyond Einstein's. In the latter, a scalar field can be sourced and anchored to a neutron star, and if the later is in a binary system, the scalar field will emit dipole radiation. This radiation removes energy from the binary, forcing the orbit to adiabatically decay much more rapidly than due to the emission of gravitational waves as predicted in General Relativity. The detailed radio observation of binary pulsars has constrained the orbital decay of compact binaries stringently, so much so that theories that predict neutron stars with scalar hair are believed to be essentially ruled out. In this talk I will explain why this ``lore'' is actually incorrect, providing a counter-example in which scalar hair is sourced by neutron stars, yet dipole radiation is absent. I will then describe what binary systems need to be observed to constrain such theories with future astrophysical observations. I acknowledge support from NSF CAREER Grant PHY-1250636.
Correcting the initialization of models with fractional derivatives via history-dependent conditions
NASA Astrophysics Data System (ADS)
Du, Maolin; Wang, Zaihua
2016-04-01
Fractional differential equations are more and more used in modeling memory (history-dependent, non-local, or hereditary) phenomena. Conventional initial values of fractional differential equations are defined at a point, while recent works define initial conditions over histories. We prove that the conventional initialization of fractional differential equations with a Riemann-Liouville derivative is wrong with a simple counter-example. The initial values were assumed to be arbitrarily given for a typical fractional differential equation, but we find one of these values can only be zero. We show that fractional differential equations are of infinite dimensions, and the initial conditions, initial histories, are defined as functions over intervals. We obtain the equivalent integral equation for Caputo case. With a simple fractional model of materials, we illustrate that the recovery behavior is correct with the initial creep history, but is wrong with initial values at the starting point of the recovery. We demonstrate the application of initial history by solving a forced fractional Lorenz system numerically.
Comment on "Nonuniqueness of algebraic first-order density-matrix functionals"
NASA Astrophysics Data System (ADS)
Gritsenko, O. V.
2018-02-01
Wang and Knowles (WK) [Phys. Rev. A 92, 012520 (2015), 10.1103/PhysRevA.92.012520] have given a counterexample to the conventional in reduced density-matrix functional theory representation of the second-order reduced density matrix (2RDM) Γi j ,k l in the basis of the natural orbitals as a function Γi j ,k l(n ) of the orbital occupation numbers (ONs) ni. The observed nonuniqueness of Γi j ,k l for prototype systems of different symmetry has been interpreted as the inherent inability of ON functions to reproduce the 2RDM, due to the insufficient information contained in the 1RDM spectrum. In this Comment, it is argued that, rather than totally invalidating Γi j ,k l(n ) , the WK example exposes its symmetry dependence which, as well as the previously established analogous dependence in density functional theory, is demonstrated with a general formulation based on the Levy constrained search.
An explanation of resisted discoveries based on construal-level theory.
Fang, Hui
2015-02-01
New discoveries and theories are crucial for the development of science, but they are often initially resisted by the scientific community. This paper analyses resistance to scientific discoveries that supplement previous research results or conclusions with new phenomena, such as long chains in macromolecules, Alfvén waves, parity nonconservation in weak interactions and quasicrystals. Construal-level theory is used to explain that the probability of new discoveries may be underestimated because of psychological distance. Thus, the insufficiently examined scope of an accepted theory may lead to overstating the suitable scope and underestimating the probability of its undiscovered counter-examples. Therefore, psychological activity can result in people instinctively resisting new discoveries. Direct evidence can help people judge the validity of a hypothesis with rational thinking. The effects of authorities and textbooks on the resistance to discoveries are also discussed. From the results of our analysis, suggestions are provided to reduce resistance to real discoveries, which will benefit the development of science.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Marolf, Donald; Palmer, Belkis Cabrera; Physics Department, Syracuse University, Syracuse, New York 13244
A thermodynamic argument is presented suggesting that near-extremal spinning D1-D5-P black strings become unstable when their angular momentum exceeds J{sub crit}=3Q{sub 1}Q{sub 5}/2{radical}(2). In contrast, the dimensionally reduced black holes are thermodynamically stable. The proposed instability involves a phase in which the spin angular momentum above J{sub crit} is transferred to gyration of the string in space, i.e., to orbital angular momentum of parts of the string about the mean location in space. Thus the string becomes a rotating helical coil. We note that an instability of this form would yield a counter-example to the Gubser-Mitra conjecture, which proposes amore » particular link between dynamic black string instabilities and the thermodynamics of black strings. There may also be other instabilities associated with radiation modes of various fields. Our arguments also apply to the D-brane bound states associated with these black strings in weakly coupled string theory.« less
Micromachined low frequency rocking accelerometer with capacitive pickoff
Lee, Abraham P.; Simon, Jonathon N.; McConaghy, Charles F.
2001-01-01
A micro electro mechanical sensor that uses capacitive readout electronics. The sensor involves a micromachined low frequency rocking accelerometer with capacitive pickoff fabricated by deep reactive ion etching. The accelerometer includes a central silicon proof mass, is suspended by a thin polysilicon tether, and has a moving electrode (capacitor plate or interdigitated fingers) located at each end the proof mass. During movement (acceleration), the tethered mass moves relative to the surrounding packaging, for example, and this defection is measured capacitively by a plate capacitor or interdigitated finger capacitor, having the cooperating fixed electrode (capacitor plate or interdigitated fingers) positioned on the packaging, for example. The micromachined rocking accelerometer has a low frequency (<500 Hz), high sensitivity (.mu.G), with minimal power usage. The capacitors are connected to a power supply (battery) and to sensor interface electronics, which may include an analog to digital (A/D) converter, logic, RF communication link, antenna, etc. The sensor (accelerometer) may be, for example, packaged along with the interface electronics and a communication system in a 2".times.2".times.2" cube. The proof mass may be asymmetric or symmetric. Additional actuating capacitive plates may be used for feedback control which gives a greater dynamic range.
15 CFR Appendix D to Part 30 - AES Filing Citation, Exemption and Exclusion Legends
Code of Federal Regulations, 2013 CFR
2013-01-01
... 15 Commerce and Foreign Trade 1 2013-01-01 2013-01-01 false AES Filing Citation, Exemption and... Appendix D to Part 30—AES Filing Citation, Exemption and Exclusion Legends I. USML Proof of Filing Citation AES ITN Example: AES X20060101987654. II. AES Proof of Filing Citation subpart A § 30.7 AES ITN...
15 CFR Appendix D to Part 30 - AES Filing Citation, Exemption and Exclusion Legends
Code of Federal Regulations, 2011 CFR
2011-01-01
... 15 Commerce and Foreign Trade 1 2011-01-01 2011-01-01 false AES Filing Citation, Exemption and... Appendix D to Part 30—AES Filing Citation, Exemption and Exclusion Legends I. USML Proof of Filing Citation AES ITN Example: AES X20060101987654. II. AES Proof of Filing Citation subpart A § 30.7 AES ITN...
15 CFR Appendix D to Part 30 - AES Filing Citation, Exemption and Exclusion Legends
Code of Federal Regulations, 2012 CFR
2012-01-01
... 15 Commerce and Foreign Trade 1 2012-01-01 2012-01-01 false AES Filing Citation, Exemption and... Appendix D to Part 30—AES Filing Citation, Exemption and Exclusion Legends I. USML Proof of Filing Citation AES ITN Example: AES X20060101987654. II. AES Proof of Filing Citation subpart A § 30.7 AES ITN...
15 CFR Appendix D to Part 30 - AES Filing Citation, Exemption and Exclusion Legends
Code of Federal Regulations, 2014 CFR
2014-01-01
... 15 Commerce and Foreign Trade 1 2014-01-01 2014-01-01 false AES Filing Citation, Exemption and... Appendix D to Part 30—AES Filing Citation, Exemption and Exclusion Legends I. USML Proof of Filing Citation AES ITN Example: AES X20060101987654. II. AES Proof of Filing Citation subpart A § 30.7 AES ITN...
The Correspondence Principle Revisited.
ERIC Educational Resources Information Center
Liboff, Richard L.
1984-01-01
Addresses the question of frequency correspondence in the domain of large quantum numbers, with reference to periodic systems. Provides two simple counterexamples (a particle in a cubical box and a rigid rotator) to show that the classical result is not always recovered in the limit of large quantum numbers. (JM)
NASA Contractor Report: Guidelines for Proof Test Analysis
NASA Technical Reports Server (NTRS)
Chell, G. G.; McClung, R. C.; Kuhlman, C. J.; Russell, D. A.; Garr, K.; Donnelly, B.
1997-01-01
These Guidelines integrate state-of-the-art Elastic-Plastic Fracture Mechanics (EPFM) and proof test implementation issues into a comprehensive proof test analysis procedure in the form of a Road Map which identifies the types of data, fracture mechanics based parameters, and calculations needed to perform flaw screening and minimum proof load analyses of fracture critical components. Worked examples are presented to illustrate the application of the Road Map to proof test analysis. The state-of-the-art fracture technology employed in these Guidelines is based on the EPFM parameter, J, and a pictorial representation of a J fracture analysis, called the Failure Assessment Diagram (FAD) approach. The recommended fracture technology is validated using finite element J results, and laboratory and hardware fracture test results on the nickel-based superalloy IN-718, the aluminum alloy 2024-T351 1, and ferritic pressure vessel steels. In all cases the laboratory specimens and hardware failed by ductile mechanisms. Advanced proof test analyses involving probability analysis and Multiple Cycle Proof Testing (MCPT) are addressed. Finally, recommendations are provided on to how to account for the effects of the proof test overload on subsequent service fatigue and fracture behaviors.
Turning Routine Exercises into Activities That Teach Inquiry: A Practical Guide
ERIC Educational Resources Information Center
Dorée, Suzanne Ingrid
2017-01-01
How can we teach inquiry? In this paper, I offer practical techniques for teaching inquiry effectively using activities built from routine textbook exercises with minimal advanced preparation, including rephrasing exercises as questions, creating activities that inspire students to make conjectures, and asking for counterexamples to reasonable,…
Conditional Reasoning in Autism: Activation and Integration of Knowledge and Belief
ERIC Educational Resources Information Center
McKenzie, Rebecca; Evans, Jonathan St. B. T.; Handley, Simon J.
2010-01-01
Everyday conditional reasoning is typically influenced by prior knowledge and belief in the form of specific exceptions known as counterexamples. This study explored whether adolescents with autism spectrum disorder (ASD; N = 26) were less influenced by background knowledge than typically developing adolescents (N = 38) when engaged in conditional…
Three Why's: Religion and Science in School
ERIC Educational Resources Information Center
Covaleskie, John F.
2008-01-01
In this article, I argue the proposition that educators ought to be including a serious consideration of intelligent design as a counterexample to the scientific explanations of human origins. The article first distinguishes between three different ways people ask "why": the Scientific Why, the Ultimate Why, and the Teleological Why. Although…
Reasoning in Young Children: Fantasy and Information Retrieval.
ERIC Educational Resources Information Center
Markovits, Henry; And Others
1996-01-01
A model of conditional reasoning predicted that children under 12 would respond correctly to questions of uncertain logical form if premises and context enabled them to access counterexamples from memory, and that children's performance with uncertain logical forms would decrease when empirically true premises are presented in a fantasy context.…
Opportunities and pitfalls in clinical proof-of-concept: principles and examples.
Chen, Chao
2018-04-01
Clinical proof-of-concept trials crucially inform major resource deployment decisions. This paper discusses several mechanisms for enhancing their rigour and efficiency. The importance of careful consideration when using a surrogate endpoint is illustrated; situational effectiveness of run-in patient enrichment is explored; a versatile tool is introduced to ensure a strong pharmacological underpinning; the benefits of dose-titration are revealed by simulation; and the importance of adequately scheduled observations is shown. The general process of model-based trial design and analysis is described and several examples demonstrate the value in historical data, simulation-guided design, model-based analysis and trial adaptation informed by interim analysis. Copyright © 2018 Elsevier Ltd. All rights reserved.
On the degree conjecture for separability of multipartite quantum states
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hassan, Ali Saif M.; Joag, Pramod S.
2008-01-15
We settle the so-called degree conjecture for the separability of multipartite quantum states, which are normalized graph Laplacians, first given by Braunstein et al. [Phys. Rev. A 73, 012320 (2006)]. The conjecture states that a multipartite quantum state is separable if and only if the degree matrix of the graph associated with the state is equal to the degree matrix of the partial transpose of this graph. We call this statement to be the strong form of the conjecture. In its weak version, the conjecture requires only the necessity, that is, if the state is separable, the corresponding degree matricesmore » match. We prove the strong form of the conjecture for pure multipartite quantum states using the modified tensor product of graphs defined by Hassan and Joag [J. Phys. A 40, 10251 (2007)], as both necessary and sufficient condition for separability. Based on this proof, we give a polynomial-time algorithm for completely factorizing any pure multipartite quantum state. By polynomial-time algorithm, we mean that the execution time of this algorithm increases as a polynomial in m, where m is the number of parts of the quantum system. We give a counterexample to show that the conjecture fails, in general, even in its weak form, for multipartite mixed states. Finally, we prove this conjecture, in its weak form, for a class of multipartite mixed states, giving only a necessary condition for separability.« less
ERIC Educational Resources Information Center
Weber, Keith
2009-01-01
This paper presents a case study of a highly successful student whose exploration of an advanced mathematical concept relies predominantly on syntactic reasoning, such as developing formal representations of mathematical ideas and making logical deductions. This student is observed as he learns a new mathematical concept and then completes…
Logical Reasoning versus Information Processing in the Dual-Strategy Model of Reasoning
ERIC Educational Resources Information Center
Markovits, Henry; Brisson, Janie; de Chantal, Pier-Luc
2017-01-01
One of the major debates concerning the nature of inferential reasoning is between counterexample-based strategies such as mental model theory and statistical strategies underlying probabilistic models. The dual-strategy model, proposed by Verschueren, Schaeken, & d'Ydewalle (2005a, 2005b), which suggests that people might have access to both…
Differential theory of learning for efficient neural network pattern recognition
NASA Astrophysics Data System (ADS)
Hampshire, John B., II; Vijaya Kumar, Bhagavatula
1993-09-01
We describe a new theory of differential learning by which a broad family of pattern classifiers (including many well-known neural network paradigms) can learn stochastic concepts efficiently. We describe the relationship between a classifier's ability to generate well to unseen test examples and the efficiency of the strategy by which it learns. We list a series of proofs that differential learning is efficient in its information and computational resource requirements, whereas traditional probabilistic learning strategies are not. The proofs are illustrated by a simple example that lends itself to closed-form analysis. We conclude with an optical character recognition task for which three different types of differentially generated classifiers generalize significantly better than their probabilistically generated counterparts.
Differential theory of learning for efficient neural network pattern recognition
NASA Astrophysics Data System (ADS)
Hampshire, John B., II; Vijaya Kumar, Bhagavatula
1993-08-01
We describe a new theory of differential learning by which a broad family of pattern classifiers (including many well-known neural network paradigms) can learn stochastic concepts efficiently. We describe the relationship between a classifier's ability to generalize well to unseen test examples and the efficiency of the strategy by which it learns. We list a series of proofs that differential learning is efficient in its information and computational resource requirements, whereas traditional probabilistic learning strategies are not. The proofs are illustrated by a simple example that lends itself to closed-form analysis. We conclude with an optical character recognition task for which three different types of differentially generated classifiers generalize significantly better than their probabilistically generated counterparts.
PYGMALION: A Creative Programming Environment
1975-06-01
iiiiiimimmmimm wm^m^mmm’ wi-i ,»■»’■’.■- v* 26 Examples of Purely Iconic Reasoning 1-H Pythagoras ’ original proof of the Pythagorean Theorem ... Theorem Proving Machine. His program employed properties of the representation to guide the proof of theorems . His simple heruristic "Reject...one theorem the square of the hypotenuse. "Every proposition is presented as a self-contained fact relying on its own intrinsic evidence. Instead
SeeCoast: persistent surveillance and automated scene understanding for ports and coastal areas
NASA Astrophysics Data System (ADS)
Rhodes, Bradley J.; Bomberger, Neil A.; Freyman, Todd M.; Kreamer, William; Kirschner, Linda; L'Italien, Adam C.; Mungovan, Wendy; Stauffer, Chris; Stolzar, Lauren; Waxman, Allen M.; Seibert, Michael
2007-04-01
SeeCoast is a prototype US Coast Guard port and coastal area surveillance system that aims to reduce operator workload while maintaining optimal domain awareness by shifting their focus from having to detect events to being able to analyze and act upon the knowledge derived from automatically detected anomalous activities. The automated scene understanding capability provided by the baseline SeeCoast system (as currently installed at the Joint Harbor Operations Center at Hampton Roads, VA) results from the integration of several components. Machine vision technology processes the real-time video streams provided by USCG cameras to generate vessel track and classification (based on vessel length) information. A multi-INT fusion component generates a single, coherent track picture by combining information available from the video processor with that from surface surveillance radars and AIS reports. Based on this track picture, vessel activity is analyzed by SeeCoast to detect user-defined unsafe, illegal, and threatening vessel activities using a rule-based pattern recognizer and to detect anomalous vessel activities on the basis of automatically learned behavior normalcy models. Operators can optionally guide the learning system in the form of examples and counter-examples of activities of interest, and refine the performance of the learning system by confirming alerts or indicating examples of false alarms. The fused track picture also provides a basis for automated control and tasking of cameras to detect vessels in motion. Real-time visualization combining the products of all SeeCoast components in a common operating picture is provided by a thin web-based client.
ERIC Educational Resources Information Center
Humphreys, Michael S.; And Others
1989-01-01
An associative theory of memory is proposed to serve as a counterexample to claims that dissociations among episodic, semantic, and procedural memory tasks necessitate separate memory systems. The theory is based on task analyses of matching (recognition and familiarity judgments), retrieval (cued recall), and production (free association). (TJH)
On the new method for the control of discrete nonlinear dynamic systems using neural networks.
Deng, Hua; Li, Han-Xiong
2006-03-01
This correspondence points out an incorrect statement in Adetona et al, 2000, and Adetona et al., 2004, about the application of the proposed control law to nonminimum phase systems. A counterexample shows the limitations of the control law and, furthermore, its control capability to nonminimum phase systems is explained.
Item Purification Does Not Always Improve DIF Detection: A Counterexample with Angoff's Delta Plot
ERIC Educational Resources Information Center
Magis, David; Facon, Bruno
2013-01-01
Item purification is an iterative process that is often advocated as improving the identification of items affected by differential item functioning (DIF). With test-score-based DIF detection methods, item purification iteratively removes the items currently flagged as DIF from the test scores to get purified sets of items, unaffected by DIF. The…
Yao, Dezhong
2017-03-01
Currently, average reference is one of the most widely adopted references in EEG and ERP studies. The theoretical assumption is the surface potential integral of a volume conductor being zero, thus the average of scalp potential recordings might be an approximation of the theoretically desired zero reference. However, such a zero integral assumption has been proved only for a spherical surface. In this short communication, three counter-examples are given to show that the potential integral over the surface of a dipole in a volume conductor may not be zero. It depends on the shape of the conductor and the orientation of the dipole. This fact on one side means that average reference is not a theoretical 'gold standard' reference, and on the other side reminds us that the practical accuracy of average reference is not only determined by the well-known electrode array density and its coverage but also intrinsically by the head shape. It means that reference selection still is a fundamental problem to be fixed in various EEG and ERP studies.
Defending the beauty of the Invariance Principle
NASA Astrophysics Data System (ADS)
Barkana, Itzhak
2014-01-01
Customary stability analysis methods for nonlinear nonautonomous systems seem to require a strict condition of uniform continuity. Although extensions of LaSalle's Invariance Principle to nonautonomous systems that mitigate this condition have been available for a long time, they have remained surprisingly unknown or open to misinterpretations. The large scope of the Principle might have misled the prospective users and its application to Control problems has been received with amazing yet clear uneasiness. Counterexamples have been used in order to claim that the Invariance Principle cannot be applied to nonlinear nonautonomous systems. Because the original formulation of the Invariance Principle still imposes conditions that are not necessarily needed, this paper presents a new Invariance Principle that further mitigates previous conditions and thus further expands the scope of stability analysis. A brief comparative review of various alternatives to stability analysis of nonautonomous nonlinear systems and their implications is also presented in order to illustrate that thorough analysis of same examples may actually confirm the efficiency of the Invariance Principle approach when dealing with stability of nonautonomous nonlinear systems problems that may look difficult or even unsolvable otherwise.
NASA Technical Reports Server (NTRS)
Owre, Sam; Shankar, Natarajan
1997-01-01
PVS (Prototype Verification System) is a general-purpose environment for developing specifications and proofs. This document deals primarily with the abstract datatype mechanism in PVS which generates theories containing axioms and definitions for a class of recursive datatypes. The concepts underlying the abstract datatype mechanism are illustrated using ordered binary trees as an example. Binary trees are described by a PVS abstract datatype that is parametric in its value type. The type of ordered binary trees is then presented as a subtype of binary trees where the ordering relation is also taken as a parameter. We define the operations of inserting an element into, and searching for an element in an ordered binary tree; the bulk of the report is devoted to PVS proofs of some useful properties of these operations. These proofs illustrate various approaches to proving properties of abstract datatype operations. They also describe the built-in capabilities of the PVS proof checker for simplifying abstract datatype expressions.
Formal Methods Tool Qualification
NASA Technical Reports Server (NTRS)
Wagner, Lucas G.; Cofer, Darren; Slind, Konrad; Tinelli, Cesare; Mebsout, Alain
2017-01-01
Formal methods tools have been shown to be effective at finding defects in safety-critical digital systems including avionics systems. The publication of DO-178C and the accompanying formal methods supplement DO-333 allows applicants to obtain certification credit for the use of formal methods without providing justification for them as an alternative method. This project conducted an extensive study of existing formal methods tools, identifying obstacles to their qualification and proposing mitigations for those obstacles. Further, it interprets the qualification guidance for existing formal methods tools and provides case study examples for open source tools. This project also investigates the feasibility of verifying formal methods tools by generating proof certificates which capture proof of the formal methods tool's claim, which can be checked by an independent, proof certificate checking tool. Finally, the project investigates the feasibility of qualifying this proof certificate checker, in the DO-330 framework, in lieu of qualifying the model checker itself.
Generalized Dandelin’s Theorem
NASA Astrophysics Data System (ADS)
Kheyfets, A. L.
2017-11-01
The paper gives a geometric proof of the theorem which states that in case of the plane section of a second-order surface of rotation (quadrics of rotation, QR), such conics as an ellipse, a hyperbola or a parabola (types of conic sections) are formed. The theorem supplements the well-known Dandelin’s theorem which gives the geometric proof only for a circular cone and applies the proof to all QR, namely an ellipsoid, a hyperboloid, a paraboloid and a cylinder. That’s why the considered theorem is known as the generalized Dandelin’s theorem (GDT). The GDT proof is based on a relatively unknown generalized directrix definition (GDD) of conics. The work outlines the GDD proof for all types of conics as their necessary and sufficient condition. Based on the GDD, the author proves the GDT for all QR in case of a random position of the cutting plane. The graphical stereometric structures necessary for the proof are given. The implementation of the structures by 3d computer methods is considered. The article shows the examples of the builds made in the AutoCAD package. The theorem is intended for the training course of theoretical training of elite student groups of architectural and construction specialties.
Donaldson, Theodore; Wollert, Richard
2008-06-01
Expert witnesses in sexually violent predator (SVP) cases often rely on actuarial instruments to make risk determinations. Many questions surround their use, however. Bayes's Theorem holds much promise for addressing these questions. Some experts nonetheless claim that Bayesian analyses are inadmissible in SVP cases because they are not accepted by the relevant scientific community. This position is illogical because Bayes's Theorem is simply a probabilistic restatement of the way that frequency data are combined to arrive at whatever recidivism rates are paired with each test score in an actuarial table. This article presents a mathematical proof and example validating this assertion. The advantages and implications of a logic model that combines Bayes's Theorem and the null hypothesis are also discussed.
A Brief Critique of the TATES Procedure.
Aliev, Fazil; Salvatore, Jessica E; Agrawal, Arpana; Almasy, Laura; Chan, Grace; Edenberg, Howard J; Hesselbrock, Victor; Kuperman, Samuel; Meyers, Jacquelyn; Dick, Danielle M
2018-03-01
The Trait-based test that uses the Extended Simes procedure (TATES) was developed as a method for conducting multivariate GWAS for correlated phenotypes whose underlying genetic architecture is complex. In this paper, we provide a brief methodological critique of the TATES method using simulated examples and a mathematical proof. Our simulated examples using correlated phenotypes show that the Type I error rate is higher than expected, and that more TATES p values fall outside of the confidence interval relative to expectation. Thus the method may result in systematic inflation when used with correlated phenotypes. In a mathematical proof we further demonstrate that the distribution of TATES p values deviates from expectation in a manner indicative of inflation. Our findings indicate the need for caution when using TATES for multivariate GWAS of correlated phenotypes.
Finding Patterns of Emergence in Science and Technology
2012-09-24
formal evaluation scheduled – Case Studies, Eight Examples: Tissue Engineering, Cold Fusion, RF Metamaterials, DNA Microarrays, Genetic Algorithms, RNAi...emerging capabilities Case Studies, Eight Examples: • Tissue Engineering, Cold Fusion, RF Metamaterials, DNA Microarrays, Genetic Algorithms...Evidence Quality (i.e., the rubric ) and deliver comprehensible evidential support for nomination • Demonstrate proof-of-concept nomination for Chinese
Frickmann, Hagen; Essig, Andreas; Poppert, Sven
2014-04-01
We describe a proof-of-principle evaluation of a fluorescence in situ hybridisation (FISH) procedure to identify Chlamydia trachomatis serovars L1-L3, the causative agents of lymphogranuloma venereum, in cell cultures based on newly designed DNA probes. Rapid and easy-to-perform FISH could facilitate the diagnosis of lymphogranuloma venereum without nucleic acid amplification or serotyping, but requires broader evaluation studies, for example, in tropical high-endemicity regions. © 2014 John Wiley & Sons Ltd.
Orellana, Liliana; Rotnitzky, Andrea; Robins, James M
2010-03-03
In this companion article to "Dynamic Regime Marginal Structural Mean Models for Estimation of Optimal Dynamic Treatment Regimes, Part I: Main Content" [Orellana, Rotnitzky and Robins (2010), IJB, Vol. 6, Iss. 2, Art. 7] we present (i) proofs of the claims in that paper, (ii) a proposal for the computation of a confidence set for the optimal index when this lies in a finite set, and (iii) an example to aid the interpretation of the positivity assumption.
Attention and multisensory modulation argue against total encapsulation.
de Haas, Benjamin; Schwarzkopf, Dietrich Samuel; Rees, Geraint
2016-01-01
Firestone & Scholl (F&S) postulate that vision proceeds without any direct interference from cognition. We argue that this view is extreme and not in line with the available evidence. Specifically, we discuss two well-established counterexamples: Attention directly affects core aspects of visual processing, and multisensory modulations of vision originate on multiple levels, some of which are unlikely to fall "within perception."
The Goldbach Conjecture: Why Is It Difficult?
ERIC Educational Resources Information Center
Turner, Paul
2016-01-01
The opinion of the mathematician Christian Goldbach, stated in correspondence with Euler in 1742, that every even number greater than 2 can be expressed as the sum of two primes, seems to be true in the sense that no one has ever found a counterexample. Yet, it has resisted all attempts to establish it as a theorem. The discussion in this article…
The Emergence of the "s"-Genitive in Danish
ERIC Educational Resources Information Center
Perridon, Harry
2013-01-01
The -"s" genitives of English and Swedish play an important role in grammaticalization theory, as they are often used as counterexamples to the main tenet of that theory, viz. that grammatical change is unidirectional. In this paper I look at the emergence of the -"s" genitive in Danish, hoping that it may shed some new light on the evolution of…
The Aspect Hypothesis, Defective Tense, and Obligatory Contexts: Comments on Haznedar, 2007
ERIC Educational Resources Information Center
Costello, Willie; Shirai, Yasuhiro
2011-01-01
Haznedar (2007) argues that longitudinal data from a child learner of English who has Turkish as a first language (L1) constitute a counterexample to the Aspect Hypothesis. In this commentary, we show that her argument is not warranted because the Aspect Hypothesis does not presuppose that tense is defective, contra her claim. However, Haznedar's…
Dynamic PROOF clusters with PoD: architecture and user experience
NASA Astrophysics Data System (ADS)
Manafov, Anar
2011-12-01
PROOF on Demand (PoD) is a tool-set, which sets up a PROOF cluster on any resource management system. PoD is a user oriented product with an easy to use GUI and a command-line interface. It is fully automated. No administrative privileges or special knowledge is required to use it. PoD utilizes a plug-in system, to use different job submission front-ends. The current PoD distribution is shipped with LSF, Torque (PBS), Grid Engine, Condor, gLite, and SSH plug-ins. The product is to be extended. We therefore plan to implement a plug-in for AliEn Grid as well. Recently developed algorithms made it possible to efficiently maintain two types of connections: packet-forwarding and native PROOF connections. This helps to properly handle most kinds of workers, with and without firewalls. PoD maintains the PROOF environment automatically and, for example, prevents resource misusage in case when workers idle for too long. As PoD matures as a product and provides more plug-ins, it's used as a standard for setting up dynamic PROOF clusters in many different institutions. The GSI Analysis Facility (GSIAF) is in production since 2007. The static PROOF cluster has been phased out end of 2009. GSIAF is now completely based on PoD. Users create private dynamic PROOF clusters on the general purpose batch farm. This provides an easier resource sharing between interactive local batch and Grid usage. The main user communities are FAIR and ALICE.
Koplin, Julian J; Selgelid, Michael J
2015-11-01
A common strategy in bioethics is to posit a prima facie case in favour of one policy, and to then claim that the burden of proof (that this policy should be rejected) falls on those with opposing views. If the burden of proof is not met, it is claimed, then the policy in question should be accepted. This article illustrates, and critically evaluates, examples of this strategy in debates about the sale of organs by living donors, human enhancement, and the precautionary principle. We highlight general problems with this style of argument, and particular problems with its use in specific cases. We conclude that the burden ultimately falls on decision-makers (i.e. policy-makers) to choose the policy supported by the best reasons. © 2015 John Wiley & Sons Ltd.
A microelectromechanical accelerometer fabricated using printed circuit processing techniques
NASA Astrophysics Data System (ADS)
Rogers, J. E.; Ramadoss, R.; Ozmun, P. M.; Dean, R. N.
2008-01-01
A microelectromechanical systems (MEMS) capacitive-type accelerometer fabricated using printed circuit processing techniques is presented. A Kapton polymide film is used as the structural layer for fabricating the MEMS accelerometer. The accelerometer proof mass along with four suspension beams is defined in the Kapton polyimide film. The proof mass is suspended above a Teflon substrate using a spacer. The deflection of the proof mass is detected using a pair of capacitive sensing electrodes. The top electrode of the accelerometer is defined on the top surface of the Kapton film. The bottom electrode is defined in the metallization on the Teflon substrate. The initial gap height is determined by the distance between the bottom electrode and the Kapton film. For an applied external acceleration (normal to the proof mass), the proof mass deflects toward or away from the fixed bottom electrode due to inertial force. This deflection causes either a decrease or increase in the air-gap height thereby either increasing or decreasing the capacitance between the top and the bottom electrodes. An example PCB MEMS accelerometer with a square proof mass of membrane area 6.4 mm × 6.4 mm is reported. The measured resonant frequency is 375 Hz and the Q-factor in air is 0.52.
2016-02-01
from the tools being used. For example, while Coq proves properties it does not dump an explanation of the proofs in any currently supported form. The...Distribution Unlimited 5 Hotel room locks and card keys use a simple protocol to manage the transition of rooms from one guest to the next. The lock...retains that guest key’s code. A new guest checks in and gets a card with a new current code, and the previous code set to the previous guest’s current
NASA Astrophysics Data System (ADS)
Willemse, Tim A. C.
We introduce the concept of consistent correlations for parameterised Boolean equation systems (PBESs), motivated largely by the laborious proofs of correctness required for most manipulations in this setting. Consistent correlations focus on relating the equations that occur in PBESs, rather than their solutions. For a fragment of PBESs, consistent correlations are shown to coincide with a recently introduced form of bisimulation. Finally, we show that bisimilarity on processes induces consistent correlations on PBESs encoding model checking problems. We apply our theory to two example manipulations from the literature.
Orellana, Liliana; Rotnitzky, Andrea; Robins, James M.
2010-01-01
In this companion article to “Dynamic Regime Marginal Structural Mean Models for Estimation of Optimal Dynamic Treatment Regimes, Part I: Main Content” [Orellana, Rotnitzky and Robins (2010), IJB, Vol. 6, Iss. 2, Art. 7] we present (i) proofs of the claims in that paper, (ii) a proposal for the computation of a confidence set for the optimal index when this lies in a finite set, and (iii) an example to aid the interpretation of the positivity assumption. PMID:20405047
The benefits of future-proof tunable white lighting in the classroom
Clark, Terry
2016-11-21
The biggest challenge affecting lighting decisions today is future-proofing. Choices made today will likely be choices that impact the next 20 or perhaps even 40 years. For example, we can expect the best LED lighting available today to maintain 90% of initial light output for 100,000 hours or more. Compare this to a fluorescent lighting system that needs regular maintenance after only 30,000 hours due to lamp burn-outs. The simple act of choosing a LED system over a fluorescent one alone can begin to reduce life cycle costs by saving future maintenance costs. However, the choice of LED over fluorescentmore » is just the beginning. Here, let’s look at other future-proofing decisions that should be considered when choosing your next lighting system.« less
Kendig, Catherine Elizabeth
2016-06-01
"Proof of concept" is a phrase frequently used in descriptions of research sought in program announcements, in experimental studies, and in the marketing of new technologies. It is often coupled with either a short definition or none at all, its meaning assumed to be fully understood. This is problematic. As a phrase with potential implications for research and technology, its assumed meaning requires some analysis to avoid it becoming a descriptive category that refers to all things scientifically exciting. I provide a short analysis of proof of concept research and offer an example of it within synthetic biology. I suggest that not only are there activities that circumscribe new epistemological categories but there are also associated normative ethical categories or principles linked to the research. I examine these and provide an outline for an alternative ethical account to describe these activities that I refer to as "extended agency ethics". This view is used to explain how the type of research described as proof of concept also provides an attendant proof of principle that is the result of decision-making that extends across practitioners, their tools, techniques, and the problem solving activities of other research groups.
... proof that indoor tanning is safer than tanning outdoors. Indoor tanning systems give concentrated UV exposure regardless ... For example, it’s essential for promoting good bone health. While UV ... a tan to get that benefit. According to the Surgeon General, fair and light- ...
Topographic and Other Influences on Pluto's Volatile Ices
NASA Astrophysics Data System (ADS)
Lewis, Briley Lynn; Stansberry, John; Grundy, William M.; Schmitt, Bernard; Protopapa, Silvia; Trafton, Laurence M.; Holler, Bryan J.; McKinnon, William B.; Schenk, Paul M.; Stern, S. Alan; Young, Leslie; Weaver, Harold A.; Olkin, Catherine; Ennico, Kimberly; New Horizons Science Team, The New Horizons Composition Team
2018-01-01
Pluto’s surface is known to consist of various volatile ices, mostly N2, CH4, and CO, which sublimate and condense on varying timescales, generally moving from points of high insolation to those of low insolation. The New Horizons Pluto encounter data provide multiple lenses through which to view Pluto’s detailed surface topography and composition and to investigate the distribution of volatiles on its surface, including albedo and elevation maps from the imaging instruments and composition maps from the LEISA spectral imager. The volatile surface ice is expected to be generally isothermal, due to the fact that their vapor pressures are in equilibrium with the atmosphere. Although secular topographic transport mechanisms suggest that points at low elevation should slowly fill with volatile ices (Trafton 2015 DPS abstract, Bertrand and Forget 2017), there are counter-examples of this across the surface, implying that energy discrepancies caused by insolation differences, albedo variations, local slopes, and other effects may take precedence at shorter timescales. Using data from the 2015 New Horizons flyby, we present our results of this investigation into the effects of variations in insolation, albedo, and topography on the presence of the different volatile ices across the surface of Pluto.
Topographic and Other Influences on Pluto's Volatile Ices
NASA Astrophysics Data System (ADS)
Lewis, Briley Lynn; Stansberry, John; Grundy, William M.; Schmitt, Bernard; Protopapa, Silvia; Trafton, Laurence M.; Holler, Bryan J.; McKinnon, William B.; Schenk, Paul M.; Stern, S. Alan; Young, Leslie; Weaver, Harold A.; Olkin, Catherine; Ennico, Kimberly; New Horizons Science Team
2017-10-01
Pluto’s surface is known to consist of various volatile ices, mostly N2, CH4, and CO, which sublimate and condense on varying timescales, generally moving from points of high insolation to those of low insolation. The New Horizons Pluto encounter data provide multiple lenses through which to view Pluto’s detailed surface topography and composition and to investigate the distribution of volatiles on its surface, including albedo and elevation maps from the imaging instruments and composition maps from the LEISA spectral imager. The volatile surface ice is expected to be generally isothermal, due to the fact that their vapor pressures are in equilibrium with the atmosphere. Although secular topographic transport mechanisms suggest that points at low elevation should slowly fill with volatile ices (Trafton 2015 DPS abstract, Bertrand and Forget 2017), there are counter-examples of this across the surface, implying that energy discrepancies caused by insolation differences, albedo variations, local slopes, and other effects may take precedence at shorter timescales. Using data from the 2015 New Horizons flyby, we present our results of this investigation into the effects of variations in insolation, albedo, and topography on the presence of the different volatile ices across the surface of Pluto.
Hofmann, B
2008-06-01
Are there similarities between scientific and moral inference? This is the key question in this article. It takes as its point of departure an instance of one person's story in the media changing both Norwegian public opinion and a brand-new Norwegian law prohibiting the use of saviour siblings. The case appears to falsify existing norms and to establish new ones. The analysis of this case reveals similarities in the modes of inference in science and morals, inasmuch as (a) a single case functions as a counter-example to an existing rule; (b) there is a common presupposition of stability, similarity and order, which makes it possible to reason from a few cases to a general rule; and (c) this makes it possible to hold things together and retain order. In science, these modes of inference are referred to as falsification, induction and consistency. In morals, they have a variety of other names. Hence, even without abandoning the fact-value divide, there appear to be similarities between inference in science and inference in morals, which may encourage communication across the boundaries between "the two cultures" and which are relevant to medical humanities.
Scientists as role models in space science outreach
NASA Astrophysics Data System (ADS)
Alexander, D.
The direct participation of scientists significantly enhances the impact of any E/PO effort. This is particularly true when the scientists come from minority or traditionally under-represented groups and, consequently, become role models for a large number of students while presenting positive counter-examples to the usual stereotypes. In this paper I will discuss the impact of scientists as role models through the successful implementation of a set of space physics games and activities, called Solar Week. Targetted at middle-school girls, the key feature of Solar Week is the "Ask a Scientist" section enabling direct interaction between participating students and volunteer scientists. All of the contributing scientists are women, serving as experts in their field and providing role models to whom the students can relate. Solar Week has completed four sessions with a total of some 140 edcuators and 12,000+ students in over 28 states and 9 countries. A major success of the Solar Week program has been the ability of the students to learn more about the scientists as people, through online biographies, and to discuss a variety of topics ranging from science, to careers and common hobbies.
Centromeres of filamentous fungi
Smith, Kristina M.; Galazka, Jonathan M.; Phatale, Pallavi A.; Connolly, Lanelle R.; Freitag, Michael
2012-01-01
How centromeres are assembled and maintained remains one of the fundamental questions in cell biology. Over the past 20 years the idea of centromeres as precise genetic loci has been replaced by the realization that it is predominantly the protein complement that defines centromere localization and function. Thus, placement and maintenance of centromeres are excellent examples of epigenetic phenomena in the strict sense. In contrast, the highly derived “point centromeres” of the budding yeast Saccharomyces cerevisiae and its close relatives are counterexamples for this general principle of centromere maintenance. While we have learned much in the past decade, it remains unclear if mechanisms for epigenetic centromere placement and maintenance are shared amongst various groups of organisms. For that reason it seems prudent to examine species from many different phylogenetic groups with the aim to extract comparative information that will yield a more complete picture of cell division in all eukaryotes. This review addresses what has been learned by studying the centromeres of filamentous fungi, a large, heterogeneous group of organisms that includes important plant, animal and human pathogens, saprobes and symbionts that fulfill essential roles in the biosphere, as well as a growing number of taxa that have become indispensable for industrial use. PMID:22752455
Impact of Dust Radiative Forcing upon Climate. Chapter 13
NASA Technical Reports Server (NTRS)
Miller, Ronald L.; Knippertz, Peter; Perez Garcia-Pando, Carlos; Perlwitz, Jan P.; Tegan, Ina
2014-01-01
Dust aerosols perturb the atmospheric radiative flux at both solar and thermal wavelengths, altering the energy and water cycles. The climate adjusts by redistributing energy and moisture, so that local temperature perturbations, for example, depend upon the forcing over the entire extent of the perturbed circulation. Within regions frequently mixed by deep convection, including the deep tropics, dust particles perturb the surface air temperature primarily through radiative forcing at the top of the atmosphere (TOA). Many models predict that dust reduces global precipitation. This reduction is typically attributed to the decrease of surface evaporation in response to dimming of the surface. A counterexample is presented, where greater shortwave absorption by dust increases evaporation and precipitation despite greater dimming of the surface. This is attributed to the dependence of surface evaporation upon TOA forcing through its influence upon surface temperature and humidity. Perturbations by dust to the surface wind speed and vegetation (through precipitation anomalies) feed back upon the dust aerosol concentration. The current uncertainty of radiative forcing attributed to dust and the resulting range of climate perturbations calculated by models remain a useful test of our understanding of the mechanisms relating dust radiative forcing to the climate response.
Godwin, James; Lovich, Jeffrey E.; Ennen, Joshua R.; Kreiser, Brian R.; Folt, Brian; Lechowicz, Chris
2014-01-01
Map turtles of the genus Graptemys are highly aquatic and rarely undergo terrestrial movements, and limited dispersal among drainages has been hypothesized to drive drainage-specific endemism and high species richness of this group in the southeastern United States. Until recently, two members of the megacephalic “pulchra clade,” Graptemys barbouri andGraptemys ernsti, were presumed to be allopatric with a gap in both species' ranges in the Choctawhatchee River drainage. In this paper, we analyzed variation in morphology (head and shell patterns) and genetics (mitochondrial DNA and microsatellite loci) from G. barbouri, G. ernsti, and Graptemys sp. collected from the Choctawhatchee River drainage, and we document the syntopic occurrence of those species and back-crossed individuals of mixed ancestry in the Choctawhatchee River drainage. Our results provide a first counter-example to the pattern of drainage-specific endemism in megacephalic Graptemys. Geologic events associated with Pliocene and Pleistocene sea level fluctuations and the existence of paleo-river systems appear to have allowed the invasion of the Choctawhatchee system by these species, and the subsequent introgression likely predates any potential human-mediated introduction.
Nonlinear Pattern Selection in Bi-Modal Interfacial Instabilities
NASA Astrophysics Data System (ADS)
Picardo, Jason; Narayanan, Ranga
2016-11-01
We study the evolution of two interacting unstable interfaces, with the aim of understanding the role of non-linearity in pattern selection. Specifically, we consider two superposed thin films on a heated surface, that are susceptible to thermocapillary and Rayleigh-Taylor instabilities. Due to the presence of two unstable interfaces, the dispersion curve (linear growth rate plotted as a function of the perturbation wavelength) exhibits two peaks. If these peaks have equal heights, then the two corresponding disturbance patterns will grow with the same linear growth rate. Therefore, any selection between the two must occur via nonlinear effects. The two-interface problem under consideration provides a variety of such bi-modal situations, in which the role of nonlinearity in pattern selection is unveiled. We use a combination of long wave asymptotics, numerical simulations and amplitude expansions to understand the subtle nonlinear interactions between the two peak modes. Our results offer a counter-example to Rayleigh's principle of pattern formation, that the fastest growing linear mode will dominate the final pattern. Far from being governed by any such general dogma, the final selected pattern varies considerably from case to case. The authors acknowledge funding from NSF (0968313) and the Fulbright-Nehru fellowship.
A Counterexample Guided Abstraction Refinement Framework for Verifying Concurrent C Programs
2005-05-24
source code are routinely executed. The source code is written in languages ranging from C/C++/Java to ML/ Ocaml . These languages differ not only in...from the difficulty to model computer programs—due to the complexity of programming languages as compared to hardware description languages —to...intermediate specification language lying between high-level Statechart- like formalisms and transition systems. Actions are encoded as changes in
NASA Astrophysics Data System (ADS)
Li, Xiangzheng
2018-06-01
A counterexample is given to show that the product rule of the Caputo fractional derivatives does not hold except on a special point. The function-expansion method of separation variable proposed by Rui[Commun Nonlinear Sci Numer Simulat 47 (2017) 253-266] based on the product rule must be modified.
NASA Astrophysics Data System (ADS)
Akibue, Seiseki; Kato, Go
2018-04-01
For distinguishing quantum states sampled from a fixed ensemble, the gap in bipartite and single-party distinguishability can be interpreted as a nonlocality of the ensemble. In this paper, we consider bipartite state discrimination in a composite system consisting of N subsystems, where each subsystem is shared between two parties and the state of each subsystem is randomly sampled from a particular ensemble comprising the Bell states. We show that the success probability of perfectly identifying the state converges to 1 as N →∞ if the entropy of the probability distribution associated with the ensemble is less than 1, even if the success probability is less than 1 for any finite N . In other words, the nonlocality of the N -fold ensemble asymptotically disappears if the probability distribution associated with each ensemble is concentrated. Furthermore, we show that the disappearance of the nonlocality can be regarded as a remarkable counterexample of a fundamental open question in theoretical computer science, called a parallel repetition conjecture of interactive games with two classically communicating players. Measurements for the discrimination task include a projective measurement of one party represented by stabilizer states, which enable the other party to perfectly distinguish states that are sampled with high probability.
NASA Technical Reports Server (NTRS)
Murthy, Pappu L. N.; Phoenix, S. Leigh; Grimes-Ledesma, Lorie
2010-01-01
Stress rupture failure of Carbon Composite Overwrapped Pressure Vessels (COPVs) is of serious concern to Science Mission and Constellation programs since there are a number of COPVs on board space vehicles with stored gases under high pressure for long durations of time. It has become customary to establish the reliability of these vessels using the so called classic models. The classical models are based on Weibull statistics fitted to observed stress rupture data. These stochastic models cannot account for any additional damage due to the complex pressure-time histories characteristic of COPVs being supplied for NASA missions. In particular, it is suspected that the effects of proof test could significantly reduce the stress rupture lifetime of COPVs. The focus of this paper is to present an analytical appraisal of a model that incorporates damage due to proof test. The model examined in the current paper is based on physical mechanisms such as micromechanics based load sharing concepts coupled with creep rupture and Weibull statistics. For example, the classic model cannot accommodate for damage due to proof testing which every flight vessel undergoes. The paper compares current model to the classic model with a number of examples. In addition, several applications of the model to current ISS and Constellation program issues are also examined.
Using Pictures to Enhance Students' Understanding of Bayes' Theorem
ERIC Educational Resources Information Center
Trafimow, David
2011-01-01
Students often have difficulty understanding algebraic proofs of statistics theorems. However, it sometimes is possible to prove statistical theorems with pictures in which case students can gain understanding more easily. I provide examples for two versions of Bayes' theorem.
32 CFR 634.17 - Extensions of suspensions and revocations.
Code of Federal Regulations, 2011 CFR
2011-07-01
... (CONTINUED) LAW ENFORCEMENT AND CRIMINAL INVESTIGATIONS MOTOR VEHICLE TRAFFIC SUPERVISION Driving Privileges... traffic, criminal, or military offenses, for example, active duty military personnel driving on the... or alcohol or drug counseling programs after proof is provided. (d) Commanders may extend a...
ERIC Educational Resources Information Center
Starnes, Bobby Ann
1998-01-01
Describes nontraditional, creative teaching methods that celebrate differences among students. Contrasts these classrooms with programs that force teachers and learners into mediocre sameness using teacher-proof approaches that have been proven wrong for both teachers and learners. Uses personal examples from kindergarten and first-grade…
48 CFR 227.7010 - Assignments.
Code of Federal Regulations, 2010 CFR
2010-10-01
... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Infringement Claims, Licenses, and Assignments 227.7010 Assignments. (a) The clause at 252.227-7011 is an example which may be used in contracts of assignment of patent rights to the Government. (b) To facilitate proof of...
A Brief Historical Introduction to Determinants with Applications
ERIC Educational Resources Information Center
Debnath, L.
2013-01-01
This article deals with a short historical introduction to determinants with applications to the theory of equations, geometry, multiple integrals, differential equations and linear algebra. Included are some properties of determinants with proofs, eigenvalues, eigenvectors and characteristic equations with examples of applications to simple…
Euclid and Descartes: A Partnership.
ERIC Educational Resources Information Center
Wasdovich, Dorothy Hoy
1991-01-01
Presented is a method of reorganizing a high school geometry course to integrate coordinate geometry together with Euclidean geometry at an earlier stage in the course, thus enabling students to prove subsequent theorems from either perspective. Several examples contrasting different proofs from both perspectives are provided. (MDH)
7 CFR 760.1305 - Proof of production.
Code of Federal Regulations, 2010 CFR
2010-01-01
... period. (b) To be eligible for payment, dairy producers marketing milk during February through July 2009.... Examples of supporting documentation may include, but are not limited to: Milk marketing payment stubs, tank records, milk handler records, daily milk marketings, copies of any payments received as...
Derivation of the Biot-Savart Law from Ampere's Law Using the Displacement Current
NASA Astrophysics Data System (ADS)
Buschauer, Robert
2013-12-01
The equation describing the magnetic field due to a single, nonrelativistic charged particle moving at constant velocity is often referred to as the "Biot-Savart law for a point charge." Introductory calculus-based physics books usually state this law without proof.2 Advanced texts often present it either without proof or as a special case of a complicated mathematical formalism.3 Either way, little or no physical insight is provided to the student regarding the underlying physics. This paper presents a novel, basic, and transparent derivation of the Biot-Savart law for a point charge based only on Maxwell's displacement current term in Ampere's law. This derivation can serve many pedagogical purposes. For example, it can be used as lecture material at any academic level to obtain the Biot-Savart law for a point charge from simple principles. It can also serve as a practical example of the important fact that a changing electric flux produces a magnetic field.
Reasoning from an incompatibility: False dilemma fallacies and content effects.
Brisson, Janie; Markovits, Henry; Robert, Serge; Schaeken, Walter
2018-03-23
In the present studies, we investigated inferences from an incompatibility statement. Starting with two propositions that cannot be true at the same time, these inferences consist of deducing the falsity of one from the truth of the other or deducing the truth of one from the falsity of the other. Inferences of this latter form are relevant to human reasoning since they are the formal equivalent of a discourse manipulation called the false dilemma fallacy, often used in politics and advertising in order to force a choice between two selected options. Based on research on content-related variability in conditional reasoning, we predicted that content would have an impact on how reasoners treat incompatibility inferences. Like conditional inferences, they present two invalid forms for which the logical response is one of uncertainty. We predicted that participants would endorse a smaller proportion of the invalid incompatibility inferences when more counterexamples are available. In Study 1, we found the predicted pattern using causal premises translated into incompatibility statements with many and few counterexamples. In Study 2A, we replicated the content effects found in Study 1, but with premises for which the incompatibility statement is a non-causal relation between classes. These results suggest that the tendency to fall into the false dilemma fallacy is modulated by the background knowledge of the reasoner. They also provide additional evidence on the link between semantic information retrieval and deduction.
Iodine, a Mild Reagent for the Aromatization of Terpenoids.
Domingo, Victoriano; Prieto, Consuelo; Silva, Lucia; Rodilla, Jesús M L; Quílez del Moral, José F; Barrero, Alejandro F
2016-04-22
Efficient procedures based on the use of iodine for the aromatization of a series of terpenoids possessing diene and homoallylic or allylic alcohol functionalities are described. Different examples are reported as a proof-of-concept study. Furthermore, iodine also proved to mediate the dehydrogenation of testosterone.
ERIC Educational Resources Information Center
Schattschneider, Doris
1991-01-01
Provided are examples from many domains of mathematics that illustrate the Fubini Principle in its discrete version: the value of a summation over a rectangular array is independent of the order of summation. Included are: counting using partitions as in proof by pictures, combinatorial arguments, indirect counting as in the inclusion-exclusion…
Data-oriented scheduling for PROOF
NASA Astrophysics Data System (ADS)
Xu, Neng; Guan, Wen; Wu, Sau Lan; Ganis, Gerardo
2011-12-01
The Parallel ROOT Facility - PROOF - is a distributed analysis system optimized for I/O intensive analysis tasks of HEP data. With LHC entering the analysis phase, PROOF has become a natural ingredient for computing farms at Tier3 level. These analysis facilities will typically be used by a few tenths of users, and can also be federated into a sort of analysis cloud corresponding to the Virtual Organization of the experiment. Proper scheduling is required to guarantee fair resource usage, to enforce priority policies and to optimize the throughput. In this paper we discuss an advanced priority system that we are developing for PROOF. The system has been designed to automatically adapt to unknown length of the tasks, to take into account the data location and availability (including distribution across geographically separated sites), and the {group, user} default priorities. In this system, every element - user, group, dataset, job slot and storage - gets its priority and those priorities are dynamically linked with each other. In order to tune the interplay between the various components, we have designed and started implementing a simulation application that can model various type and size of PROOF clusters. In this application a monitoring package records all the changes of them so that we can easily understand and tune the performance. We will discuss the status of our simulation and show examples of the results we are expecting from it.
Volcano-tectonic earthquakes: A new tool for estimating intrusive volumes and forecasting eruptions
White, Randall A.; McCausland, Wendy
2016-01-01
Notable cases in which distal VT events preceded eruptions at long-dormant volcanoes include: Nevado del Ruiz (1984–1985), Pinatubo (1991), Unzen (1989–1995), Soufriere Hills (1995), Shishaldin (1989–1999), Tacana' (1985–1986), Pacaya (1980–1984), Rabaul (1994), and Cotopaxi (2001). Additional cases are recognized at frequently active volcanoes including Popocateptl (2001–2003) and Mauna Loa (1984). We present four case studies (Pinatubo, Soufriere Hills, Unzen, and Tacana') in which we demonstrate the above mentioned VT characteristics prior to eruptions. Using regional data recorded by NEIC, we recognized in near-real time that a huge distal VT swarm was occurring, deduced that a proportionately huge magmatic intrusion was taking place beneath the long dormant Sulu Range, New Britain Island, Papua New Guinea, that it was likely to lead to eruptive activity, and warned Rabaul Volcano Observatory days before a phreatic eruption occurred. This confirms the value of this technique for eruption forecasting. We also present a counter-example where we deduced that a VT swarm at Volcan Cosiguina, Nicaragua, indicated a small intrusion, insufficient to reach the surface and erupt. Finally, we discuss limitations of the method and propose a mechanism by which this distal VT seismicity is triggered by magmatic intrusion.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Valentino, Eleonora Di; Mersini-Houghton, Laura, E-mail: valentin@iap.fr, E-mail: mersini@physics.unc.edu
The 2015 Planck data release tightened the region of the allowed inflationary models. Inflationary models with convex potentials have now been ruled out since they produce a large tensor to scalar ratio. Meanwhile the same data offers interesting hints on possible deviations from the standard picture of CMB perturbations. Here we revisit the predictions of the theory of the origin of the universe from the landscape multiverse for the case of exponential inflation, for two reasons: firstly to check the status of the anomalies associated with this theory, in the light of the recent Planck data; secondly, to search formore » a counterexample whereby new physics modifications may bring convex inflationary potentials, thought to have been ruled out, back into the region of potentials allowed by data. Using the exponential inflation as an example of convex potentials, we find that the answer to both tests is positive: modifications to the perturbation spectrum and to the Newtonian potential of the universe originating from the quantum entanglement, bring the exponential potential, back within the allowed region of current data; and, the series of anomalies previously predicted in this theory, is still in good agreement with current data. Hence our finding for this convex potential comes at the price of allowing for additional thermal relic particles, equivalently dark radiation, in the early universe.« less
Testing predictions of the quantum landscape multiverse 2: the exponential inflationary potential
NASA Astrophysics Data System (ADS)
Di Valentino, Eleonora; Mersini-Houghton, Laura
2017-03-01
The 2015 Planck data release tightened the region of the allowed inflationary models. Inflationary models with convex potentials have now been ruled out since they produce a large tensor to scalar ratio. Meanwhile the same data offers interesting hints on possible deviations from the standard picture of CMB perturbations. Here we revisit the predictions of the theory of the origin of the universe from the landscape multiverse for the case of exponential inflation, for two reasons: firstly to check the status of the anomalies associated with this theory, in the light of the recent Planck data; secondly, to search for a counterexample whereby new physics modifications may bring convex inflationary potentials, thought to have been ruled out, back into the region of potentials allowed by data. Using the exponential inflation as an example of convex potentials, we find that the answer to both tests is positive: modifications to the perturbation spectrum and to the Newtonian potential of the universe originating from the quantum entanglement, bring the exponential potential, back within the allowed region of current data; and, the series of anomalies previously predicted in this theory, is still in good agreement with current data. Hence our finding for this convex potential comes at the price of allowing for additional thermal relic particles, equivalently dark radiation, in the early universe.
Origins and ecological consequences of pollen specialization among desert bees.
Minckley, R L; Cane, J H; Kervin, L
2000-02-07
An understanding of the evolutionary origins of insect foraging specialization is often hindered by a poor biogeographical and palaeoecological record. The historical biogeography (20,000 years before present to the present) of the desert-limited plant, creosote bush (Larrea tridentata), is remarkably complete. This history coupled with the distribution pattern of its bee fauna suggests pollen specialization for creosote bush pollen has evolved repeatedly among bees in the Lower Sonoran and Mojave deserts. In these highly xeric, floristically depauperate environments, species of specialist bees surpass generalist bees in diversity, biomass and abundance. The ability of specialist bees to facultatively remain in diapause through resource-poor years and to emerge synchronously with host plant bloom in resource-rich years probably explains their ecological dominance and persistence in these areas. Repeated origins of pollen specialization to one host plant where bloom occurs least predictably is a counter-example to prevailing theories that postulate such traits originate where the plant grows best and blooms most reliably Host-plant synchronization, a paucity of alternative floral hosts, or flowering attributes of creosote bush alone or in concert may account for the diversity of bee specialists that depend on this plant instead of nutritional factors or chemical coevolution between floral rewards and the pollinators they have evolved to attract.
A Review of National Security-Emergency Preparedness Telecommunications Policy.
1981-02-01
capable of being preempted. The major elements of this conceptual system could, for example, include: all Class 4 and higher switches and a large number of...are competing with the established carriers. 185 The monopoly structure framwork would reverse current trends and place the burden of proof with those
ERIC Educational Resources Information Center
Lyublinskaya, Irina; Funsch, Dan
2012-01-01
Several interactive geometry software packages are available today to secondary school teachers. An example is The Geometer's Sketchpad[R] (GSP), also known as Dynamic Geometry[R] software, developed by Key Curriculum Press. This numeric based technology has been widely adopted in the last twenty years, and a vast amount of creativity has been…
Imre Lakatos's Use of Dialogue.
ERIC Educational Resources Information Center
Greig, Judith Maxwell
This paper uses a book, "Proofs and Refutations: The Logic of Mathematical Discovery," as an example of Lakatos's use of dialogue. The book was originally adapted from his dissertation and influenced by Polya and Popper. His discussion of the Euler conjecture is summarized. Three purposes for choosing the dialogue form for the book were…
On the existence of horizons in spacetimes with vanishing curvature invariants
NASA Astrophysics Data System (ADS)
Senovilla, José M. M.
2003-11-01
A direct very simple proof that there can be no closed trapped surfaces (ergo no black hole regions) in spacetimes with all curvature scalar invariants vanishing is given. Explicit examples of the recently introduced ``dynamical horizons'' which nevertheless do not enclose any trapped region are presented too.
Dynamic Geometry as a Context for Exploring Conjectures
ERIC Educational Resources Information Center
Wares, Arsalan
2018-01-01
The purpose of this paper is to provide examples of "non-traditional" proof-related activities that can explored in a dynamic geometry environment by university and high school students of mathematics. These propositions were encountered in the dynamic geometry environment. The author believes that teachers can ask their students to…
Limits in the application of harmonic analysis to pulsating stars
NASA Astrophysics Data System (ADS)
Pascual-Granado, J.; Garrido, R.; Suárez, J. C.
2015-09-01
Using ultra-precise data from space instrumentation, we found that the underlying functions of stellar light curves from some AF pulsating stars are non-analytic, and consequently their Fourier expansion is not guaranteed. This result demonstrates that periodograms do not provide a mathematically consistent estimator of the frequency content for this type of variable stars. More importantly, this constitutes the first counterexample against the current paradigm, which considers that any physical process is described by a continuous (band-limited) function that is infinitely differentiable.
NASA Astrophysics Data System (ADS)
Hinze, Ralf
Programmers happily use induction to prove properties of recursive programs. To show properties of corecursive programs they employ coinduction, but perhaps less enthusiastically. Coinduction is often considered a rather low-level proof method, in particular, as it departs quite radically from equational reasoning. Corecursive programs are conveniently defined using recursion equations. Suitably restricted, these equations possess unique solutions. Uniqueness gives rise to a simple and attractive proof technique, which essentially brings equational reasoning to the coworld. We illustrate the approach using two major examples: streams and infinite binary trees. Both coinductive types exhibit a rich structure: they are applicative functors or idioms, and they can be seen as memo-tables or tabulations. We show that definitions and calculations benefit immensely from this additional structure.
Algebraic integrability: a survey.
Vanhaecke, Pol
2008-03-28
We give a concise introduction to the notion of algebraic integrability. Our exposition is based on examples and phenomena, rather than on detailed proofs of abstract theorems. We mainly focus on algebraic integrability in the sense of Adler-van Moerbeke, where the fibres of the momentum map are affine parts of Abelian varieties; as it turns out, most examples from classical mechanics are of this form. Two criteria are given for such systems (Kowalevski-Painlevé and Lyapunov) and each is illustrated in one example. We show in the case of a relatively simple example how one proves algebraic integrability, starting from the differential equations for the integrable vector field. For Hamiltonian systems that are algebraically integrable in the generalized sense, two examples are given, which illustrate the non-compact analogues of Abelian varieties which typically appear in such systems.
Conditions for Lorentz-invariant superluminal information transfer without signaling
NASA Astrophysics Data System (ADS)
Grössing, G.; Fussy, S.; Mesa Pascasio, J.; Schwabl, H.
2016-03-01
We understand emergent quantum mechanics in the sense that quantum mechanics describes processes of physical emergence relating an assumed sub-quantum physics to macroscopic boundary conditions. The latter can be shown to entail top-down causation, in addition to usual bottom-up scenarios. With this example it is demonstrated that definitions of “realism” in the literature are simply too restrictive. A prevailing manner to define realism in quantum mechanics is in terms of pre-determination independent of the measurement. With our counter-example, which actually is ubiquitous in emergent, or self-organizing, systems, we argue for realism without pre-determination. We refer to earlier results of our group showing how the guiding equation of the de Broglie-Bohm interpretation can be derived from a theory with classical ingredients only. Essentially, this corresponds to a “quantum mechanics without wave functions” in ordinary 3-space, albeit with nonlocal correlations. This, then, leads to the central question of how to deal with the nonlocality problem in a relativistic setting. We here show that a basic argument discussing the allegedly paradox time ordering of events in EPR-type two-particle experiments falls short of taking into account the contextuality of the experimental setup. Consequently, we then discuss under which circumstances (i.e. physical premises) superluminal information transfer (but not signaling) may be compatible with a Lorentz-invariant theory. Finally, we argue that the impossibility of superluminal signaling - despite the presence of superluminal information transfer - is not the result of some sort of conspiracy (á la “Nature likes to hide”), but the consequence of the impossibility to exactly reproduce in repeated experimental runs a state's preparation, or of the no-cloning theorem, respectively.
2014-01-01
Background Horseshoe crabs are marine arthropods with a fossil record extending back approximately 450 million years. They exhibit remarkable morphological stability over their long evolutionary history, retaining a number of ancestral arthropod traits, and are often cited as examples of “living fossils.” As arthropods, they belong to the Ecdysozoa, an ancient super-phylum whose sequenced genomes (including insects and nematodes) have thus far shown more divergence from the ancestral pattern of eumetazoan genome organization than cnidarians, deuterostomes and lophotrochozoans. However, much of ecdysozoan diversity remains unrepresented in comparative genomic analyses. Results Here we apply a new strategy of combined de novo assembly and genetic mapping to examine the chromosome-scale genome organization of the Atlantic horseshoe crab, Limulus polyphemus. We constructed a genetic linkage map of this 2.7 Gbp genome by sequencing the nuclear DNA of 34 wild-collected, full-sibling embryos and their parents at a mean redundancy of 1.1x per sample. The map includes 84,307 sequence markers grouped into 1,876 distinct genetic intervals and 5,775 candidate conserved protein coding genes. Conclusions Comparison with other metazoan genomes shows that the L. polyphemus genome preserves ancestral bilaterian linkage groups, and that a common ancestor of modern horseshoe crabs underwent one or more ancient whole genome duplications 300 million years ago, followed by extensive chromosome fusion. These results provide a counter-example to the often noted correlation between whole genome duplication and evolutionary radiations. The new, low-cost genetic mapping method for obtaining a chromosome-scale view of non-model organism genomes that we demonstrate here does not require laboratory culture, and is potentially applicable to a broad range of other species. PMID:24987520
Probability & Perception: The Representativeness Heuristic in Action
ERIC Educational Resources Information Center
Lu, Yun; Vasko, Francis J.; Drummond, Trevor J.; Vasko, Lisa E.
2014-01-01
If the prospective students of probability lack a background in mathematical proofs, hands-on classroom activities may work well to help them to learn to analyze problems correctly. For example, students may physically roll a die twice to count and compare the frequency of the sequences. Tools such as graphing calculators or Microsoft Excel®…
2008-07-01
consider a proof as a composition relative to some system of music or as a painting. From the Bayesian perspective, any sufciently complex problem has...these types algorithms based on maximum entropy analysis. An example is the Bar-Shalom- Campo Fusion Rule: Xf (kjk) = X2(kjk) + (P22 P21)U1[X1(kjk
The Power of Scripting: DGS Meets Programming
ERIC Educational Resources Information Center
Richter-Gebert, Jürgen; Kortenkamp, Ulrich
2010-01-01
In this article we demonstrate how the combination of a system for dynamic geometry with a freely programmable scripting environment can be advantageously used in teaching and research. We explain the reasons behind various design decisions that were made by us when designing the language "CindyScript" and give examples that proof how…
Counter Examples as Starting Points for Reasoning and Sense Making
ERIC Educational Resources Information Center
Yopp, David A.
2013-01-01
This article describes a classroom activity with college sophomores in a methods-of-proof course in which students reasoned about absolute value inequalities. The course was designed to meet the needs of both mathematics majors and secondary school mathematics teaching majors early in their college studies. Asked to "fix" a false…
The Proof of the Pudding: When You're Eyeball-to-Eyeball with Students.
ERIC Educational Resources Information Center
Sinclair, Phillip A.
Suggestions for communicating and therefore teaching college students effectively are put forth. Emphasis is on lively interactions between students and teachers, with additional focus on the instructor's need to understand student needs both in the classroom and after graduation. Specific methods are illustrated with classroom examples for…
The Big Crush: An Introduction to Materials Testing
ERIC Educational Resources Information Center
Roman, Harry T.
2011-01-01
Lots of engineering thinking can be involved in crushing things. As an example, engineers spend a great deal of time designing crush-proof packaging for delicate equipment and packing materials for items that must be stored or shipped. This article presents an activity wherein students can begin to appreciate the technology behind the engineering.…
Entanglement for All Quantum States
ERIC Educational Resources Information Center
de la Torre, A. C.; Goyeneche, D.; Leitao, L.
2010-01-01
It is shown that a state that is factorizable in the Hilbert space corresponding to some choice of degrees of freedom becomes entangled for a different choice of degrees of freedom. Therefore, entanglement is not a special case but is ubiquitous in quantum systems. Simple examples are calculated and a general proof is provided. The physical…
Calabi's conjecture and some new results in algebraic geometry
Yau, Shing-Tung
1977-01-01
We announce a proof of Calabi's conjectures on the Ricci curvature of a compact Kähler manifold and then apply it to prove some new results in algebraic geometry and differential geometry. For example, we prove that the only Kähler structure on a complex projective space is the standard one. PMID:16592394
A portfolio-based approach to optimize proof-of-concept clinical trials.
Mallinckrodt, Craig; Molenberghs, Geert; Persinger, Charles; Ruberg, Stephen; Sashegyi, Andreas; Lindborg, Stacy
2012-01-01
Improving proof-of-concept (PoC) studies is a primary lever for improving drug development. Since drug development is often done by institutions that work on multiple drugs simultaneously, the present work focused on optimum choices for rates of false positive (α) and false negative (β) results across a portfolio of PoC studies. Simple examples and a newly derived equation provided conceptual understanding of basic principles regarding optimum choices of α and β in PoC trials. In examples that incorporated realistic development costs and constraints, the levels of α and β that maximized the number of approved drugs and portfolio value varied by scenario. Optimum choices were sensitive to the probability the drug was effective and to the proportion of total investment cost prior to establishing PoC. Results of the present investigation agree with previous research in that it is important to assess optimum levels of α and β. However, the present work also highlighted the need to consider cost structure using realistic input parameters relevant to the question of interest.
MSFC crack growth analysis computer program, version 2 (users manual)
NASA Technical Reports Server (NTRS)
Creager, M.
1976-01-01
An updated version of the George C. Marshall Space Flight Center Crack Growth Analysis Program is described. The updated computer program has significantly expanded capabilities over the original one. This increased capability includes an extensive expansion of the library of stress intensity factors, plotting capability, increased design iteration capability, and the capability of performing proof test logic analysis. The technical approaches used within the computer program are presented, and the input and output formats and options are described. Details of the stress intensity equations, example data, and example problems are presented.
Proceedings of the Third International Workshop on Proof-Carrying Code and Software Certification
NASA Technical Reports Server (NTRS)
Ewen, Denney, W. (Editor); Jensen, Thomas (Editor)
2009-01-01
This NASA conference publication contains the proceedings of the Third International Workshop on Proof-Carrying Code and Software Certification, held as part of LICS in Los Angeles, CA, USA, on August 15, 2009. Software certification demonstrates the reliability, safety, or security of software systems in such a way that it can be checked by an independent authority with minimal trust in the techniques and tools used in the certification process itself. It can build on existing validation and verification (V&V) techniques but introduces the notion of explicit software certificates, Vvilich contain all the information necessary for an independent assessment of the demonstrated properties. One such example is proof-carrying code (PCC) which is an important and distinctive approach to enhancing trust in programs. It provides a practical framework for independent assurance of program behavior; especially where source code is not available, or the code author and user are unknown to each other. The workshop wiII address theoretical foundations of logic-based software certification as well as practical examples and work on alternative application domains. Here "certificate" is construed broadly, to include not just mathematical derivations and proofs but also safety and assurance cases, or any fonnal evidence that supports the semantic analysis of programs: that is, evidence about an intrinsic property of code and its behaviour that can be independently checked by any user, intermediary, or third party. These guarantees mean that software certificates raise trust in the code itself, distinct from and complementary to any existing trust in the creator of the code, the process used to produce it, or its distributor. In addition to the contributed talks, the workshop featured two invited talks, by Kelly Hayhurst and Andrew Appel. The PCC 2009 website can be found at http://ti.arc.nasa.gov /event/pcc 091.
Bounds on the power of proofs and advice in general physical theories.
Lee, Ciarán M; Hoban, Matty J
2016-06-01
Quantum theory presents us with the tools for computational and communication advantages over classical theory. One approach to uncovering the source of these advantages is to determine how computation and communication power vary as quantum theory is replaced by other operationally defined theories from a broad framework of such theories. Such investigations may reveal some of the key physical features required for powerful computation and communication. In this paper, we investigate how simple physical principles bound the power of two different computational paradigms which combine computation and communication in a non-trivial fashion: computation with advice and interactive proof systems. We show that the existence of non-trivial dynamics in a theory implies a bound on the power of computation with advice. Moreover, we provide an explicit example of a theory with no non-trivial dynamics in which the power of computation with advice is unbounded. Finally, we show that the power of simple interactive proof systems in theories where local measurements suffice for tomography is non-trivially bounded. This result provides a proof that [Formula: see text] is contained in [Formula: see text], which does not make use of any uniquely quantum structure-such as the fact that observables correspond to self-adjoint operators-and thus may be of independent interest.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Clark, Terry
The biggest challenge affecting lighting decisions today is future-proofing. Choices made today will likely be choices that impact the next 20 or perhaps even 40 years. For example, we can expect the best LED lighting available today to maintain 90% of initial light output for 100,000 hours or more. Compare this to a fluorescent lighting system that needs regular maintenance after only 30,000 hours due to lamp burn-outs. The simple act of choosing a LED system over a fluorescent one alone can begin to reduce life cycle costs by saving future maintenance costs. However, the choice of LED over fluorescentmore » is just the beginning. Here, let’s look at other future-proofing decisions that should be considered when choosing your next lighting system.« less
Controlling the digital transfer process
NASA Astrophysics Data System (ADS)
Brunner, Felix
1997-02-01
The accuracy of today's color management systems fails to satisfy the requirements of the graphic arts market. A first explanation for this is that color calibration charts on which these systems rely, because of print technical reasons, are subject to color deviations and inconsistencies. A second reason is that colorimetry describes the human visual perception of color differences and has no direct relation to the rendering technology itself of a proofing or printing device. The author explains that only firm process control of the many parameters in offset printing by means of a system as for example EUROSTANDARD System Brunner, can lead to accurate and consistent calibration of scanner, display, proof and print. The same principles hold for the quality management of digital presses.
Development and necessary norms of reasoning
Markovits, Henry
2014-01-01
The question of whether reasoning can, or should, be described by a single normative model is an important one. In the following, I combine epistemological considerations taken from Piaget’s notion of genetic epistemology, a hypothesis about the role of reasoning in communication and developmental data to argue that some basic logical principles are in fact highly normative. I argue here that explicit, analytic human reasoning, in contrast to intuitive reasoning, uniformly relies on a form of validity that allows distinguishing between valid and invalid arguments based on the existence of counterexamples to conclusions. PMID:24904501
Organic Glasses with Tunable Liquid-Crystalline Order
NASA Astrophysics Data System (ADS)
Teerakapibal, Rattavut; Huang, Chengbin; Gujral, Ankit; Ediger, Mark D.; Yu, Lian
2018-02-01
Liquid crystals (LCs) are known to undergo rapid ordering transitions with virtually no hysteresis. We report a remarkable counterexample, itraconazole, where the nematic to smectic transition is avoided at a cooling rate exceeding 20 K /s . The smectic order trapped in a glass is the order reached by the equilibrium liquid before the kinetic arrest of the end-over-end molecular rotation. This is attributed to the fact that smectic ordering requires orientational ordering and suggests a general condition for preparing organic glasses with tunable LC order for electronic applications.
Testing the weak gravity-cosmic censorship connection
NASA Astrophysics Data System (ADS)
Crisford, Toby; Horowitz, Gary T.; Santos, Jorge E.
2018-03-01
A surprising connection between the weak gravity conjecture and cosmic censorship has recently been proposed. In particular, it was argued that a promising class of counterexamples to cosmic censorship in four-dimensional Einstein-Maxwell-Λ theory would be removed if charged particles (with sufficient charge) were present. We test this idea and find that indeed if the weak gravity conjecture is true, one cannot violate cosmic censorship this way. Remarkably, the minimum value of charge required to preserve cosmic censorship appears to agree precisely with that proposed by the weak gravity conjecture.
Exotica and the status of the strong cosmic censor conjecture in four dimensions
NASA Astrophysics Data System (ADS)
Etesi, Gábor
2017-12-01
An immense class of physical counterexamples to the four dimensional strong cosmic censor conjecture—in its usual broad formulation—is exhibited. More precisely, out of any closed and simply connected 4-manifold an open Ricci-flat Lorentzian 4-manifold is constructed which is not globally hyperbolic, and no perturbation of which, in any sense, can be globally hyperbolic. This very stable non-global-hyperbolicity is the consequence of our open spaces having a ‘creased end’—i.e. an end diffeomorphic to an exotic \
Transition from Model to Proof: Example of Water Treatment Plant
ERIC Educational Resources Information Center
Güler, Gürsel
2016-01-01
The aim of this study was to research the prospective mathematics teachers' ability to construct a mathematical model for a real life problem and to prove these models by generalizing them to use in similar situations. The study was conducted with 129 prospective teachers determined on a volunteering basis. The data were obtained with the help of…
Educating Students from Refugee Backgrounds: Ethical Conduct to Resist the Politics of Besiegement
ERIC Educational Resources Information Center
Sidhu, Ravinder; Naidoo, Loshini
2018-01-01
The settlement in Australia of people fleeing from war and persecution is claimed as proof of its humanitarian credentials. Australia's identity as a settler colony draws attention to a darker history, featuring colonial practices that remain in the background of educational debates. The paper begins with two examples of harsh and punitive…
Nationalism and Internationalism in the Philosophy of Music Education: The German Example
ERIC Educational Resources Information Center
Vogt, Jurgen
2007-01-01
The philosophy of music education has grown remarkably during the last decades, and now has all the characteristics of an academic discipline, including a growing scientific community and several forums for public discussions--the MayDay-Group and its e-journal "Action, Criticism, and Theory for Music Education" are one proof of that,…
Chest injury while wearing a bullet-proof vest.
Miller, Michael A; Levsky, Marc E
2008-07-01
Ballistic protective vests and garments have evolved into important life-saving measures for members of police forces and militaries. Although effectively reducing morbidity and mortality from projectile injuries, significant injuries still do occur. We report a case demonstrating an example of the effects of transmitted forces through a protective vest resulting in a significant chest contusion.
ERIC Educational Resources Information Center
Herrera, Christine A.; McCabe, Terrance; Strictland, Sharon; White, Alexander
2018-01-01
In an undergraduate analysis course taught by one of the authors, three prompts are regularly given: (i) What do we know? (ii) What do we need to show? (iii) Let's draw a picture. We focus on the third prompt and its role in helping students develop their confidence in learning how to construct proofs. Specific examples of visual models and their…
Formal specification and verification of Ada software
NASA Technical Reports Server (NTRS)
Hird, Geoffrey R.
1991-01-01
The use of formal methods in software development achieves levels of quality assurance unobtainable by other means. The Larch approach to specification is described, and the specification of avionics software designed to implement the logic of a flight control system is given as an example. Penelope is described which is an Ada-verification environment. The Penelope user inputs mathematical definitions, Larch-style specifications and Ada code and performs machine-assisted proofs that the code obeys its specifications. As an example, the verification of a binary search function is considered. Emphasis is given to techniques assisting the reuse of a verification effort on modified code.
The Principles of Designing an Expert System in Teaching Mathematics
ERIC Educational Resources Information Center
Salekhova, Lailya; Nurgaliev, Albert; Zaripova, Rinata; Khakimullina, Nailya
2013-01-01
This study reveals general didactic concepts of the Expert Systems (ES) development process in the educational area. The proof of concept is based on the example of teaching the 8th grade Algebra subject. The main contribution in this work is the implementation of innovative approaches in analysis and processing of data by expert system as well as…
A GIS System for Inferring Subsurface Geology and Material Properties: Proof of Concept
2006-09-01
geologic structure. For example, interbedded sedimentary rocks comprise significant proportions of the Appalachian Mountains as well as various mountain ...Pitted surfaces a. Shallow, rounded, non-uniform b. More or less circular Hills and Mountains … Drainage...pear-shaped ap - pendages; talus common at bases of slopes along boundaries; strongly verti- cally jointed; vertical escarpments; co- lumnar jointing
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gastelum, Zoe N.; Henry, Michael J.; Burtner, IV, E. R.
The International Atomic Energy Agency (IAEA) is interested in increasing capabilities of IAEA safeguards inspectors to access information that would improve their situational awareness on the job. A mobile information platform could potentially provide access to information, analytics, and technical and logistical support to inspectors in the field, as well as providing regular updates to analysts at IAEA Headquarters in Vienna or at satellite offices. To demonstrate the potential capability of such a system, Pacific Northwest National Laboratory (PNNL) implemented a number of example capabilities within a PNNL-developed precision information environment (PIE), and using a tablet as a mobile informationmore » platform. PNNL’s safeguards proof-of-concept PIE intends to; demonstrate novel applications of mobile information platforms to international safeguards use cases; demonstrate proof-of-principle capability implementation; and provide “vision” for capabilities that could be implemented. This report documents the lessons learned from this two-year development activity for the Precision Information Environment for International Safeguards (PIE-IS), describing the developed capabilities, technical challenges, and considerations for future development, so that developers working to develop a similar system for the IAEA or other safeguards agencies might benefit from our work.« less
Proof-of-principle to unfold an angle-energy dependent source from forward and adjoint calculations
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pace, J.V. III
For many years there has existed a discrepancy between the measured and calculated responses from the Little Boy weapon in Hiroshima. A myriad of solutions have been proposed, but to no avail. If one can rationalize to himself that it does not really matter exactly what happened with the weapon when it exploded, and if sufficient information exist about the measurements, one should be able to unfold the source. Moreover, if a source can be unfolded in a controlled environment, then it should be possible to unfold a more complicated source, for example, the Little Boy source. This report recordsmore » the findings of a proof-of-principle test to unfold a source in the controlled environment.« less
Time-dependent reliability analysis of ceramic engine components
NASA Technical Reports Server (NTRS)
Nemeth, Noel N.
1993-01-01
The computer program CARES/LIFE calculates the time-dependent reliability of monolithic ceramic components subjected to thermomechanical and/or proof test loading. This program is an extension of the CARES (Ceramics Analysis and Reliability Evaluation of Structures) computer program. CARES/LIFE accounts for the phenomenon of subcritical crack growth (SCG) by utilizing either the power or Paris law relations. The two-parameter Weibull cumulative distribution function is used to characterize the variation in component strength. The effects of multiaxial stresses are modeled using either the principle of independent action (PIA), the Weibull normal stress averaging method (NSA), or the Batdorf theory. Inert strength and fatigue parameters are estimated from rupture strength data of naturally flawed specimens loaded in static, dynamic, or cyclic fatigue. Two example problems demonstrating proof testing and fatigue parameter estimation are given.
Triangle inequalities in coherence measures and entanglement concurrence
NASA Astrophysics Data System (ADS)
Dai, Yue; You, Wenlong; Dong, Yuli; Zhang, Chengjie
2017-12-01
We provide detailed proofs of triangle inequalities in coherence measures and entanglement concurrence. If a rank-2 state ϱ can be expressed as a convex combination of two pure states, i.e., ϱ =p1| ψ1〉〈 ψ1|+ p2| ψ2〉〈 ψ2| , a triangle inequality can be established as |E (|Ψ1〉 )-E (|Ψ2〉 )|≤E (ϱ ) ≤E (|Ψ1〉 )+E (|Ψ2〉 ) , where | Ψ1〉= √{p1}|ψ1〉 and | Ψ2〉= √{p2}|ψ2〉 ; E can be considered either coherence measures or entanglement concurrence. This inequality displays mathematical beauty for its similarity to the triangle inequality in plane geometry. An illustrative example is given after the proof.
Preventing medical errors by designing benign failures.
Grout, John R
2003-07-01
One way to successfully reduce medical errors is to design health care systems that are more resistant to the tendencies of human beings to err. One interdisciplinary approach entails creating design changes, mitigating human errors, and making human error irrelevant to outcomes. This approach is intended to facilitate the creation of benign failures, which have been called mistake-proofing devices and forcing functions elsewhere. USING FAULT TREES TO DESIGN FORCING FUNCTIONS: A fault tree is a graphical tool used to understand the relationships that either directly cause or contribute to the cause of a particular failure. A careful analysis of a fault tree enables the analyst to anticipate how the process will behave after the change. EXAMPLE OF AN APPLICATION: A scenario in which a patient is scalded while bathing can serve as an example of how multiple fault trees can be used to design forcing functions. The first fault tree shows the undesirable event--patient scalded while bathing. The second fault tree has a benign event--no water. Adding a scald valve changes the outcome from the undesirable event ("patient scalded while bathing") to the benign event ("no water") Analysis of fault trees does not ensure or guarantee that changes necessary to eliminate error actually occur. Most mistake-proofing is used to prevent simple errors and to create well-defended processes, but complex errors can also result. The utilization of mistake-proofing or forcing functions can be thought of as changing the logic of a process. Errors that formerly caused undesirable failures can be converted into the causes of benign failures. The use of fault trees can provide a variety of insights into the design of forcing functions that will improve patient safety.
2010-11-01
Novembre 2010. Contexte: La puissance des ordinateurs nous permet aujourd’hui d’étudier des problèmes pour lesquels une solution analytique n’existe... 13 4.8 Proof of Corollary........................................................................................................ 13 ...optimal capacities for links. e DRDC CORA TM 2010-249 13 4.9 Example Figure 4 below shows that the probability of achieving the optimal
Review of finite fields: Applications to discrete Fourier, transforms and Reed-Solomon coding
NASA Technical Reports Server (NTRS)
Wong, J. S. L.; Truong, T. K.; Benjauthrit, B.; Mulhall, B. D. L.; Reed, I. S.
1977-01-01
An attempt is made to provide a step-by-step approach to the subject of finite fields. Rigorous proofs and highly theoretical materials are avoided. The simple concepts of groups, rings, and fields are discussed and developed more or less heuristically. Examples are used liberally to illustrate the meaning of definitions and theories. Applications include discrete Fourier transforms and Reed-Solomon coding.
Standards, Efficiency, and the Evolution of Web Design
ERIC Educational Resources Information Center
Mitchell, Erik
2010-01-01
The author recently created a presentation using HTML5 based on a tutorial put together by Marcin Wichary. The example presentation is part proof-of-concept, part instructional piece, and it is part of a larger site on HTML5 and how one can use it to create rich Web-based applications. The more he delved into HTML5, the more he found that it was…
2009-08-01
transmitter state. For example, theory has shown that for a non-classical ten entangled photon N00N state used as a Type-1 sensor, typical losses...stemmed from Lloyd’s proof [14] that a large performance gain accrues from the use of entanglement in single- photon target detection within a lossy...output. These mode pairs are in independent identically distributed (iid), zero-mean, maximally- entangled Gaussian states with average photon number
Modal and Temporal Argumentation Networks
NASA Astrophysics Data System (ADS)
Barringer, Howard; Gabbay, Dov M.
The traditional Dung networks depict arguments as atomic and studies the relationships of attack between them. This can be generalised in two ways. One is to consider, for example, various forms of attack, support and feedback. Another is to add content to nodes and put there not just atomic arguments but more structure, for example, proofs in some logic or simply just formulas from a richer language. This paper offers to use temporal and modal language formulas to represent arguments in the nodes of a network. The suitable semantics for such networks is Kripke semantics. We also introduce a new key concept of usability of an argument.
Polynomial interpretation of multipole vectors
NASA Astrophysics Data System (ADS)
Katz, Gabriel; Weeks, Jeff
2004-09-01
Copi, Huterer, Starkman, and Schwarz introduced multipole vectors in a tensor context and used them to demonstrate that the first-year Wilkinson microwave anisotropy probe (WMAP) quadrupole and octopole planes align at roughly the 99.9% confidence level. In the present article, the language of polynomials provides a new and independent derivation of the multipole vector concept. Bézout’s theorem supports an elementary proof that the multipole vectors exist and are unique (up to rescaling). The constructive nature of the proof leads to a fast, practical algorithm for computing multipole vectors. We illustrate the algorithm by finding exact solutions for some simple toy examples and numerical solutions for the first-year WMAP quadrupole and octopole. We then apply our algorithm to Monte Carlo skies to independently reconfirm the estimate that the WMAP quadrupole and octopole planes align at the 99.9% level.
Locality, reflection, and wave-particle duality
NASA Astrophysics Data System (ADS)
Mugur-Schächter, Mioara
1987-08-01
Bell's theorem is believed to establish that the quantum mechanical predictions do not generally admit a causal representation compatible with Einsten's principle of separability, thereby proving incompatibility between quantum mechanics and relativity. This interpretation is contested via two convergent approaches which lead to a sharp distinction between quantum nonseparability and violation of Einstein's theory of relativity. In a first approach we explicate from the quantum mechanical formalism a concept of “reflected dependence.” Founded on this concept, we produce a causal representation of the quantum mechanical probability measure involved in Bell's proof, which is clearly separable in Einstein's sense, i.e., it does not involve supraluminal velocities, and nevertheless is “nonlocal” in Bell's sense. So Bell locality and Einstein separability are distinct qualifications, and Bell nonlocality (or Bell nonseparability) and Einstein separability are not incompatible. It is then proved explicitly that with respect to the mentioned representation Bell's derivation does not hold. So Bell's derivation does not establish that any Einstein-separable representation is incompatible with quantum mechanics. This first—negative—conclusion is a syntactic fact. The characteristics of the representation and of the reasoning involved in the mentioned counterexample to the usual interpretation of Bell's theorem suggest that the representation used—notwithstanding its ability to bring forth the specified syntactic fact—is not factually true. Factual truth and syntactic properties also have to be radically distinguished in their turn. So, in a second approach, starting from de Broglie's initial relativistic model of a microsystem, a deeper, factually acceptable representation is constructed. The analyses leading to this second representation show that quantum mechanics does indeed involve basically a certain sort of nonseparability, called here de Broglie-Bohr quantum nonseparability. But the de Broglie-Bohr quantum nonseparability is shown to stem directly from the relativistic character of the considerations which led Louis de Broglie to the fundamental relation p = h/λ, thereby being essentially consistent with relativity. As to Einstein separability, it appears to be a still insufficiently specified concept of which a future, improved specification, will probably be explicitly harmonizable with the de Broglie-Bohr quantum nonseparability. The ensemble of the conclusions obtained here brings forth a new concept of causality, a concept of folded, zigzag, reflexive causality, with respect to which the type of causality conceived of up to now appears as a particular case of outstretched, one-way causality. The reflexive causality is found compatible with the results of Aspect's experiment, and it suggests new experiments. Considered globally, the conclusions obtained in the present work might convert the conceptual situation created by Bell's proof into a process of unification of quantum mechanics and relativity.
The brain-sex theory of occupational choice: a counterexample.
Esgate, Anthony; Flynn, Maria
2005-02-01
The brain-sex theory of occupational choice suggests that males and females in male-typical careers show a male pattern of cognitive ability in terms of better spatial than verbal performance on cognitive tests with the reverse pattern for females and males in female-typical careers. These differences are thought to result from patterns of cerebral functional lateralisation. This study sought such occupationally related effects using synonym generation (verbal ability) and mental rotation (spatial ability) tasks used previously. It also used entrants to these careers as participants to examine whether patterns of cognitive abilities might predate explicit training and practice. Using a population of entrants to sex-differentiated university courses, a moderate occupational effect on the synonym generation task was found, along with a weak (p < .10) sex effect on the mental rotation task. Highest performance on the mental rotation task was by female students in fashion design, a female-dominated occupation which makes substantial visuospatial demands and attracts many students with literacy problems such as dyslexia. This group then appears to be a counterexample to the brain-sex theory. However, methodological issues surrounding previous studies are highlighted: the simple synonym task appears to show limited discrimination of the sexes, leading to questions concerning the legitimacy of inferences about lateralisation based on scores from that test. Moreover, the human figure-based mental rotation task appears to tap the wrong aspect of visuospatial skill, likely to be needed for male-typical courses such as engineering. Since the fashion-design career is also one that attracts disproportionately many male students whose sexual orientation is homosexual, data were examined for evidence of female-typical patterns of cognitive performance among that subgroup. This was not found. This study therefore provides no evidence for the claim that female-pattern cerebral functional lateralisation is likely in gay males.
2010-12-02
Motzkin, T. and Straus, E. (1965). Maxima for graphs and a new proof of a theorem of Turan . Canad. J. Math. 17 533–540. [33] Rendl, F. and Sotirov, R...Convex Graph Invariants Venkat Chandrasekaran, Pablo A . Parrilo, and Alan S. Willsky ∗ Laboratory for Information and Decision Systems Department of...this paper we study convex graph invariants, which are graph invariants that are convex functions of the adjacency matrix of a graph. Some examples
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lee, Adam J.; Perano, Kenneth J.
In trust negotiation, resource providers specify access control policies in terms of the attributes that should be possessed by authorized users, rather than the identities of these users. Users can prove ownership of certain attributes through the use of digital credentials issued by trusted entities. For example, the Department of Motor Vehicles might issue vehicle owners X.509 driver's licenses that can be used to demonstrate proof of their current age, address, or ability to drive. These types of digital credentials may also be protected by user-specified policies controlling their release to remote parties; for example, Alice might only be willingmore » to show her VISA card credential to members of the Better Business Bureau. In this way, a request to access a given resource can result in a bilateral and iterative exchange of policies and credentials that represents a negotiation between the participating parties. To date, research interest in trust negotiation has been primarily theoretical and any implementations have been largely proofs of concept; experimenting with these prototypes is often not a straightforward task. TrustBuilder2 is a flexible framework for supporting research in the area trust negotiation protocols, designed to allow researchers to quickly prototype and experiment with various approaches to trust negotiation. In TrustBuilder2, the primary components of a trust negotiation system are represented using abstract interfaces.« less
Delusions as harmful malfunctioning beliefs.
Miyazono, Kengo
2015-05-01
Delusional beliefs are typically pathological. Being pathological is clearly distinguished from being false or being irrational. Anna might falsely believe that his husband is having an affair but it might just be a simple mistake. Again, Sam might irrationally believe, without good evidence, that he is smarter than his colleagues, but it might just be a healthy self-deceptive belief. On the other hand, when a patient with brain damage caused by a car accident believes that his father was replaced by an imposter or another patient with schizophrenia believes that "The Organization" painted the shops on a street in red and green to convey a message, these beliefs are not merely false or irrational. They are pathological. What makes delusions pathological? This paper explores the negative features because of which delusional beliefs are pathological. First, I critically examine the proposals according to which delusional beliefs are pathological because of (1) their strangeness, (2) their extreme irrationality, (3) their resistance to folk psychological explanations or (4) impaired responsibility-grounding capacities of people with them. I present some counterexamples as well as theoretical problems for these proposals. Then, I argue, following Wakefield's harmful dysfunction analysis of disorder, that delusional beliefs are pathological because they involve some sorts of harmful malfunctions. In other words, they have a significant negative impact on wellbeing (=harmful) and, in addition, some psychological mechanisms, directly or indirectly related to them, fail to perform the jobs for which they were selected in the past (=malfunctioning). An objection to the proposal is that delusional beliefs might not involve any malfunctions. For example, they might be playing psychological defence functions properly. Another objection is that a harmful malfunction is not sufficient for something to be pathological. For example, false beliefs might involve some malfunctions according to teleosemantics, a popular naturalist account of mental content, but harmful false beliefs do not have to be pathological. I examine those objections in detail and show that they should be rejected after all. Copyright © 2014. Published by Elsevier Inc.
Legitimacy in bioethics: challenging the orthodoxy.
Smith, William R
2018-06-01
Several prominent writers including Norman Daniels, James Sabin, Amy Gutmann, Dennis Thompson and Leonard Fleck advance a view of legitimacy according to which, roughly, policies are legitimate if and only if they result from democratic deliberation, which employs only public reasons that are publicised to stakeholders. Yet, the process described by this view contrasts with the actual processes involved in creating the Affordable Care Act (ACA) and in attempting to pass the Health Securities Act (HSA). Since the ACA seems to be legitimate, as the HSA would have been had it passed, there seem to be counterexamples to this view. In this essay, I clarify the concept of legitimacy as employed in bioethics discourse. I then use that clarification to develop these examples into a criticism of the orthodox view-that it implies that legitimacy requires counterintuitively large sacrifices of justice in cases where important advancement of healthcare rights depends on violations of publicity. Finally, I reply to three responses to this challenge: (1) that some revision to the orthodox view salvages its core commitments, (2) that its views of publicity and substantive considerations do not have the implications that I claim and (3) that arguments for it are strong enough to support even counterintuitive results. My arguments suggest a greater role for substantive considerations than the orthodox view allows. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.
EPR, Bell, and quantum locality
NASA Astrophysics Data System (ADS)
Griffiths, Robert B.
2011-09-01
Maudlin has claimed that no local theory can reproduce the predictions of standard quantum mechanics that violate Bell's inequality for Bohm's version (two spin-half particles in a singlet state) of the Einstein-Podolsky-Rosen problem. It is argued that, on the contrary, standard quantum mechanics itself is a counterexample to Maudlin's claim, because it is local in the appropriate sense (measurements at one place do not influence what occurs elsewhere there) when formulated using consistent principles in place of the inconsistent appeals to "measurement" found in current textbooks. This argument sheds light on the claim of Blaylock that counterfactual definiteness is an essential ingredient in derivations of Bell's inequality.
Highet, Megan J
2013-06-01
Regarding the relationship between religious affiliation and patterns of differential mortality, many hold that any proxy for religion is hopelessly confounded, but that religiosity nevertheless certainly functions to benefit the health of the devout. Edmonton's scarlet fever epidemic (1893-1894) provides a counterexample to prevailing notions, in that religious affiliation is revealed as a risk-factor for this specific threat to health. Roman Catholic children were found to be at a significantly greater risk of dying from scarlet fever than were their counterparts from all other denominations combined, which is demonstrated as a direct corollary of religious affiliation.
Density of convex intersections and applications
Rautenberg, C. N.; Rösel, S.
2017-01-01
In this paper, we address density properties of intersections of convex sets in several function spaces. Using the concept of Γ-convergence, it is shown in a general framework, how these density issues naturally arise from the regularization, discretization or dualization of constrained optimization problems and from perturbed variational inequalities. A variety of density results (and counterexamples) for pointwise constraints in Sobolev spaces are presented and the corresponding regularity requirements on the upper bound are identified. The results are further discussed in the context of finite-element discretizations of sets associated with convex constraints. Finally, two applications are provided, which include elasto-plasticity and image restoration problems. PMID:28989301
[The proof of paternity. An andrological-forensic challenge in historical perspective].
Albrecht, K; Schultheiss, D
2004-10-01
For centuries, difficulties have occurred in determining unresolved paternities. In addition to the modern standard methods, such as the examination of DNA or serological proof, expert opinion on fertility once played an important role. The andrological difference between incapability to fertilise and the inability to participate in sexual intercourse was also distinguished historically. Of special significance was the discovery of spermatozoa by the medical student Johan Ham in 1677 and their further investigation by Antoni van Leeuwenhoek.Recently, modern DNA methods have also been applied for historical investigations. Illustrious examples are the DNA analysis in the case of Kaspar Hauser of Ansbach and the dispute about Thomas Jefferson, President of the U.S., fathering a child by one of his slaves. In this discourse, a medicinal-forensic review of the development of expert opinion, illustrated with historical case studies, is given.
Lifetime Reliability Evaluation of Structural Ceramic Parts with the CARES/LIFE Computer Program
NASA Technical Reports Server (NTRS)
Nemeth, Noel N.; Powers, Lynn M.; Janosik, Lesley A.; Gyekenyesi, John P.
1993-01-01
The computer program CARES/LIFE calculates the time-dependent reliability of monolithic ceramic components subjected to thermomechanical and/or proof test loading. This program is an extension of the CARES (Ceramics Analysis and Reliability Evaluation of Structures) computer program. CARES/LIFE accounts for the phenomenon of subcritical crack growth (SCG) by utilizing the power law, Paris law, or Walker equation. The two-parameter Weibull cumulative distribution function is used to characterize the variation in component strength. The effects of multiaxial stresses are modeled using either the principle of independent action (PIA), Weibull's normal stress averaging method (NSA), or Batdorf's theory. Inert strength and fatigue parameters are estimated from rupture strength data of naturally flawed specimens loaded in static, dynamic, or cyclic fatigue. Two example problems demonstrating cyclic fatigue parameter estimation and component reliability analysis with proof testing are included.
Bioinspired nanovalves with selective permeability and pH sensitivity
NASA Astrophysics Data System (ADS)
Zheng, Z.; Huang, X.; Schenderlein, M.; Moehwald, H.; Xu, G.-K.; Shchukin, D. G.
2015-01-01
Biological systems with controlled permeability and release functionality, which are among the successful examples of living beings to survive in evolution, have attracted intensive investigation and have been mimicked due to their broad spectrum of applications. We present in this work, for the first time, an example of nuclear pore complexes (NPCs)-inspired controlled release system that exhibits on-demand release of angstrom-sized molecules. We do so in a cost-effective way by stabilizing porous cobalt basic carbonates as nanovalves and realizing pH-sensitive release of entrapped subnano cargo. The proof-of-concept work also consists of the establishment of two mathematical models to explain the selective permeability of the nanovalves. Finally, gram-sized (or larger) quantities of the bio-inspired controlled release system can be synthesized through a scaling-up strategy, which opens up opportunities for controlled release of functional molecules in wider practical applications.Biological systems with controlled permeability and release functionality, which are among the successful examples of living beings to survive in evolution, have attracted intensive investigation and have been mimicked due to their broad spectrum of applications. We present in this work, for the first time, an example of nuclear pore complexes (NPCs)-inspired controlled release system that exhibits on-demand release of angstrom-sized molecules. We do so in a cost-effective way by stabilizing porous cobalt basic carbonates as nanovalves and realizing pH-sensitive release of entrapped subnano cargo. The proof-of-concept work also consists of the establishment of two mathematical models to explain the selective permeability of the nanovalves. Finally, gram-sized (or larger) quantities of the bio-inspired controlled release system can be synthesized through a scaling-up strategy, which opens up opportunities for controlled release of functional molecules in wider practical applications. Electronic supplementary information (ESI) available. See DOI: 10.1039/c4nr06378c
Spatial encoding using the nonlinear field perturbations from magnetic materials.
Karimi, Hirad; Dominguez-Viqueira, William; Cunningham, Charles H
2014-08-01
A proof-of-concept study was performed to assess the technical feasibility of using magnetic materials to generate spatial encoding fields. Spatially varying magnetic fields were generated by the placement of markers with different volume susceptibilities within the imaging volume. No linear gradients were used for spatial encoding during the signal acquisition. A signal-encoding model is described for reconstructing the images encoded with these field perturbations. Simulation and proof-of-concept experimental results are presented. Experiments were performed using field perturbations from a cylindrical marker as an example of the new encoding fields. Based on this experimental setup, annular rings were reconstructed from signals encoded with the new fields. Simulation results were presented for different acquisition parameters. Proof-of-concept was supported by the correspondence of regions in an image reconstructed from experimental data compared to those in a conventional gradient-echo image. Experimental results showed that inclusions of dimensions 1.5 mm in size could be resolved with the experimental setup. This study shows the technical feasibility of using magnetic markers to produce encoding fields. Magnetic materials will allow generating spatial encoding fields, which can be tailored to an imaging application with less complexity and at lower cost compared to the use of gradient inserts. Copyright © 2013 Wiley Periodicals, Inc.
Bayesian Phase II optimization for time-to-event data based on historical information.
Bertsche, Anja; Fleischer, Frank; Beyersmann, Jan; Nehmiz, Gerhard
2017-01-01
After exploratory drug development, companies face the decision whether to initiate confirmatory trials based on limited efficacy information. This proof-of-concept decision is typically performed after a Phase II trial studying a novel treatment versus either placebo or an active comparator. The article aims to optimize the design of such a proof-of-concept trial with respect to decision making. We incorporate historical information and develop pre-specified decision criteria accounting for the uncertainty of the observed treatment effect. We optimize these criteria based on sensitivity and specificity, given the historical information. Specifically, time-to-event data are considered in a randomized 2-arm trial with additional prior information on the control treatment. The proof-of-concept criterion uses treatment effect size, rather than significance. Criteria are defined on the posterior distribution of the hazard ratio given the Phase II data and the historical control information. Event times are exponentially modeled within groups, allowing for group-specific conjugate prior-to-posterior calculation. While a non-informative prior is placed on the investigational treatment, the control prior is constructed via the meta-analytic-predictive approach. The design parameters including sample size and allocation ratio are then optimized, maximizing the probability of taking the right decision. The approach is illustrated with an example in lung cancer.
Messina, Marco; Njuguna, James; Palas, Chrysovalantis
2018-01-01
This work focuses on the proof-mass mechanical structural design improvement of a tri-axial piezoresistive accelerometer specifically designed for head injuries monitoring where medium-G impacts are common; for example, in sports such as racing cars or American Football. The device requires the highest sensitivity achievable with a single proof-mass approach, and a very low error (<1%) as the accuracy for these types of applications is paramount. The optimization method differs from previous work as it is based on the progressive increment of the sensor proof-mass mass moment of inertia (MMI) in all three axes. Three different designs are presented in this study, where at each step of design evolution, the MMI of the sensor proof-mass gradually increases in all axes. The work numerically demonstrates that an increment of MMI determines an increment of device sensitivity with a simultaneous reduction of cross-axis sensitivity in the particular axis under study. This is due to the linkage between the external applied stress and the distribution of mass (of the proof-mass), and therefore of its mass moment of inertia. Progressively concentrating the mass on the axes where the piezoresistors are located (i.e., x- and y-axis) by increasing the MMI in the x- and y-axis, will undoubtedly increase the longitudinal stresses applied in that areas for a given external acceleration, therefore increasing the piezoresistors fractional resistance change and eventually positively affecting the sensor sensitivity. The final device shows a sensitivity increase of about 80% in the z-axis and a reduction of cross-axis sensitivity of 18% respect to state-of-art sensors available in the literature from a previous work of the authors. Sensor design, modelling, and optimization are presented, concluding the work with results, discussion, and conclusion. PMID:29351221
Lanchester-Type Models of Warfare. Volume II
1980-10-01
the so-called PERRON - FROBENIUS theorem50 for nonnegative matrices that one can guarantee that (without any further assumptions about A and B) there...always exists a vector of nonnegative values such that, for example, (7.18.6) holds. Before we state the PERRON - FROBENIUS theorem for nonnegative...a proof of this important theorem). THEOREM .5.-1.1 ( PERRON [121] and FROBENIUS [60]): Let C z 0 be an n x n matrix. Then, 1. C has a nonnegative real
A new storage-ring light source
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chao, Alex
2015-06-01
A recently proposed technique in storage ring accelerators is applied to provide potential high-power sources of photon radiation. The technique is based on the steady-state microbunching (SSMB) mechanism. As examples of this application, one may consider a high-power DUV photon source for research in atomic and molecular physics or a high-power EUV radiation source for industrial lithography. A less challenging proof-of-principle test to produce IR radiation using an existing storage ring is also considered.
1989-03-01
medical examination formation, and got on the bus which was designated to take the accused and his family to the ship was sufficient proof of knowledge...restrictions on the right to marry, such as requiring an applicant to meet with a military chaplain, to present medical certificates, and to obtain consent...other person is higher in grade). For example: CO of a ship is a Navy commander and the medical officer is a Navy captain. The CO is superior in the
21ST Century Terrorism: Wrong Diagnosis, Inadequate Remedy
2005-06-01
London: Croom Helm, 1975), p. 15. 38 The Oklahoma bombing, the WTC attack in 1993 and the Tokyo subway sarin gas attack are the examples used by...the Tokyo subway that could have actually caused far more casualties than the 12 deaths that it did.41 This last case is very important, since in...aforementioned Tokyo subway attack is the proof of a clear and present danger. Last but not least, bio-terrorism is another possible “new terrorism
DOE Office of Scientific and Technical Information (OSTI.GOV)
Roos, E.; Maier, V.; Nagel, G.
The break preclusion concept is based on {open_quotes}KTA rules{close_quotes}, {open_quotes}RSK guidelines{close_quotes} and {open_quotes}Rahmenspeziflkation Basissicherheit{close_quotes}. These fundamental rules containing for example requirements on material, design, calculation, manufacturing and testing procedures are explained and the technical realisation is shown by means of examples. The proof of the quality of these piping systems can be executed by means of fracture mechanics calculations by showing that in every case the leakage monitoring system already detect cracks which are clearly smaller than the critical crack. Thus the leak before break behavior and the break preclusion concept is implicitly affirmed. In order to further diminish conservativitiesmore » in the fracture mechanics procedures, specific research projects are executed which are explained in this contribution.« less
Levin, Leslie
2015-01-01
With an increasing awareness that active engagement between policy decision makers, HTA agencies, regulators and payers with industry in the premarket space is needed, a disruptive comprehensive approach is described which moves the evidentiary process exclusively into this space. Single harmonized studies pre-market to address regulatory and coverage needs and expectations are more likely to be efficient and less costly and position evidence to drive rather than test innovation. An example of such a process through the MaRS EXCITE program in Ontario, Canada, now undergoing proof of concept, is briefly discussed. Other examples of dialogue between decision makers and industry pre-market are provided though these are less robust than a comprehensive evidentiary approach.
Quantitative properties of clustering within modern microscopic nuclear models
DOE Office of Scientific and Technical Information (OSTI.GOV)
Volya, A.; Tchuvil’sky, Yu. M., E-mail: tchuvl@nucl-th.sinp.msu.ru
2016-09-15
A method for studying cluster spectroscopic properties of nuclear fragmentation, such as spectroscopic amplitudes, cluster form factors, and spectroscopic factors, is developed on the basis of modern precision nuclear models that take into account the mixing of large-scale shell-model configurations. Alpha-cluster channels are considered as an example. A mathematical proof of the need for taking into account the channel-wave-function renormalization generated by exchange terms of the antisymmetrization operator (Fliessbach effect) is given. Examples where this effect is confirmed by a high quality of the description of experimental data are presented. By and large, the method in question extends substantially themore » possibilities for studying clustering phenomena in nuclei and for improving the quality of their description.« less
Kurtosis as Peakedness, 1905 - 2014. R.I.P.
Westfall, Peter H
The incorrect notion that kurtosis somehow measures "peakedness" (flatness, pointiness or modality) of a distribution is remarkably persistent, despite attempts by statisticians to set the record straight. This article puts the notion to rest once and for all. Kurtosis tells you virtually nothing about the shape of the peak - its only unambiguous interpretation is in terms of tail extremity; i.e., either existing outliers (for the sample kurtosis) or propensity to produce outliers (for the kurtosis of a probability distribution). To clarify this point, relevant literature is reviewed, counterexample distributions are given, and it is shown that the proportion of the kurtosis that is determined by the central μ ± σ range is usually quite small.
Andrei Andreevich Bolibrukh's works on the analytic theory of differential equations
NASA Astrophysics Data System (ADS)
Anosov, Dmitry V.; Leksin, Vladimir P.
2011-02-01
This paper contains an account of A.A. Bolibrukh's results obtained in the new directions of research that arose in the analytic theory of differential equations as a consequence of his sensational counterexample to the Riemann-Hilbert problem. A survey of results of his students in developing topics first considered by Bolibrukh is also presented. The main focus is on the role of the reducibility/irreducibility of systems of linear differential equations and their monodromy representations. A brief synopsis of results on the multidimensional Riemann-Hilbert problem and on isomonodromic deformations of Fuchsian systems is presented, and the main methods in the modern analytic theory of differential equations are sketched. Bibliography: 69 titles.
Is it really naked? On cosmic censorship in string theory
DOE Office of Scientific and Technical Information (OSTI.GOV)
Frolov, Andrei V.
We investigate the possibility of cosmic censorship violation in string theory using a characteristic double-null code, which penetrates horizons and is capable of resolving the spacetime all the way to the singularity. We perform high-resolution numerical simulations of the evolution of negative mass initial scalar field profiles, which were argued to provide a counterexample to cosmic censorship conjecture for AdS-asymptotic spacetimes in five-dimensional supergravity. In no instances formation of naked singularity is seen. Instead, numerical evidence indicates that black holes form in the collapse. Our results are consistent with earlier numerical studies, and explicitly show where the 'no black hole'more » argument breaks.« less
Graph-theoretic strengths of contextuality
NASA Astrophysics Data System (ADS)
de Silva, Nadish
2017-03-01
Cabello-Severini-Winter and Abramsky-Hardy (building on the framework of Abramsky-Brandenburger) both provide classes of Bell and contextuality inequalities for very general experimental scenarios using vastly different mathematical techniques. We review both approaches, carefully detail the links between them, and give simple, graph-theoretic methods for finding inequality-free proofs of nonlocality and contextuality and for finding states exhibiting strong nonlocality and/or contextuality. Finally, we apply these methods to concrete examples in stabilizer quantum mechanics relevant to understanding contextuality as a resource in quantum computation.
Simulation and optimization of volume holographic imaging systems in Zemax.
Wissmann, Patrick; Oh, Se Baek; Barbastathis, George
2008-05-12
We present a new methodology for ray-tracing analysis of volume holographic imaging (VHI) systems. Using the k-sphere formulation, we apply geometrical relationships to describe the volumetric diffraction effects imposed on rays passing through a volume hologram. We explain the k-sphere formulation in conjunction with ray tracing process and describe its implementation in a Zemax UDS (User Defined Surface). We conclude with examples of simulation and optimization results and show proof of consistency and usefulness of the proposed model.
Software Engineering Tools for Scientific Models
NASA Technical Reports Server (NTRS)
Abrams, Marc; Saboo, Pallabi; Sonsini, Mike
2013-01-01
Software tools were constructed to address issues the NASA Fortran development community faces, and they were tested on real models currently in use at NASA. These proof-of-concept tools address the High-End Computing Program and the Modeling, Analysis, and Prediction Program. Two examples are the NASA Goddard Earth Observing System Model, Version 5 (GEOS-5) atmospheric model in Cell Fortran on the Cell Broadband Engine, and the Goddard Institute for Space Studies (GISS) coupled atmosphere- ocean model called ModelE, written in fixed format Fortran.
U.S. sent fuel shipment experience by rail
DOE Office of Scientific and Technical Information (OSTI.GOV)
Colborn, K.
2007-07-01
As planning for the large scale shipment of spent nuclear fuel to Yucca Mountain proceeds to address these challenges, actual shipments of spent fuel in other venues continues to provide proof that domestic rail spent fuel shipments can proceed safely and effectively. This paper presents some examples of recently completed spent fuel shipments, and the shipment of large low-level radioactive waste shipments offering lessons learned that may be beneficial to the planning process for large scale spent fuel shipments in the US. (authors)
On Leighton's comparison theorem
NASA Astrophysics Data System (ADS)
Ghatasheh, Ahmed; Weikard, Rudi
2017-06-01
We give a simple proof of a fairly flexible comparison theorem for equations of the type -(p (u‧ + su)) ‧ + rp (u‧ + su) + qu = 0 on a finite interval where 1 / p, r, s, and q are real and integrable. Flexibility is provided by two functions which may be chosen freely (within limits) according to the situation at hand. We illustrate this by presenting some examples and special cases which include Schrödinger equations with distributional potentials as well as Jacobi difference equations.
A multivariate copula-based framework for dealing with hazard scenarios and failure probabilities
NASA Astrophysics Data System (ADS)
Salvadori, G.; Durante, F.; De Michele, C.; Bernardi, M.; Petrella, L.
2016-05-01
This paper is of methodological nature, and deals with the foundations of Risk Assessment. Several international guidelines have recently recommended to select appropriate/relevant Hazard Scenarios in order to tame the consequences of (extreme) natural phenomena. In particular, the scenarios should be multivariate, i.e., they should take into account the fact that several variables, generally not independent, may be of interest. In this work, it is shown how a Hazard Scenario can be identified in terms of (i) a specific geometry and (ii) a suitable probability level. Several scenarios, as well as a Structural approach, are presented, and due comparisons are carried out. In addition, it is shown how the Hazard Scenario approach illustrated here is well suited to cope with the notion of Failure Probability, a tool traditionally used for design and risk assessment in engineering practice. All the results outlined throughout the work are based on the Copula Theory, which turns out to be a fundamental theoretical apparatus for doing multivariate risk assessment: formulas for the calculation of the probability of Hazard Scenarios in the general multidimensional case (d≥2) are derived, and worthy analytical relationships among the probabilities of occurrence of Hazard Scenarios are presented. In addition, the Extreme Value and Archimedean special cases are dealt with, relationships between dependence ordering and scenario levels are studied, and a counter-example concerning Tail Dependence is shown. Suitable indications for the practical application of the techniques outlined in the work are given, and two case studies illustrate the procedures discussed in the paper.
NASA Technical Reports Server (NTRS)
Hambourger, Paul D.
1997-01-01
Useful and informative results were obtained on virtually all materials investigated. For example, the stability of ITO-based arc-proof transparent coatings was greatly improved by substitution of silicon oxide for magnesium fluoride as a dopant. Research on 'air-doped' ITO films has yielded new insight into their conduction mechanism which will help in further development of these coatings. Some air-doped films were found to be extremely pressure sensitive. This work may lead to improved, low-cost gas sensors and vacuum gauges. Work on another promising transparent arc-proof coating (titanium oxide) was initiated in collaboration with industry. Graphite oxide-like materials were synthesized and tested for possible use in high energy-density batteries and other applications. We also started a high-priority project to find the cause of unexpected environmental damage to the exterior of the Hubble Space Telescope (HST) discovered on a recent Shuttle mission. Materials were characterized before and after exposure to soft x-rays and other threats in ground-based simulators.
Hoss, Frauke; London, Alex John
2016-12-01
This paper presents a proof of concept for a graphical models approach to assessing the moral coherence and moral robustness of systems of social interactions. "Moral coherence" refers to the degree to which the rights and duties of agents within a system are effectively respected when agents in the system comply with the rights and duties that are recognized as in force for the relevant context of interaction. "Moral robustness" refers to the degree to which a system of social interaction is configured to ensure that the interests of agents are effectively respected even in the face of noncompliance. Using the case of conscientious objection of pharmacists to filling prescriptions for emergency contraception as an example, we illustrate how a graphical models approach can help stakeholders identify structural weaknesses in systems of social interaction and evaluate the relative merits of alternate organizational structures. By illustrating the merits of a graphical models approach we hope to spur further developments in this area.
Combinatorics of least-squares trees.
Mihaescu, Radu; Pachter, Lior
2008-09-09
A recurring theme in the least-squares approach to phylogenetics has been the discovery of elegant combinatorial formulas for the least-squares estimates of edge lengths. These formulas have proved useful for the development of efficient algorithms, and have also been important for understanding connections among popular phylogeny algorithms. For example, the selection criterion of the neighbor-joining algorithm is now understood in terms of the combinatorial formulas of Pauplin for estimating tree length. We highlight a phylogenetically desirable property that weighted least-squares methods should satisfy, and provide a complete characterization of methods that satisfy the property. The necessary and sufficient condition is a multiplicative four-point condition that the variance matrix needs to satisfy. The proof is based on the observation that the Lagrange multipliers in the proof of the Gauss-Markov theorem are tree-additive. Our results generalize and complete previous work on ordinary least squares, balanced minimum evolution, and the taxon-weighted variance model. They also provide a time-optimal algorithm for computation.
Second Order Boltzmann-Gibbs Principle for Polynomial Functions and Applications
NASA Astrophysics Data System (ADS)
Gonçalves, Patrícia; Jara, Milton; Simon, Marielle
2017-01-01
In this paper we give a new proof of the second order Boltzmann-Gibbs principle introduced in Gonçalves and Jara (Arch Ration Mech Anal 212(2):597-644, 2014). The proof does not impose the knowledge on the spectral gap inequality for the underlying model and it relies on a proper decomposition of the antisymmetric part of the current of the system in terms of polynomial functions. In addition, we fully derive the convergence of the equilibrium fluctuations towards (1) a trivial process in case of super-diffusive systems, (2) an Ornstein-Uhlenbeck process or the unique energy solution of the stochastic Burgers equation, as defined in Gubinelli and Jara (SPDEs Anal Comput (1):325-350, 2013) and Gubinelli and Perkowski (Arxiv:1508.07764, 2015), in case of weakly asymmetric diffusive systems. Examples and applications are presented for weakly and partial asymmetric exclusion processes, weakly asymmetric speed change exclusion processes and hamiltonian systems with exponential interactions.
Think You Can Shrink? A Proof-of-Concept Study for Men's Health Education Through Edutainment.
Ungar, Thomas; Norman, Cameron D; Knaak, Stephanie
2017-01-01
Connecting people to useful, actionable health resources is a substantive challenge that sits at the heart of health communication. Digital media provides means of producing, distributing and revising content and creates possibilities for new and multiple channels for reaching and engaging audiences, particularly when combined with social media. While there is much promise of digital media forms to deliver audiences and promote engagement, the health communication landscape is still largely hit-and-miss with few 'best practice' examples to follow. Proof-of-concept studies allow for a structured, focused exploration of ways to leverage the potential of digital media and learn what approaches have the promise to invest resources in amid a sea of possible options. Think You Can Shrink? (TYCS) is a multi-episode web series modelled on a reality TV show format. The show's key objective is to educate men and demonstrate, through modelling, ways men can support other men to encourage help-seeking behaviours and greater health communication, which in turn, may also lead to better health outcomes. Given the newness of the approach, the project was launched as a proof-of-concept study to explore: (a) whether this approach could engage the interest of men, (b) what initial impact this approach might induce and (c) the kind of audiences this approach might most appeal to.
Revisiting the Darmois and Lichnerowicz junction conditions
NASA Astrophysics Data System (ADS)
Lake, Kayll
2017-10-01
What have become known as the "Darmois" and "Lichnerowicz" junction conditions are often stated to be equivalent, "essentially" equivalent, in a "sense" equivalent, and so on. One even sees not infrequent reference to the "Darmois-Lichnerowicz" conditions. Whereas the equivalence of these conditions is manifest in Gaussian-normal coordinates, a fact that has been known for close to a century, this equivalence does not extend to a loose definition of "admissible" coordinates (coordinates in which the metric and its first order derivatives are continuous). We show this here by way of a simple, but physically relevant, example. In general, a loose definition of the "Lichnerowicz" conditions gives additional restrictions, some of which simply amount to a convenient choice of gauge, and some of which amount to real physical restrictions, away from strict "admissible" coordinates. The situation was totally confused by a very influential, and now frequently misquoted, paper by Bonnor and Vickers, that erroneously claimed a proof of the equivalence of the "Darmois" and "Lichnerowicz" conditions within this loose definition of "admissible" coordinates. A correct proof, based on a strict definition of "admissible" coordinates, was given years previous by Israel. It is that proof, generally unrecognized, that we must refer to. Attention here is given to a clarification of the subject, and to the history of the subject, which, it turns out, is rather fascinating in itself.
On the classification of elliptic foliations induced by real quadratic fields with center
NASA Astrophysics Data System (ADS)
Puchuri, Liliana; Bueno, Orestes
2016-12-01
Related to the study of Hilbert's infinitesimal problem, is the problem of determining the existence and estimating the number of limit cycles of the linear perturbation of Hamiltonian fields. A classification of the elliptic foliations in the projective plane induced by the fields obtained by quadratic fields with center was already studied by several authors. In this work, we devise a unified proof of the classification of elliptic foliations induced by quadratic fields with center. This technique involves using a formula due to Cerveau & Lins Neto to calculate the genus of the generic fiber of a first integral of foliations of these kinds. Furthermore, we show that these foliations induce several examples of linear families of foliations which are not bimeromorphically equivalent to certain remarkable examples given by Lins Neto.
Liang, Chunsu; Sun, Hui; Meng, Xiangjun; Yin, Lei; Fawcett, J Paul; Yu, Huaidong; Liu, Ting; Gu, Jingkai
2018-03-01
Because many therapeutic agents are contaminated by epimeric impurities or form epimers as a result of metabolism, analytical tools capable of determining epimers are increasingly in demand. This article is a proof-of-principle report of a novel DMS-MS/MS method to separate and simultaneously quantify epimers, taking PGF2 α and its 8-epimer, 8- iso -PGF2 α , as an example. Good accuracy and precision were achieved in the range of 10-500 ng/mL with a run time of only 1.5 min. Isopropanol as organic modifier facilitated a good combination of sensitivity and separation. The method is the first example of the quantitation of epimers without chromatographic separation.
Why Summary Comorbidity Measures Such As the Charlson Comorbidity Index and Elixhauser Score Work.
Austin, Steven R; Wong, Yu-Ning; Uzzo, Robert G; Beck, J Robert; Egleston, Brian L
2015-09-01
Comorbidity adjustment is an important component of health services research and clinical prognosis. When adjusting for comorbidities in statistical models, researchers can include comorbidities individually or through the use of summary measures such as the Charlson Comorbidity Index or Elixhauser score. We examined the conditions under which individual versus summary measures are most appropriate. We provide an analytic proof of the utility of comorbidity summary measures when used in place of individual comorbidities. We compared the use of the Charlson and Elixhauser scores versus individual comorbidities in prognostic models using a SEER-Medicare data example. We examined the ability of summary comorbidity measures to adjust for confounding using simulations. We devised a mathematical proof that found that the comorbidity summary measures are appropriate prognostic or adjustment mechanisms in survival analyses. Once one knows the comorbidity score, no other information about the comorbidity variables used to create the score is generally needed. Our data example and simulations largely confirmed this finding. Summary comorbidity measures, such as the Charlson Comorbidity Index and Elixhauser scores, are commonly used for clinical prognosis and comorbidity adjustment. We have provided a theoretical justification that validates the use of such scores under many conditions. Our simulations generally confirm the utility of the summary comorbidity measures as substitutes for use of the individual comorbidity variables in health services research. One caveat is that a summary measure may only be as good as the variables used to create it.
[Infections after bite wounds : For example rat bite fever due to Streptobacillus moniliformis].
Hof, Herbert; Binder, Rudolf; Schäfer, Christian; Stuber, Madeleine; Licht, Andreas; Bozenhardt-Stavrakidis, Iris; Bode, Konrad
2018-04-11
Rat bite fever due to Streptobacillus moniliformis induces typical but not pathognomonic clinical signs, such as local purulent wound infection followed by maculopapular exanthema, myalgia as well as purulent joint infections. Severe complications, such as osteomyelitis and endocarditis are possible. it seems that this infection is rarely diagnosed but this infection could be much more common because the final diagnostic proof is difficult to achieve. Firstly, the culture of these bacteria is critical because the bacteria are fastidious and secondly the exact differentiation of the isolates is hardly possible by standard laboratory methods. Modern techniques such as mass spectroscopy (MALDI-TOF) and molecular biology allow a precise clarification. Surgical cleansing of infection sites in combination with a rational antibiotic therapy, for example with beta-lactam antibiotics, are generally able to cure the infection if treatment is started early enough. In addition, vaccinations, for example against tetanus and rabies have to be considered in this situation as for all other bite wound infections.
Knowledge and Belief in Placebo Effect.
Chiffi, Daniele; Zanotti, Renzo
2017-02-01
The beliefs involved in the placebo effect are often assumed to be self-fulfilling, that is, the truth of these beliefs would merely require the patient to hold them. Such a view is commonly shared in epistemology. Many epistemologists focused, in fact, on the self-fulfilling nature of these beliefs, which have been investigated because they raise some important counterexamples to Nozick's "tracking theory of knowledge." We challenge the self-fulfilling nature of placebo-based beliefs in multi-agent contexts, analyzing their deep epistemological nature and the role of higher-order beliefs involved in the placebo effect. © The Author 2016. Published by Oxford University Press, on behalf of The Journal of Medicine and Philosophy Inc. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.
Kurtosis as Peakedness, 1905 – 2014. R.I.P.
WESTFALL, Peter H.
2014-01-01
Summary The incorrect notion that kurtosis somehow measures “peakedness” (flatness, pointiness or modality) of a distribution is remarkably persistent, despite attempts by statisticians to set the record straight. This article puts the notion to rest once and for all. Kurtosis tells you virtually nothing about the shape of the peak - its only unambiguous interpretation is in terms of tail extremity; i.e., either existing outliers (for the sample kurtosis) or propensity to produce outliers (for the kurtosis of a probability distribution). To clarify this point, relevant literature is reviewed, counterexample distributions are given, and it is shown that the proportion of the kurtosis that is determined by the central μ ± σ range is usually quite small. PMID:25678714
Negativity and strong monogamy of multiparty quantum entanglement beyond qubits
NASA Astrophysics Data System (ADS)
Choi, Jin Hyuk; Kim, Jeong San
2015-10-01
We propose the square of convex-roof extended negativity (SCREN) as a powerful candidate to characterize strong monogamy of multiparty quantum entanglement. We first provide a strong monogamy inequality of multiparty entanglement using SCREN and show that the tangle-based multiqubit strong-monogamy inequality can be rephrased by SCREN. We further show that the SCREN strong-monogamy inequality is still true for the counterexamples that violate tangle-based the strong-monogamy inequality in higher-dimensional quantum systems other than qubits. We also analytically show that SCREN strong-monogamy inequality is true for a large class of multiqudit states, a superposition of multiqudit generalized W -class states and vacuums. Thus SCREN is a good alternative to characterize the strong monogamy of entanglement even in multiqudit systems.
DeVincenzo, John P
2009-10-01
A revolution in the understanding of RNA biological processing and control is leading to revolutionary new concepts in human therapeutics. It has become increasingly clear that the so called "non-coding RNA" exerts specific and profound functional control on regulation of protein production and indeed controls the expression of all genes. Harnessing this naturally-occurring RNA-mediated regulation of protein production has immense human therapeutic potential. These processes are collectively known as RNA interference (RNAi). RNAi is a recently discovered, naturally-occurring intracellular process that regulates gene expression through the silencing of specific mRNAs. Methods of harnessing this natural pathway are being developed that allow the catalytic degradation of targeted mRNAs using specifically designed complementary small inhibitory RNAs (siRNA). siRNAs are being chemically modified to acquire drug-like properties. Numerous recent high profile publications have provided proofs of concept that RNA interference may be useful therapeutically. Much of the design of these siRNAs can be accomplished bioinformatically, thus potentially expediting drug discovery and opening new avenues of therapy for many uncommon, orphan, or emerging diseases. This makes this approach very attractive for developing therapies targeting orphan diseases including neonatal diseases. Theoretically, any disease that can be ameliorated through knockdown of any endogenous or exogenous protein is a potential therapeutic target for RNAi-based therapeutics. Lung diseases are particularly attractive targets for RNAi therapeutics since the affected cells' location increases their accessibility to topical administration of siRNA, for example by aerosol. Respiratory viral infections and chronic lung disease are examples of such diseases. RNAi therapeutics have been shown to be active against RSV, parainfluenza and human metapneumoviruses in vitro and in vivo resulting in profound antiviral effects. The first proof of concept test of efficacy of an RNAi-based therapeutic in man has been initiated. A discussion of the science behind RNA interference is followed by a presentation of the potential practical issues in applying this technology to neonatal respiratory viral diseases. RNAi may offer new strategies for the treatment of a variety of orphan diseases including neonatal diseases, RSV infections, and other respiratory viruses.
A building block for hardware belief networks.
Behin-Aein, Behtash; Diep, Vinh; Datta, Supriyo
2016-07-21
Belief networks represent a powerful approach to problems involving probabilistic inference, but much of the work in this area is software based utilizing standard deterministic hardware based on the transistor which provides the gain and directionality needed to interconnect billions of them into useful networks. This paper proposes a transistor like device that could provide an analogous building block for probabilistic networks. We present two proof-of-concept examples of belief networks, one reciprocal and one non-reciprocal, implemented using the proposed device which is simulated using experimentally benchmarked models.
NASA Astrophysics Data System (ADS)
Kapranov, B. I.; Mashanov, A. P.
2017-04-01
This paper presents the results of research and describes the apparatus for measuring the acoustic characteristics of bulk materials. Ultrasound, it has passed through a layer of bulk material, is further passes through an air gap. The presence of air gap prevents from measuring tract mechanical contacts, but complicates the measurement technology Studies were conducted on the example of measuring the acoustic characteristics of the widely used perlite-based sound-proofing material.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Klimsiak, Tomasz, E-mail: tomas@mat.umk.pl; Rozkosz, Andrzej, E-mail: rozkosz@mat.umk.pl
In the paper we consider the problem of valuation of American options written on dividend-paying assets whose price dynamics follow the classical multidimensional Black and Scholes model. We provide a general early exercise premium representation formula for options with payoff functions which are convex or satisfy mild regularity assumptions. Examples include index options, spread options, call on max options, put on min options, multiply strike options and power-product options. In the proof of the formula we exploit close connections between the optimal stopping problems associated with valuation of American options, obstacle problems and reflected backward stochastic differential equations.
Automated Verification of Specifications with Typestates and Access Permissions
NASA Technical Reports Server (NTRS)
Siminiceanu, Radu I.; Catano, Nestor
2011-01-01
We propose an approach to formally verify Plural specifications based on access permissions and typestates, by model-checking automatically generated abstract state-machines. Our exhaustive approach captures all the possible behaviors of abstract concurrent programs implementing the specification. We describe the formal methodology employed by our technique and provide an example as proof of concept for the state-machine construction rules. The implementation of a fully automated algorithm to generate and verify models, currently underway, provides model checking support for the Plural tool, which currently supports only program verification via data flow analysis (DFA).
Using adversary text to detect adversary phase changes.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Speed, Ann Elizabeth; Doser, Adele Beatrice; Warrender, Christina E.
2009-05-01
The purpose of this work was to help develop a research roadmap and small proof ofconcept for addressing key problems and gaps from the perspective of using text analysis methods as a primary tool for detecting when a group is undergoing a phase change. Self- rganizing map (SOM) techniques were used to analyze text data obtained from the tworld-wide web. Statistical studies indicate that it may be possible to predict phase changes, as well as detect whether or not an example of writing can be attributed to a group of interest.
Invariance of Conjunctions of Polynomial Equalities for Algebraic Differential Equations
2014-07-01
treatment of the general case as a future work. 3 Here ` is used, as in sequent calculus , to assert that whenever the constraint H (antecedent) is satisfied...clause and the rule becomes (Inv) F → C C → [ẋ = p &H ]C F → [ẋ = p &H ]C . In the following sections, we will be working in a proof calculus , rather...examples we used in our benchmarks originate from a num- ber of sources - many of them come from textbooks on Dynamical Systems; others have been hand
Managing search complexity in linguistic geometry.
Stilman, B
1997-01-01
This paper is a new step in the development of linguistic geometry. This formal theory is intended to discover and generalize the inner properties of human expert heuristics, which have been successful in a certain class of complex control systems, and apply them to different systems. In this paper, we investigate heuristics extracted in the form of hierarchical networks of planning paths of autonomous agents. Employing linguistic geometry tools the dynamic hierarchy of networks is represented as a hierarchy of formal attribute languages. The main ideas of this methodology are shown in the paper on two pilot examples of the solution of complex optimization problems. The first example is a problem of strategic planning for the air combat, in which concurrent actions of four vehicles are simulated as serial interleaving moves. The second example is a problem of strategic planning for the space comb of eight autonomous vehicles (with interleaving moves) that requires generation of the search tree of the depth 25 with the branching factor 30. This is beyond the capabilities of modern and conceivable future computers (employing conventional approaches). In both examples the linguistic geometry tools showed deep and highly selective searches in comparison with conventional search algorithms. For the first example a sketch of the proof of optimality of the solution is considered.
Knowledge-Directed Theory Revision
NASA Astrophysics Data System (ADS)
Ali, Kamal; Leung, Kevin; Konik, Tolga; Choi, Dongkyu; Shapiro, Dan
Using domain knowledge to speed up learning is widely accepted but theory revision of such knowledge continues to use general syntactic operators. Using such operators for theory revision of teleoreactive logic programs is especially expensive in which proof of a top-level goal involves playing a game. In such contexts, one should have the option to complement general theory revision with domain-specific knowledge. Using American football as an example, we use Icarus' multi-agent teleoreactive logic programming ability to encode a coach agent whose concepts correspond to faults recognized in execution of the play and whose skills correspond to making repairs in the goals of the player agents. Our results show effective learning using as few as twenty examples. We also show that structural changes made by such revision can produce performance gains that cannot be matched by doing only numeric optimization.
[Unusual, supernatural presentations of birth in mythology and legends].
Kirchhoff, H
1991-04-01
Although a multitude of differently motivated explanations have been brought forth in connection with legendary and pictorial representations of unusual--mostly extragenital-birth, an attempt is made to demonstrate certain common features by means of numerous examples. A hero or a god was not supposed to be born naturally ("naturally" being synonymous with "unclean", "contaminated"); his birth had to take place in an extravagant manner and was thus an attribute of immortality. Proof of this, for example, is the creation of Adam and Eve in Genesis. Special attention is given to the biphasic character of creation of life: 1. the lifeless figure, and 2. the act of animation, of coming to life. A large variety of comparisons from legends, myths and tales are exemplified by means of illustrations, such as e.g. the birth of the Buddha, Mithras, Athena, Dionysos, Adonis etc.
A proof of concept phase II non-inferiority criterion.
Neuenschwander, Beat; Rouyrre, Nicolas; Hollaender, Norbert; Zuber, Emmanuel; Branson, Michael
2011-06-15
Traditional phase III non-inferiority trials require compelling evidence that the treatment vs control effect bfθ is better than a pre-specified non-inferiority margin θ(NI) . The standard approach compares this margin to the 95 per cent confidence interval of the effect parameter. In the phase II setting, in order to declare Proof of Concept (PoC) for non-inferiority and proceed in the development of the drug, different criteria that are specifically tailored toward company internal decision making may be more appropriate. For example, less evidence may be needed as long as the effect estimate is reasonably convincing. We propose a non-inferiority design that addresses the specifics of the phase II setting. The requirements are that (1) the effect estimate be better than a critical threshold θ(C), and (2) the type I error with regard to θ(NI) is controlled at a pre-specified level. This design is compared with the traditional design from a frequentist as well as a Bayesian perspective, where the latter relies on the Level of Proof (LoP) metric, i.e. the probability that the true effect is better than effect values of interest. Clinical input is required to establish the value θ(C), which makes the design transparent and improves interactions within clinical teams. The proposed design is illustrated for a non-inferiority trial for a time-to-event endpoint in oncology. Copyright © 2011 John Wiley & Sons, Ltd.
Any Ontological Model of the Single Qubit Stabilizer Formalism must be Contextual
NASA Astrophysics Data System (ADS)
Lillystone, Piers; Wallman, Joel J.
Quantum computers allow us to easily solve some problems classical computers find hard. Non-classical improvements in computational power should be due to some non-classical property of quantum theory. Contextuality, a more general notion of non-locality, is a necessary, but not sufficient, resource for quantum speed-up. Proofs of contextuality can be constructed for the classically simulable stabilizer formalism. Previous proofs of stabilizer contextuality are known for 2 or more qubits, for example the Mermin-Peres magic square. In the work presented we extend these results and prove that any ontological model of the single qubit stabilizer theory must be contextual, as defined by R. Spekkens, and give a relation between our result and the Mermin-Peres square. By demonstrating that contextuality is present in the qubit stabilizer formalism we provide further insight into the contextuality present in quantum theory. Understanding the contextuality of classical sub-theories will allow us to better identify the physical properties of quantum theory required for computational speed up. This research was supported by CIFAR, the Government of Ontario, and the Government of Canada through NSERC and Industry Canada.
A Dissipative Systems Theory for FDTD With Application to Stability Analysis and Subgridding
NASA Astrophysics Data System (ADS)
Bekmambetova, Fadime; Zhang, Xinyue; Triverio, Piero
2017-02-01
This paper establishes a far-reaching connection between the Finite-Difference Time-Domain method (FDTD) and the theory of dissipative systems. The FDTD equations for a rectangular region are written as a dynamical system having the magnetic and electric fields on the boundary as inputs and outputs. Suitable expressions for the energy stored in the region and the energy absorbed from the boundaries are introduced, and used to show that the FDTD system is dissipative under a generalized Courant-Friedrichs-Lewy condition. Based on the concept of dissipation, a powerful theoretical framework to investigate the stability of FDTD methods is devised. The new method makes FDTD stability proofs simpler, more intuitive, and modular. Stability conditions can indeed be given on the individual components (e.g. boundary conditions, meshes, embedded models) instead of the whole coupled setup. As an example of application, we derive a new subgridding method with material traverse, arbitrary grid refinement, and guaranteed stability. The method is easy to implement and has a straightforward stability proof. Numerical results confirm its stability, low reflections, and ability to handle material traverse.
Higher dimensional Taub-NUT spaces and applications
NASA Astrophysics Data System (ADS)
Stelea, Cristian Ionut
In the first part of this thesis we discuss classes of new exact NUT-charged solutions in four dimensions and higher, while in the remainder of the thesis we make a study of their properties and their possible applications. Specifically, in four dimensions we construct new families of axisymmetric vacuum solutions using a solution-generating technique based on the hidden SL(2,R) symmetry of the effective action. In particular, using the Schwarzschild solution as a seed we obtain the Zipoy-Voorhees generalisation of the Taub-NUT solution and of the Eguchi-Hanson soliton. Using the C-metric as a seed, we obtain and study the accelerating versions of all the above solutions. In higher dimensions we present new classes of NUT-charged spaces, generalising the previously known even-dimensional solutions to odd and even dimensions, as well as to spaces with multiple NUT-parameters. We also find the most general form of the odd-dimensional Eguchi-Hanson solitons. We use such solutions to investigate the thermodynamic properties of NUT-charged spaces in (A)dS backgrounds. These have been shown to yield counter-examples to some of the conjectures advanced in the still elusive dS/CFT paradigm (such as the maximal mass conjecture and Bousso's entropic N-bound). One important application of NUT-charged spaces is to construct higher dimensional generalisations of Kaluza-Klein magnetic monopoles, generalising the known 5-dimensional Kaluza-Klein soliton. Another interesting application involves a study of time-dependent higher-dimensional bubbles-of-nothing generated from NUT-charged solutions. We use them to test the AdS/CFT conjecture as well as to generate, by using stringy Hopf-dualities, new interesting time-dependent solutions in string theory. Finally, we construct and study new NUT-charged solutions in higher-dimensional Einstein-Maxwell theories, generalising the known Reissner-Nordstrom solutions.
Mental models and human reasoning
Johnson-Laird, Philip N.
2010-01-01
To be rational is to be able to reason. Thirty years ago psychologists believed that human reasoning depended on formal rules of inference akin to those of a logical calculus. This hypothesis ran into difficulties, which led to an alternative view: reasoning depends on envisaging the possibilities consistent with the starting point—a perception of the world, a set of assertions, a memory, or some mixture of them. We construct mental models of each distinct possibility and derive a conclusion from them. The theory predicts systematic errors in our reasoning, and the evidence corroborates this prediction. Yet, our ability to use counterexamples to refute invalid inferences provides a foundation for rationality. On this account, reasoning is a simulation of the world fleshed out with our knowledge, not a formal rearrangement of the logical skeletons of sentences. PMID:20956326
A Counterexample Concerning the External index
1988-08-01
et al. For a suitable sequence (rn) satisfying rn 4 w, rn/n 4 O , let rn r n Tn(j) -P( E Xni j i Xni > 0), j-1,2.... (5) i-i i1l where Xn,i is 1 if...Appromd for pubW 7~~ o . Dittrbutiona tln~mItd 10 9 N I. 20 1tIC 1 0 - a pi 00 I 11 3 0 06 -6 .. 02~ ’ x. a C-L d e a A 0i 0 - Ss 0 - 8 go ip9 d vi . -C...PERSONAL AUTHO..S) Smith, R.L. 13. TYPE OF REPORT 13b. TIME COVERED 14. DATE OF REPORT (Yr...WE.. Day) 15. PAGE COUNT r rint FROM 91/87_ TO 8L31/8
IMP Dehydrogenase: Structural Schizophrenia and an Unusual Base
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hedstrom,L.; Gan, L.
2006-01-01
Textbooks describe enzymes as relatively rigid templates for the transition state of a chemical reaction, and indeed an enzyme such as chymotrypsin, which catalyzes a relatively simple hydrolysis reaction, is reasonably well described by this model. Inosine monophosphate dehydrogenase (IMPDH) undergoes a remarkable array of conformational transitions in the course of a complicated catalytic cycle, offering a dramatic counterexample to this view. IMPDH displays several other unusual mechanistic features, including an Arg residue that may act as a general base catalyst and a dynamic monovalent cation site. Further, IMPDH appears to be involved in 'moon-lighting' functions that may require additionalmore » conformational states. How the balance between conformational states is maintained and how the various conformational states interconvert is only beginning to be understood.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sanchis-Ojeda, Roberto; Isaacson, Howard; Marcy, Geoffrey W.
We have detected the Rossiter–Mclaughlin effect during a transit of WASP-47b, the only known hot Jupiter with close planetary companions. By combining our spectroscopic observations with Kepler photometry, we show that the projected stellar obliquity is λ = 0° ± 24°. We can firmly exclude a retrograde orbit for WASP-47b, and rule out strongly misaligned prograde orbits. Low obliquities have also been found for most of the other compact multiplanet systems that have been investigated. The Kepler-56 system, with two close-in gas giants transiting their subgiant host star with an obliquity of at least 45{sup ◦}, remains the only clearmore » counterexample.« less
Comparison of ground motion from tremors and explosions in deep gold mines
McGarr, A.; Bicknell, J.; Churcher, J.; Spottiswoode, S.
1990-01-01
Seismic body waves, from tamped chemical explosions, two with yields of 50 and one of 150 kg, were compared with corresponding data from three mining-induced tremors with a view to testing methods of discriminating between the two types of events. It is concluded that for events of fixed low-frequency spectral asymptotes, the explosions typically have higher corner frequencies than tremors or earthquakes, although counterexamples certainly exist. Interestingly, the 150-kg explosion was identified as such on the basis of P and S wave polarities that are incompatible with the normally expected double-couple source model; instead these initial motions are consistent with an explosion in conjunction with normal faulting. The body wave spectra of this explosion and those of a nearby tremor, however, were indistinguishable. -from Authors
A parabolic analogue of the higher-order comparison theorem of De Silva and Savin
NASA Astrophysics Data System (ADS)
Banerjee, Agnid; Garofalo, Nicola
2016-01-01
We show that the quotient of two caloric functions which vanish on a portion of the lateral boundary of a H k + α domain is H k + α up to the boundary for k ≥ 2. In the case k = 1, we show that the quotient is in H 1 + α if the domain is assumed to be space-time C 1 , α regular. This can be thought of as a parabolic analogue of a recent important result in [8], and we closely follow the ideas in that paper. We also give counterexamples to the fact that analogous results are not true at points on the parabolic boundary which are not on the lateral boundary, i.e., points which are at the corner and base of the parabolic boundary.
Topics in elementary particle physics
NASA Astrophysics Data System (ADS)
Jin, Xiang
The author of this thesis discusses two topics in elementary particle physics:
Preservice Teacher Beliefs about Proofs.
ERIC Educational Resources Information Center
Mingus, Tabitha T. Y.; Grassl, Richard M.
1999-01-01
Describes the study of backgrounds, beliefs, and attitudes of teachers (n=51) about proofs. Explores four issues: (1) preservice teachers' experiences/exposure to proof; (2) their beliefs about what constitutes proof; (3) the role of proof in mathematics; and (4) their beliefs about when proof should be introduced in K-12 math classes. Discusses…
ERIC Educational Resources Information Center
Martinez, Mara V.; Castro Superfine, Alison
2012-01-01
In the United States, researchers argue that proof is largely concentrated in the domain of high school geometry, thus providing students a distorted image of what proof entails, which is at odds with the central role that proof plays in mathematics. Despite the centrality of proof, there is a lack of studies addressing how to integrate proof into…
Evaluation of the concept of pressure proof testing fuselage structures
NASA Technical Reports Server (NTRS)
Harris, Charles E.; Orringer, Oscar
1991-01-01
The FAA and NASA have recently completed independent technical evaluations of the concept of pressure proof testing the fuselage of commercial transport airplanes. The results of these evaluations are summarized. The objectives of the evaluations were to establish the potential benefit of the pressure proof test, to quantify the most desirable proof test pressure, and to quantify the required proof test interval. The focus of the evaluations was on multiple-site cracks extending from adjacent rivet holes of a typical fuselage longitudinal lap splice joint. The FAA and NASA do not support pressure proof testing the fuselage of aging commercial transport aircraft. The argument against proof testing is as follows: (1) a single proof test does not insure an indefinite life; therefore, the proof test must be repeated at regular intervals; (2) for a proof factor of 1.33, the required proof test interval must be below 300 flights to account for uncertainties in the evaluation; (3) conducting the proof test at a proof factor of 1.5 would considerably exceed the fuselage design limit load; therefore, it is not consistent with accepted safe practices; and (4) better safety can be assured by implementing enhanced nondestructive inspection requirements, and adequate reliability can be achieved by an inspection interval several times longer than the proof test interval.
3D exploitation of large urban photo archives
NASA Astrophysics Data System (ADS)
Cho, Peter; Snavely, Noah; Anderson, Ross
2010-04-01
Recent work in computer vision has demonstrated the potential to automatically recover camera and scene geometry from large collections of uncooperatively-collected photos. At the same time, aerial ladar and Geographic Information System (GIS) data are becoming more readily accessible. In this paper, we present a system for fusing these data sources in order to transfer 3D and GIS information into outdoor urban imagery. Applying this system to 1000+ pictures shot of the lower Manhattan skyline and the Statue of Liberty, we present two proof-of-concept examples of geometry-based photo enhancement which are difficult to perform via conventional image processing: feature annotation and image-based querying. In these examples, high-level knowledge projects from 3D world-space into georegistered 2D image planes and/or propagates between different photos. Such automatic capabilities lay the groundwork for future real-time labeling of imagery shot in complex city environments by mobile smart phones.
Successful commercialization of nanophotonic technology
NASA Astrophysics Data System (ADS)
Jaiswal, Supriya L.; Clarke, Roger B. M.; Hyde, Sam C. W.
2006-08-01
The exploitation of nanotechnology from proof of principle to realizable commercial applications encounters considerable challenges in regards to high volume, large scale, low cost manufacturability and social ethics. This has led to concerns over converting powerful intellectual property into realizable, industry attractive technologies. At The Technology Partnership we specifically address the issue of successful integration of nanophotonics into industry in markets such as biomedical, ophthalmic, energy, telecommunications, and packaging. In this paper we draw on a few examples where we have either developed industrial scale nanophotonic technology or engineering platforms which may be used to fortify nano/microphotonic technologies and enhance their commercial viability.
Dynamic stability analysis of fractional order leaky integrator echo state neural networks
NASA Astrophysics Data System (ADS)
Pahnehkolaei, Seyed Mehdi Abedi; Alfi, Alireza; Tenreiro Machado, J. A.
2017-06-01
The Leaky integrator echo state neural network (Leaky-ESN) is an improved model of the recurrent neural network (RNN) and adopts an interconnected recurrent grid of processing neurons. This paper presents a new proof for the convergence of a Lyapunov candidate function to zero when time tends to infinity by means of the Caputo fractional derivative with order lying in the range (0, 1). The stability of Fractional-Order Leaky-ESN (FO Leaky-ESN) is then analyzed, and the existence, uniqueness and stability of the equilibrium point are provided. A numerical example demonstrates the feasibility of the proposed method.
A Test Generation Framework for Distributed Fault-Tolerant Algorithms
NASA Technical Reports Server (NTRS)
Goodloe, Alwyn; Bushnell, David; Miner, Paul; Pasareanu, Corina S.
2009-01-01
Heavyweight formal methods such as theorem proving have been successfully applied to the analysis of safety critical fault-tolerant systems. Typically, the models and proofs performed during such analysis do not inform the testing process of actual implementations. We propose a framework for generating test vectors from specifications written in the Prototype Verification System (PVS). The methodology uses a translator to produce a Java prototype from a PVS specification. Symbolic (Java) PathFinder is then employed to generate a collection of test cases. A small example is employed to illustrate how the framework can be used in practice.
Exact solution of some linear matrix equations using algebraic methods
NASA Technical Reports Server (NTRS)
Djaferis, T. E.; Mitter, S. K.
1979-01-01
Algebraic methods are used to construct the exact solution P of the linear matrix equation PA + BP = - C, where A, B, and C are matrices with real entries. The emphasis of this equation is on the use of finite algebraic procedures which are easily implemented on a digital computer and which lead to an explicit solution to the problem. The paper is divided into six sections which include the proof of the basic lemma, the Liapunov equation, and the computer implementation for the rational, integer and modular algorithms. Two numerical examples are given and the entire calculation process is depicted.
Predictor-Based Model Reference Adaptive Control
NASA Technical Reports Server (NTRS)
Lavretsky, Eugene; Gadient, Ross; Gregory, Irene M.
2009-01-01
This paper is devoted to robust, Predictor-based Model Reference Adaptive Control (PMRAC) design. The proposed adaptive system is compared with the now-classical Model Reference Adaptive Control (MRAC) architecture. Simulation examples are presented. Numerical evidence indicates that the proposed PMRAC tracking architecture has better than MRAC transient characteristics. In this paper, we presented a state-predictor based direct adaptive tracking design methodology for multi-input dynamical systems, with partially known dynamics. Efficiency of the design was demonstrated using short period dynamics of an aircraft. Formal proof of the reported PMRAC benefits constitute future research and will be reported elsewhere.
Higher-order quantum entanglement
NASA Technical Reports Server (NTRS)
Zeilinger, Anton; Horne, Michael A.; Greenberger, Daniel M.
1992-01-01
In quantum mechanics, the general state describing two or more particles is a linear superposition of product states. Such a superposition is called entangled if it cannot be factored into just one product. When only two particles are entangled, the stage is set for Einstein-Podolsky-Rosen (EPR) discussions and Bell's proof that the EPR viewpoint contradicts quantum mechanics. If more than two particles are involved, new possibilities and phenomena arise. For example, the Greenberger, Horne, and Zeilinger (GHZ) disproof of EPR applies. Furthermore, as we point out, with three or more particles even entanglement itself can be an entangled property.
A survey of noninteractive zero knowledge proof system and its applications.
Wu, Huixin; Wang, Feng
2014-01-01
Zero knowledge proof system which has received extensive attention since it was proposed is an important branch of cryptography and computational complexity theory. Thereinto, noninteractive zero knowledge proof system contains only one message sent by the prover to the verifier. It is widely used in the construction of various types of cryptographic protocols and cryptographic algorithms because of its good privacy, authentication, and lower interactive complexity. This paper reviews and analyzes the basic principles of noninteractive zero knowledge proof system, and summarizes the research progress achieved by noninteractive zero knowledge proof system on the following aspects: the definition and related models of noninteractive zero knowledge proof system, noninteractive zero knowledge proof system of NP problems, noninteractive statistical and perfect zero knowledge, the connection between noninteractive zero knowledge proof system, interactive zero knowledge proof system, and zap, and the specific applications of noninteractive zero knowledge proof system. This paper also points out the future research directions.
Survey of meshless and generalized finite element methods: A unified approach
NASA Astrophysics Data System (ADS)
Babuška, Ivo; Banerjee, Uday; Osborn, John E.
In the past few years meshless methods for numerically solving partial differential equations have come into the focus of interest, especially in the engineering community. This class of methods was essentially stimulated by difficulties related to mesh generation. Mesh generation is delicate in many situations, for instance, when the domain has complicated geometry; when the mesh changes with time, as in crack propagation, and remeshing is required at each time step; when a Lagrangian formulation is employed, especially with nonlinear PDEs. In addition, the need for flexibility in the selection of approximating functions (e.g., the flexibility to use non-polynomial approximating functions), has played a significant role in the development of meshless methods. There are many recent papers, and two books, on meshless methods; most of them are of an engineering character, without any mathematical analysis.In this paper we address meshless methods and the closely related generalized finite element methods for solving linear elliptic equations, using variational principles. We give a unified mathematical theory with proofs, briefly address implementational aspects, present illustrative numerical examples, and provide a list of references to the current literature.The aim of the paper is to provide a survey of a part of this new field, with emphasis on mathematics. We present proofs of essential theorems because we feel these proofs are essential for the understanding of the mathematical aspects of meshless methods, which has approximation theory as a major ingredient. As always, any new field is stimulated by and related to older ideas. This will be visible in our paper.
Risk analysis under uncertainty, the precautionary principle, and the new EU chemicals strategy.
Rogers, Michael D
2003-06-01
Three categories of uncertainty in relation to risk assessment are defined; uncertainty in effect, uncertainty in cause, and uncertainty in the relationship between a hypothesised cause and effect. The Precautionary Principle (PP) relates to the third type of uncertainty. Three broad descriptions of the PP are set out, uncertainty justifies action, uncertainty requires action, and uncertainty requires a reversal of the burden of proof for risk assessments. The application of the PP is controversial but what matters in practise is the precautionary action (PA) that follows. The criteria by which the PAs should be judged are detailed. This framework for risk assessment and management under uncertainty is then applied to the envisaged European system for the regulation of chemicals. A new EU regulatory system has been proposed which shifts the burden of proof concerning risk assessments from the regulator to the producer, and embodies the PP in all three of its main regulatory stages. The proposals are critically discussed in relation to three chemicals, namely, atrazine (an endocrine disrupter), cadmium (toxic and possibly carcinogenic), and hydrogen fluoride (a toxic, high-production-volume chemical). Reversing the burden of proof will speed up the regulatory process but the examples demonstrate that applying the PP appropriately, and balancing the countervailing risks and the socio-economic benefits, will continue to be a difficult task for the regulator. The paper concludes with a discussion of the role of precaution in the management of change and of the importance of trust in the effective regulation of uncertain risks.
Batch Proving and Proof Scripting in PVS
NASA Technical Reports Server (NTRS)
Munoz, Cesar A.
2007-01-01
The batch execution modes of PVS are powerful, but highly technical, features of the system that are mostly accessible to expert users. This paper presents a PVS tool, called ProofLite, that extends the theorem prover interface with a batch proving utility and a proof scripting notation. ProofLite enables a semi-literate proving style where specification and proof scripts reside in the same file. The goal of ProofLite is to provide batch proving and proof scripting capabilities to regular, non-expert, users of PVS.
A Novel Multilayered RFID Tagged Cargo Integrity Assurance Scheme
Yang, Ming Hour; Luo, Jia Ning; Lu, Shao Yong
2015-01-01
To minimize cargo theft during transport, mobile radio frequency identification (RFID) grouping proof methods are generally employed to ensure the integrity of entire cargo loads. However, conventional grouping proofs cannot simultaneously generate grouping proofs for a specific group of RFID tags. The most serious problem of these methods is that nonexistent tags are included in the grouping proofs because of the considerable amount of time it takes to scan a high number of tags. Thus, applying grouping proof methods in the current logistics industry is difficult. To solve this problem, this paper proposes a method for generating multilayered offline grouping proofs. The proposed method provides tag anonymity; moreover, resolving disputes between recipients and transporters over the integrity of cargo deliveries can be expedited by generating grouping proofs and automatically authenticating the consistency between the receipt proof and pick proof. The proposed method can also protect against replay attacks, multi-session attacks, and concurrency attacks. Finally, experimental results verify that, compared with other methods for generating grouping proofs, the proposed method can efficiently generate offline grouping proofs involving several parties in a supply chain using mobile RFID. PMID:26512673
Significant issues in proof testing: A critical appraisal
NASA Technical Reports Server (NTRS)
Chell, G. G.; Mcclung, R. C.; Russell, D. A.; Chang, K. J.; Donnelly, B.
1994-01-01
Issues which impact on the interpretation and quantification of proof test benefits are reviewed. The importance of each issue in contributing to the extra quality assurance conferred by proof testing components is discussed, particularly with respect to the application of advanced fracture mechanics concepts to enhance the flaw screening capability of a proof test analysis. Items covered include the role in proof testing of elastic-plastic fracture mechanics, ductile instability analysis, deterministic versus probabilistic analysis, single versus multiple cycle proof testing, and non-destructive examination (NDE). The effects of proof testing on subsequent service life are reviewed, particularly with regard to stress redistribution and changes in fracture behavior resulting from the overload. The importance of proof test conditions are also addressed, covering aspects related to test temperature, simulation of service environments, test media and the application of real-time NDE. The role of each issue in a proof test methodology is assessed with respect to its ability to: promote proof test practice to a state-of-the-art; aid optimization of proof test design; and increase awareness and understanding of outstanding issues.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Krnjaic, Gordan
In this letter, we quantify the challenge of explaining the baryon asymmetry using initial conditions in a universe that undergoes inflation. Contrary to lore, we find that such an explanation is possible if netmore » $B-L$ number is stored in a light bosonic field with hyper-Planckian initial displacement and a delicately chosen field velocity prior to inflation. However, such a construction may require extremely tuned coupling constants to ensure that this asymmetry is viably communicated to the Standard Model after reheating; the large field displacement required to overcome inflationary dilution must not induce masses for Standard Model particles or generate dangerous washout processes. While these features are inelegant, this counterexample nonetheless shows that there is no theorem against such an explanation. We also comment on potential observables in the double $$\\beta$$-decay spectrum and on model variations that may allow for more natural realizations.« less
Scan Order in Gibbs Sampling: Models in Which it Matters and Bounds on How Much.
He, Bryan; De Sa, Christopher; Mitliagkas, Ioannis; Ré, Christopher
2016-01-01
Gibbs sampling is a Markov Chain Monte Carlo sampling technique that iteratively samples variables from their conditional distributions. There are two common scan orders for the variables: random scan and systematic scan. Due to the benefits of locality in hardware, systematic scan is commonly used, even though most statistical guarantees are only for random scan. While it has been conjectured that the mixing times of random scan and systematic scan do not differ by more than a logarithmic factor, we show by counterexample that this is not the case, and we prove that that the mixing times do not differ by more than a polynomial factor under mild conditions. To prove these relative bounds, we introduce a method of augmenting the state space to study systematic scan using conductance.
Scan Order in Gibbs Sampling: Models in Which it Matters and Bounds on How Much
He, Bryan; De Sa, Christopher; Mitliagkas, Ioannis; Ré, Christopher
2016-01-01
Gibbs sampling is a Markov Chain Monte Carlo sampling technique that iteratively samples variables from their conditional distributions. There are two common scan orders for the variables: random scan and systematic scan. Due to the benefits of locality in hardware, systematic scan is commonly used, even though most statistical guarantees are only for random scan. While it has been conjectured that the mixing times of random scan and systematic scan do not differ by more than a logarithmic factor, we show by counterexample that this is not the case, and we prove that that the mixing times do not differ by more than a polynomial factor under mild conditions. To prove these relative bounds, we introduce a method of augmenting the state space to study systematic scan using conductance. PMID:28344429
Reply to Marquis: how things stand with the 'future like ours' argument.
Strong, Carson
2012-09-01
In an earlier essay in this journal I critiqued Don Marquis's well-known argument against abortion. I distinguished two versions of Marquis's argument, which I refer to as 'the essence argument' and 'the sufficient condition argument'. I presented two counterexamples showing that the essence argument was mistaken, and I argued that the sufficient condition argument should be rejected because Marquis had not adequately responded to an important objection to it. In response to my critique, Marquis put forward in this journal a revised version of his argument. In his modified approach he no longer advocates the essence argument and he offers a new version of the sufficient condition argument. In the current essay, I discuss how Marquis's revised argument deals with my original objections, and I argue that his new sufficient condition argument is unsuccessful.
Hierarchy of Certain Types of DNA Splicing Systems
NASA Astrophysics Data System (ADS)
Yusof, Yuhani; Sarmin, Nor Haniza; Goode, T. Elizabeth; Mahmud, Mazri; Heng, Fong Wan
A Head splicing system (H-system)consists of a finite set of strings (words) written over a finite alphabet, along with a finite set of rules that acts on the strings by iterated cutting and pasting to create a splicing language. Any interpretation that is aligned with Tom Head's original idea is one in which the strings represent double-stranded deoxyribonucleic acid (dsDNA) and the rules represent the cutting and pasting action of restriction enzymes and ligase, respectively. A new way of writing the rule sets is adopted so as to make the biological interpretation transparent. This approach is used in a formal language- theoretic analysis of the hierarchy of certain classes of splicing systems, namely simple, semi-simple and semi-null splicing systems. The relations between such systems and their associated languages are given as theorems, corollaries and counterexamples.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Galeta, Leonardo; Pirjol, Dan; Schat, Carlos
2009-12-01
We show how to match the Isgur-Karl model to the spin-flavor quark operator expansion used in the 1/N{sub c} studies of the nonstrange negative parity L=1 excited baryons. Using the transformation properties of states and interactions under the permutation group S{sub 3} we are able to express the operator coefficients as overlap integrals, without making any assumption on the spatial dependence of the quark wave functions. The general mass operator leads to parameter free mass relations and constraints on the mixing angles that are valid beyond the usual harmonic oscillator approximation. The Isgur-Karl model with harmonic oscillator wave functions providesmore » a simple counterexample that demonstrates explicitly that the alternative operator basis for the 1/N{sub c} expansion for excited baryons recently proposed by Matagne and Stancu is incomplete.« less
Structure theorems for game trees
Govindan, Srihari; Wilson, Robert
2002-01-01
Kohlberg and Mertens [Kohlberg, E. & Mertens, J. (1986) Econometrica 54, 1003–1039] proved that the graph of the Nash equilibrium correspondence is homeomorphic to its domain when the domain is the space of payoffs in normal-form games. A counterexample disproves the analog for the equilibrium outcome correspondence over the space of payoffs in extensive-form games, but we prove an analog when the space of behavior strategies is perturbed so that every path in the game tree has nonzero probability. Without such perturbations, the graph is the closure of the union of a finite collection of its subsets, each diffeomorphic to a corresponding path-connected open subset of the space of payoffs. As an application, we construct an algorithm for computing equilibria of an extensive-form game with a perturbed strategy space, and thus approximate equilibria of the unperturbed game. PMID:12060702
Structure theorems for game trees.
Govindan, Srihari; Wilson, Robert
2002-06-25
Kohlberg and Mertens [Kohlberg, E. & Mertens, J. (1986) Econometrica 54, 1003-1039] proved that the graph of the Nash equilibrium correspondence is homeomorphic to its domain when the domain is the space of payoffs in normal-form games. A counterexample disproves the analog for the equilibrium outcome correspondence over the space of payoffs in extensive-form games, but we prove an analog when the space of behavior strategies is perturbed so that every path in the game tree has nonzero probability. Without such perturbations, the graph is the closure of the union of a finite collection of its subsets, each diffeomorphic to a corresponding path-connected open subset of the space of payoffs. As an application, we construct an algorithm for computing equilibria of an extensive-form game with a perturbed strategy space, and thus approximate equilibria of the unperturbed game.
A Survey of Noninteractive Zero Knowledge Proof System and Its Applications
Wu, Huixin; Wang, Feng
2014-01-01
Zero knowledge proof system which has received extensive attention since it was proposed is an important branch of cryptography and computational complexity theory. Thereinto, noninteractive zero knowledge proof system contains only one message sent by the prover to the verifier. It is widely used in the construction of various types of cryptographic protocols and cryptographic algorithms because of its good privacy, authentication, and lower interactive complexity. This paper reviews and analyzes the basic principles of noninteractive zero knowledge proof system, and summarizes the research progress achieved by noninteractive zero knowledge proof system on the following aspects: the definition and related models of noninteractive zero knowledge proof system, noninteractive zero knowledge proof system of NP problems, noninteractive statistical and perfect zero knowledge, the connection between noninteractive zero knowledge proof system, interactive zero knowledge proof system, and zap, and the specific applications of noninteractive zero knowledge proof system. This paper also points out the future research directions. PMID:24883407
An Extended Proof-Carrying Code Framework for Security Enforcement
NASA Astrophysics Data System (ADS)
Pirzadeh, Heidar; Dubé, Danny; Hamou-Lhadj, Abdelwahab
The rapid growth of the Internet has resulted in increased attention to security to protect users from being victims of security threats. In this paper, we focus on security mechanisms that are based on Proof-Carrying Code (PCC) techniques. In a PCC system, a code producer sends a code along with its safety proof to the consumer. The consumer executes the code only if the proof is valid. Although PCC has been shown to be a useful security framework, it suffers from the sheer size of typical proofs -proofs of even small programs can be considerably large. In this paper, we propose an extended PCC framework (EPCC) in which, instead of the proof, a proof generator for the program in question is transmitted. This framework enables the execution of the proof generator and the recovery of the proof on the consumer's side in a secure manner using a newly created virtual machine called the VEP (Virtual Machine for Extended PCC).
Oriented Scintillation Spectrometer Experiment (OSSE). Revision A. Volume 1
1988-05-19
SYSTEM-LEVEL ENVIRONMENTAL TESTS ................... 108 3.5.1 OPERATION REPORT, PROOF MODEL STRUCTURE TESTS.. .108 3.5.1.1 PROOF MODEL MODAL SURVEY...81 3-21 ALIGNMENT ERROR BUDGET, FOV, A4 ................ 82 3-22 ALIGNMENT ERROR BUDGET, ROTATION AXIS, A4 ...... 83 3-23 OSSE PROOF MODEL MODAL SURVEY...PROOF MODEL MODAL SURVEY .................. 112 3-27-1 OSSE PROOF MODEL STATIC LOAD TEST ............. 116 3-27-2 OSSE PROOF MODEL STATIC LOAD TEST
Experimental design for dynamics identification of cellular processes.
Dinh, Vu; Rundell, Ann E; Buzzard, Gregery T
2014-03-01
We address the problem of using nonlinear models to design experiments to characterize the dynamics of cellular processes by using the approach of the Maximally Informative Next Experiment (MINE), which was introduced in W. Dong et al. (PLoS ONE 3(8):e3105, 2008) and independently in M.M. Donahue et al. (IET Syst. Biol. 4:249-262, 2010). In this approach, existing data is used to define a probability distribution on the parameters; the next measurement point is the one that yields the largest model output variance with this distribution. Building upon this approach, we introduce the Expected Dynamics Estimator (EDE), which is the expected value using this distribution of the output as a function of time. We prove the consistency of this estimator (uniform convergence to true dynamics) even when the chosen experiments cluster in a finite set of points. We extend this proof of consistency to various practical assumptions on noisy data and moderate levels of model mismatch. Through the derivation and proof, we develop a relaxed version of MINE that is more computationally tractable and robust than the original formulation. The results are illustrated with numerical examples on two nonlinear ordinary differential equation models of biomolecular and cellular processes.
Chen, Cong; Beckman, Robert A
2009-01-01
This manuscript discusses optimal cost-effective designs for Phase II proof of concept (PoC) trials. Unlike a confirmatory registration trial, a PoC trial is exploratory in nature, and sponsors of such trials have the liberty to choose the type I error rate and the power. The decision is largely driven by the perceived probability of having a truly active treatment per patient exposure (a surrogate measure to development cost), which is naturally captured in an efficiency score to be defined in this manuscript. Optimization of the score function leads to type I error rate and power (and therefore sample size) for the trial that is most cost-effective. This in turn leads to cost-effective go-no go criteria for development decisions. The idea is applied to derive optimal trial-level, program-level, and franchise-level design strategies. The study is not meant to provide any general conclusion because the settings used are largely simplified for illustrative purposes. However, through the examples provided herein, a reader should be able to gain useful insight into these design problems and apply them to the design of their own PoC trials.
Investigating the Teaching and Learning of Proof: First Year Results.
ERIC Educational Resources Information Center
Martin, Tami S.; McCrone, Sharon Soucy
Although proof and reasoning are seen as fundamental components of learning mathematics, research shows that many students continue to struggle with geometric proofs. In order to relate pedagogical methods to students' understanding of geometric proof, this 3-year project focuses on 2 components of student understanding of proof, namely, students'…
Multimedia Resources Designed to Support Learning from Written Proofs: An Eye-Movement Study
ERIC Educational Resources Information Center
Roy, Somali; Inglis, Matthew; Alcock, Lara
2017-01-01
This paper presents two studies of an intervention designed to help undergraduates comprehend mathematical proofs. The intervention used multimedia resources that presented proofs with audio commentary and visual animations designed to focus attention on logical relationships. In study 1, students studied an e-Proof or a standard written proof and…
On the Analysis of Indirect Proofs: Contradiction and Contraposition
ERIC Educational Resources Information Center
Jourdan, Nicolas; Yevdokimov, Oleksiy
2016-01-01
The paper explores and clarifies the similarities and differences that exist between proof by contradiction and proof by contraposition. The paper also focuses on the concept of contradiction, and a general model for this method of proof is offered. The introduction of mathematical proof in the classroom remains a formidable challenge to students…
Proof Problems with Diagrams: An Opportunity for Experiencing Proofs and Refutations
ERIC Educational Resources Information Center
Komatsu, Kotaro; Tsujiyama, Yosuke; Sakamaki, Aruta; Koike, Norio
2014-01-01
It has become gradually accepted that proof and proving are essential at all grades of mathematical learning. Among the various aspects of proof and proving, this study addresses proofs and refutations described by Lakatos, in particular a part of increasing content by deductive guessing, to introduce an authentic process into mathematics…
Tree-oriented interactive processing with an application to theorem-proving, appendix E
NASA Technical Reports Server (NTRS)
Hammerslag, David; Kamin, Samuel N.; Campbell, Roy H.
1985-01-01
The concept of unstructured structure editing and ted, an editor for unstructured trees, is described. Ted is used to manipulate hierarchies of information in an unrestricted manner. The tool was implemented and applied to the problem of organizing formal proofs. As a proof management tool, it maintains the validity of a proof and its constituent lemmas independently from the methods used to validate the proof. It includes an adaptable interface which may be used to invoke theorem provers and other aids to proof construction. Using ted, a user may construct, maintain, and verify formal proofs using a variety of theorem provers, proof checkers, and formatters.
ERIC Educational Resources Information Center
Moru, Eunice Kolitsoe; Nchejane, John; Ramollo, Motlatsi; Rammea, Lisema
2017-01-01
The reported study explored undergraduate science students' validation and comprehension of written proofs, reasons given either to accept or reject mathematical procedures employed in the proofs, and the difficulties students encountered in reading the proofs. The proofs were constructed using both the Comparison and the Integral tests in the…
A Physical Proof of the Pythagorean Theorem
ERIC Educational Resources Information Center
Treeby, David
2017-01-01
What proof of the Pythagorean theorem might appeal to a physics teacher? A proof that involved the notion of mass would surely be of interest. While various proofs of the Pythagorean theorem employ the circumcenter and incenter of a right-angled triangle, we are not aware of any proof that uses the triangle's center of mass. This note details one…
Examination of Secondary School Seventh Graders' Proof Skills and Proof Schemes
ERIC Educational Resources Information Center
Sen, Ceylan; Guler, Gursel
2015-01-01
The aim of this study is to examine current proof making skills of secondary school seventh graders using proof schemes. Data of the study were collected in two phases. Initially, Proof Schemes Test, which was developed by the researchers, was administrated to 250 seventh grade students from eight secondary schools, which were chosen randomly. The…
Proofs without Words: A Visual Application of Reasoning and Proof
ERIC Educational Resources Information Center
Bell, Carol J.
2011-01-01
Reasoning and Proof is one of the Process Standards set forth in National Council of Teachers of Mathematics' (NCTM) "Principles and Standards for School Mathematics." Thus, it is important to give students opportunities to build their reasoning skills and aid their understanding of the proof process. Teaching students how to do proofs is a…
Velocity feedback control with a flywheel proof mass actuator
NASA Astrophysics Data System (ADS)
Kras, Aleksander; Gardonio, Paolo
2017-08-01
This paper presents four new proof mass actuators to be used in velocity feedback control systems for the control of vibrations of machines and flexible structures. A classical proof mass actuator is formed by a coil-magnet linear motor, with either the magnet or the armature-coil proof mass suspended on soft springs. This arrangement produces a net force effect at frequencies above the fundamental resonance frequency of the springs-proof mass system. Thus, it can be used to implement point velocity feedback loops, although the dynamic response and static deflection of the springs-proof mass system poses some stability and control performance limitations. The four proof mass actuators presented in this study include a flywheel element, which is used to augment the inertia effect of the suspended proof mass. The paper shows that the flywheel element modifies both the dynamic response and static deflection of the springs-proof mass system in such a way as the stability and control performance of velocity feedback loops using these actuators are significantly improved.
Generic construction of efficient matrix product operators
NASA Astrophysics Data System (ADS)
Hubig, C.; McCulloch, I. P.; Schollwöck, U.
2017-01-01
Matrix product operators (MPOs) are at the heart of the second-generation density matrix renormalization group (DMRG) algorithm formulated in matrix product state language. We first summarize the widely known facts on MPO arithmetic and representations of single-site operators. Second, we introduce three compression methods (rescaled SVD, deparallelization, and delinearization) for MPOs and show that it is possible to construct efficient representations of arbitrary operators using MPO arithmetic and compression. As examples, we construct powers of a short-ranged spin-chain Hamiltonian, a complicated Hamiltonian of a two-dimensional system and, as proof of principle, the long-range four-body Hamiltonian from quantum chemistry.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ainsworth, Nathan; Johnson, Brian; Lundstrom, Blake
Home Energy Management Systems (HEMS) are controllers that manage and coordinate the generation, storage, and loads in a home. These controllers are increasingly necessary to ensure that increasing penetrations of distributed energy resources are used effectively and do not disrupt the operation of the grid. In this paper, we propose a novel approach to HEMS design based on behavioral control methods, which do not require accurate models or predictions and are very responsive to changing conditions. We develop a proof-of-concept behavioral HEMS controller and show by simulation on an example home energy system that it capable of making context-dependent tradeoffsmore » between goals under challenging conditions.« less
Alternative to Ritt's pseudodivision for finding the input-output equations of multi-output models.
Meshkat, Nicolette; Anderson, Chris; DiStefano, Joseph J
2012-09-01
Differential algebra approaches to structural identifiability analysis of a dynamic system model in many instances heavily depend upon Ritt's pseudodivision at an early step in analysis. The pseudodivision algorithm is used to find the characteristic set, of which a subset, the input-output equations, is used for identifiability analysis. A simpler algorithm is proposed for this step, using Gröbner Bases, along with a proof of the method that includes a reduced upper bound on derivative requirements. Efficacy of the new algorithm is illustrated with several biosystem model examples. Copyright © 2012 Elsevier Inc. All rights reserved.
Baturin, Stanislav; Zholents, A.
2017-06-19
Here, the interrelation between the accelerating gradient and the transformer ratio in the collinear wake field accelerator has been analyzed. It has been shown that the high transformer ratio and the high efficiency of the energy transfer from the drive bunch to the witness bunch can only be achieved at the expense of the accelerating gradient. Rigorous proof is given that in best cases of meticulously shaped charge density distributions in the drive bunch, the maximum accelerating gradient falls proportionally to the gain in the transformer ratio. Conclusions are verified using several representative examples.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Baturin, Stanislav; Zholents, A.
Here, the interrelation between the accelerating gradient and the transformer ratio in the collinear wake field accelerator has been analyzed. It has been shown that the high transformer ratio and the high efficiency of the energy transfer from the drive bunch to the witness bunch can only be achieved at the expense of the accelerating gradient. Rigorous proof is given that in best cases of meticulously shaped charge density distributions in the drive bunch, the maximum accelerating gradient falls proportionally to the gain in the transformer ratio. Conclusions are verified using several representative examples.
Safety management and risk assessment in chemical laboratories.
Marendaz, Jean-Luc; Friedrich, Kirstin; Meyer, Thierry
2011-01-01
The present paper highlights a new safety management program, MICE (Management, Information, Control and Emergency), which has been specifically adapted for the academic environment. The process starts with an exhaustive hazard inventory supported by a platform assembling specific hazards encountered in laboratories and their subsequent classification. A proof of concept is given by a series of implementations in the domain of chemistry targeting workplace health protection. The methodology is expressed through three examples to illustrate how the MICE program can be used to address safety concerns regarding chemicals, strong magnetic fields and nanoparticles in research laboratories. A comprehensive chemical management program is also depicted.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Pupyshev, V.I.; Scherbinin, A.V.; Stepanov, N.F.
1997-11-01
The approach based on the multiplicative form of a trial wave function within the framework of the variational method, initially proposed by Kirkwood and Buckingham, is shown to be an effective analytical tool in the quantum mechanical study of atoms and molecules. As an example, the elementary proof is given to the fact that the ground state energy of a molecular system placed into the box with walls of finite height goes to the corresponding eigenvalue of the Dirichlet boundary value problem when the height of the walls is growing up to infinity. {copyright} {ital 1997 American Institute of Physics.}
Toledo-Pereyra, Luis H
2008-01-01
I understand discovery as the essence of thinking man, or to paraphrase the notable French philosopher René Descartes, "I think, therefore I discover." In this study, I introduce discovery as the foundation of modern science. Discovery consists of six stages or elements, including: concept, belief, ability, support, proof, and protection. Each element is discussed within the context of the whole discovery enterprise. Fundamental tenets for understanding discovery are given throughout the paper, and a few examples illustrate the significance of some of the most important elements. I invite clinicians, researchers, and/or clinical researchers to integrate themselves into the active process of discovery. Remember--I think, therefore I discover.
Using the Wiimote as a sensor in water research
NASA Astrophysics Data System (ADS)
Hut, R. W.; Weijs, S. V.; Luxemburg, W. M. J.
2010-12-01
The $40 "Wiimote" (an input device belonging with the Nintendo® Wii™ game system) can be used by hydrologists as a sensor. The device contains three accelerometers and an infrared camera with built-in source tracking. It communicates by Bluetooth®. Because of the efforts of the hacking community it is now easy to let the Wiimote communicate with a standard personal computer. Using a floating evaporation pan as an example, we show that the Wiimote, although it may have potential drawbacks when used in field campaigns, is a good addition to the hydrologist's bag of tools, especially for proof of concept testing.
Affirmative action and the allocation of health care.
Francis, L P
1999-09-01
The justifications of affirmative action, the compensatory, corrective and redistributive, have been widely recognized in legal thinking. They have been applied, principally, to employment practices. They can also be applied to health care. Arguments for affirmative action in health care allocation shift the burden of proof to those who deny that racism is the root cause of differential morbidity and mortality experienced by, for example, African Americans. At the very least, these arguments mandate much needed research into the causes of minorities' poor health. Without such research, racism remains the presumptive cause of, and affirmative action the appropriate remedy for, the health care problems minorities face.
Passive quantum error correction of linear optics networks through error averaging
NASA Astrophysics Data System (ADS)
Marshman, Ryan J.; Lund, Austin P.; Rohde, Peter P.; Ralph, Timothy C.
2018-02-01
We propose and investigate a method of error detection and noise correction for bosonic linear networks using a method of unitary averaging. The proposed error averaging does not rely on ancillary photons or control and feedforward correction circuits, remaining entirely passive in its operation. We construct a general mathematical framework for this technique and then give a series of proof of principle examples including numerical analysis. Two methods for the construction of averaging are then compared to determine the most effective manner of implementation and probe the related error thresholds. Finally we discuss some of the potential uses of this scheme.
On the Geometry of Chemical Reaction Networks: Lyapunov Function and Large Deviations
NASA Astrophysics Data System (ADS)
Agazzi, A.; Dembo, A.; Eckmann, J.-P.
2018-04-01
In an earlier paper, we proved the validity of large deviations theory for the particle approximation of quite general chemical reaction networks. In this paper, we extend its scope and present a more geometric insight into the mechanism of that proof, exploiting the notion of spherical image of the reaction polytope. This allows to view the asymptotic behavior of the vector field describing the mass-action dynamics of chemical reactions as the result of an interaction between the faces of this polytope in different dimensions. We also illustrate some local aspects of the problem in a discussion of Wentzell-Freidlin theory, together with some examples.
NASA Astrophysics Data System (ADS)
Pereira, L. R.; Jardim, D. F.; da Silva, J. M.
2017-12-01
The teaching and learning of Mathematics contents have been challenging along the history of the education, both for the teacher, in his dedicated task of teaching, as for the student, in his arduous and constant task of learning. One of the topics that are most discussed in these contents is the difference between the concepts of proof and demonstration. This work presents an interesting discussion about such concepts considering the use of the mathematical modeling approach for teaching, applied to some examples developed in the classroom with a group of students enrolled in the discipline of Geometry of the Mathematics curse of UFVJM.
Proof test and fatigue crack growth modeling on 2024-T3 aluminum alloy
NASA Technical Reports Server (NTRS)
Newman, J. C., Jr.; Poe, C. C., Jr.; Dawicke, D. S.
1990-01-01
Pressure proof testing of aircraft fuselage structures has been suggested as a means of screening critical crack sizes and of extending their useful life. The objective of this paper is to study the proof-test concept and to model the crack-growth process on a ductile material. Simulated proof and operational fatigue life tests have been conducted on cracked panels made of 2024-T3 aluminum alloy sheet material. A fatigue crack-closure model was modified to simulate the proof test and operational fatigue cycling. Using crack-growth rate and resistance-curve data, the model was able to predict crack growth during and after the proof load. These tests and analyses indicate that the proof test increases fatigue life; but the beneficial life, after a 1.33 or 1.5 proof, was less than a few hundred cycles.
How Fast Does Darwin's Elephant Population Grow?
Podani, János; Kun, Ádám; Szilágyi, András
2018-06-01
In "The Origin of Species," Darwin describes a hypothetical example illustrating that large, slowly reproducing mammals such as the elephant can reach very large numbers if population growth is not affected by regulating factors. The elephant example has since been cited in various forms in a wide variety of books, ranging from educational material to encyclopedias. However, Darwin's text was changed over the six editions of the book, although some errors in the mathematics persisted throughout. In addition, full details of the problem remained hidden in his correspondence with readers of the Origin. As a result, Darwin's example is very often misinterpreted, misunderstood or presented as if it were a fact. We show that the population growth of Darwin's elephant population can be modeled by the Leslie matrix method, which we generalize here to males as well. Darwin's most often cited figure, about 19 million elephants after 750 years is not a typical outcome, actually a very unlikely result under more realistic, although still hypothetical situations. We provide a recursion formula suggesting that Darwin's original model corresponds to a tribonacci series, a proof showing that sex ratio is constant over all age classes, and a derivation of a generating function of the sequence.
NASA Astrophysics Data System (ADS)
Krishna, Anirudh; Spekkens, Robert W.; Wolfe, Elie
2017-12-01
When a measurement is compatible with each of two other measurements that are incompatible with one another, these define distinct contexts for the given measurement. The Kochen-Specker theorem rules out models of quantum theory that satisfy a particular assumption of context-independence: that sharp measurements are assigned outcomes both deterministically and independently of their context. This notion of noncontextuality is not suited to a direct experimental test because realistic measurements always have some degree of unsharpness due to noise. However, a generalized notion of noncontextuality has been proposed that is applicable to any experimental procedure, including unsharp measurements, but also preparations as well, and for which a quantum no-go result still holds. According to this notion, the model need only specify a probability distribution over the outcomes of a measurement in a context-independent way, rather than specifying a particular outcome. It also implies novel constraints of context-independence for the representation of preparations. In this article, we describe a general technique for translating proofs of the Kochen-Specker theorem into inequality constraints on realistic experimental statistics, the violation of which witnesses the impossibility of a noncontextual model. We focus on algebraic state-independent proofs, using the Peres-Mermin square as our illustrative example. Our technique yields the necessary and sufficient conditions for a particular set of correlations (between the preparations and the measurements) to admit a noncontextual model. The inequalities thus derived are demonstrably robust to noise. We specify how experimental data must be processed in order to achieve a test of these inequalities. We also provide a criticism of prior proposals for experimental tests of noncontextuality based on the Peres-Mermin square.
A future-proof architecture for telemedicine using loose-coupled modules and HL7 FHIR.
Gøeg, Kirstine Rosenbeck; Rasmussen, Rune Kongsgaard; Jensen, Lasse; Wollesen, Christian Møller; Larsen, Søren; Pape-Haugaard, Louise Bilenberg
2018-07-01
Most telemedicine solutions are proprietary and disease specific which cause a heterogeneous and silo-oriented system landscape with limited interoperability. Solving the interoperability problem would require a strong focus on data integration and standardization in telemedicine infrastructures. Our objective was to suggest a future-proof architecture, that consisted of small loose-coupled modules to allow flexible integration with new and existing services, and the use of international standards to allow high re-usability of modules, and interoperability in the health IT landscape. We identified core features of our future-proof architecture as the following (1) To provide extended functionality the system should be designed as a core with modules. Database handling and implementation of security protocols are modules, to improve flexibility compared to other frameworks. (2) To ensure loosely coupled modules the system should implement an inversion of control mechanism. (3) A focus on ease of implementation requires the system should use HL7 FHIR (Fast Interoperable Health Resources) as the primary standard because it is based on web-technologies. We evaluated the feasibility of our architecture by developing an open source implementation of the system called ORDS. ORDS is written in TypeScript, and makes use of the Express Framework and HL7 FHIR DSTU2. The code is distributed on GitHub. All modules have been tested unit wise, but end-to-end testing awaits our first clinical example implementations. Our study showed that highly adaptable and yet interoperable core frameworks for telemedicine can be designed and implemented. Future work includes implementation of a clinical use case and evaluation. Copyright © 2018 Elsevier B.V. All rights reserved.
ERIC Educational Resources Information Center
Bergwall, Andreas; Hemmi, Kirsti
2017-01-01
Students' difficulties with proof, scholars' calls for proof to be a consistent part of K-12 mathematics, and the extensive use of textbooks in mathematics classrooms motivate investigations on how proof-related items are addressed in mathematics textbooks. We contribute to textbook research by focusing on opportunities to learn proof-related…
Integrating Algebra and Proof in High School Mathematics: An Exploratory Study
ERIC Educational Resources Information Center
Martinez, Mara V.; Brizuela, Barbara M.; Superfine, Alison Castro
2011-01-01
Frequently, in the US students' work with proofs is largely concentrated to the domain of high school geometry, thus providing students with a distorted image of what proof entails, which is at odds with the central role that proof plays in mathematics. Despite the centrality of proof in mathematics, there is a lack of studies addressing how to…
On Mathematicians' Proof Skimming: A Reply to Inglis and Alcock
ERIC Educational Resources Information Center
Weber, Keith; Mejia-Ramos, Juan Pablo
2013-01-01
n a recent article, Inglis and Alcock (2012) contended that their data challenge the claim that when mathematicians validate proofs, they initially skim a proof to grasp its main idea before reading individual parts of the proof more carefully. This result is based on the fact that when mathematicians read proofs in their study, on average their…
Rethinking the Discovery Function of Proof within the Context of Proofs and Refutations
ERIC Educational Resources Information Center
Komatsu, Kotaro; Tsujiyama, Yosuke; Sakamaki, Aruta
2014-01-01
Proof and proving are important components of school mathematics and have multiple functions in mathematical practice. Among these functions of proof, this paper focuses on the discovery function that refers to invention of a new statement or conjecture by reflecting on or utilizing a constructed proof. Based on two cases in which eighth and ninth…
Proof test methodology for composites
NASA Technical Reports Server (NTRS)
Wu, Edward M.; Bell, David K.
1992-01-01
The special requirements for proof test of composites are identified based on the underlying failure process of composites. Two proof test methods are developed to eliminate the inevitable weak fiber sites without also causing flaw clustering which weakens the post-proof-test composite. Significant reliability enhancement by these proof test methods has been experimentally demonstrated for composite strength and composite life in tension. This basic proof test methodology is relevant to the certification and acceptance of critical composite structures. It can also be applied to the manufacturing process development to achieve zero-reject for very large composite structures.
An evaluation of the pressure proof test concept for 2024-T3 aluminium alloy sheet
NASA Technical Reports Server (NTRS)
Dawicke, D. S.; Poe, C. C., Jr.; Newman, J. C.; Harris, C. E.
1991-01-01
The concept of pressure proof testing of fuselage structures with fatigue cracks to insure structural integrity was evaluated from a fracture mechanics viewpoint. A generic analytical and experimental investigation was conducted on uniaxially loaded flat panels with crack configurations and stress levels typical of longitudinal lap splice joints in commercial transport aircraft fuselages. The results revealed that the remaining fatigue life after a proof cycle was longer than that without the proof cycle because of crack growth retardation due to increased crack closure. However, based on a crack length that is slightly less than the critical value at the maximum proof stress, the minimum assured life or proof test interval must be no more than 550 pressure cycles for a 1.33 proof factor and 1530 pressure cycles for a 1.5 proof factor to prevent in-flight failures.
An evaluation of the pressure proof test concept for thin sheet 2024-T3
NASA Technical Reports Server (NTRS)
Dawicke, D. S.; Poe, C. C., Jr.; Newman, J. C., Jr.; Harris, C. E.
1990-01-01
The concept of pressure proof testing of fuselage structures with fatigue cracks to insure structural integrity was evaluated from a fracture mechanics viewpoint. A generic analytical and experimental investigation was conducted on uniaxially loaded flat panels with crack configurations and stress levels typical of longitudinal lap-splice joints in commercial transport aircraft fuselage. The results revealed that the remaining fatigue life after a proof test was longer than that without the proof test because of crack growth retardation due to increased crack closure. However, based on a crack length that is slightly less than the critical value at the maximum proof test stress, the minimum assured life or proof test interval must be no more than 550 pressure cycles for a 1.33 proof factor and 1530 pressure cycles for a 1.5 proof factor to prevent in-flight failures.
An evaluation of the pressure proof test concept for thin sheet 2024-T3
NASA Technical Reports Server (NTRS)
Dawicke, D. S.; Poe, C. C., Jr.; Newman, James C., Jr.; Harris, Charles E.
1990-01-01
The concept of pressure proof testing of fuselage structures with fatigue cracks to insure structural integrity was evaluated from a fracture mechanics viewpoint. A generic analytical and experimental investigation was conducted on uniaxially loaded flat panels with crack configurations and stress levels typical of longitudinal lap splice joints in commercial transport aircraft fuselages. The results revealed that the remaining fatigue life after a proof test was longer than that without the proof test because of crack growth retardation due to increased crack closure. However, based on a crack length that is slightly less than the critical value at the maximum proof test stress, the minimum assured life or proof test interval must be no more than 550 pressure cycles for a 1.33 proof factor and 1530 pressure cycles for a 1.5 proof factor to prevent in-flight failures.
[Understanding mistake-proofing].
de Saint Maurice, G; Giraud, N; Ausset, S; Auroy, Y; Lenoir, B; Amalberti, R
2011-01-01
The mistake-proofing concept often refers to physical devices that prevent actors from making a wrong action. In anaesthesiology, one immediately thinks to specific design of outlets for medical gases. More generally, the principle of mistake-proofing is to avoid an error, by placing knowledge in the world rather than knowledge in the head. As it often happens in risk management, healthcare has received information transfers from the industry. Computer is changing the concept of mistake-proofing, initially based on physical design, such as aerospace and automotive industry. The mistake-proofing concept may be applied to prevention, detection, and mitigation of errors. The forcing functions are a specific part of mistake-proofing: they prevent a wrong action or they force a virtuous one. Grout proposes a little shortcut to identify mistake-proofing devices: "If it is not possible to picture it in action, it is probably not a mistake-proofing device". Copyright © 2010 Elsevier Masson SAS. All rights reserved.
Code of Federal Regulations, 2010 CFR
2010-07-01
... years after first exposure, and proof of onset of a specified compensable disease more than five years... Specified Diseases Contracted After Exposure in an Affected Area (âDownwindersâ) § 79.25 Proof of onset of leukemia at least two years after first exposure, and proof of onset of a specified compensable disease...
Code of Federal Regulations, 2011 CFR
2011-07-01
... years after first exposure, and proof of onset of a specified compensable disease more than five years... Specified Diseases Contracted After Exposure in an Affected Area (âDownwindersâ) § 79.25 Proof of onset of leukemia at least two years after first exposure, and proof of onset of a specified compensable disease...
Code of Federal Regulations, 2012 CFR
2012-07-01
... years after first exposure, and proof of onset of a specified compensable disease more than five years... Specified Diseases Contracted After Exposure in an Affected Area (âDownwindersâ) § 79.25 Proof of onset of leukemia at least two years after first exposure, and proof of onset of a specified compensable disease...
Code of Federal Regulations, 2014 CFR
2014-07-01
... years after first exposure, and proof of onset of a specified compensable disease more than five years... Specified Diseases Contracted After Exposure in an Affected Area (âDownwindersâ) § 79.25 Proof of onset of leukemia at least two years after first exposure, and proof of onset of a specified compensable disease...
Code of Federal Regulations, 2013 CFR
2013-07-01
... years after first exposure, and proof of onset of a specified compensable disease more than five years... Specified Diseases Contracted After Exposure in an Affected Area (âDownwindersâ) § 79.25 Proof of onset of leukemia at least two years after first exposure, and proof of onset of a specified compensable disease...
ERIC Educational Resources Information Center
Miyakawa, Takeshi
2017-01-01
This paper reports the results of an international comparative study on the nature of proof to be taught in geometry. Proofs in French and Japanese lower secondary schools were explored by analyzing curricular documents: mathematics textbooks and national curricula. Analyses on the three aspects of proof--statement, proof, and theory--suggested by…
NASA Astrophysics Data System (ADS)
Waheed, R.; Tarar, W.; Saeed, H. A.
2016-08-01
Sound proof canopies for diesel power generators are fabricated with a layer of sound absorbing material applied to all the inner walls. The physical properties of the majority of commercially available sound proofing materials reveal that a material with high sound absorption coefficient has very low thermal conductivity. Consequently a good sound absorbing material is also a good heat insulator. In this research it has been found through various experiments that ordinary sound proofing materials tend to rise the inside temperature of sound proof enclosure in certain turbo engines by capturing the heat produced by engine and not allowing it to be transferred to atmosphere. The same phenomenon is studied by creating a finite element model of the sound proof enclosure and performing a steady state and transient thermal analysis. The prospects of using aluminium foam as sound proofing material has been studied and it is found that inside temperature of sound proof enclosure can be cut down to safe working temperature of power generator engine without compromise on sound proofing.
The convergence rate of approximate solutions for nonlinear scalar conservation laws
NASA Technical Reports Server (NTRS)
Nessyahu, Haim; Tadmor, Eitan
1991-01-01
The convergence rate is discussed of approximate solutions for the nonlinear scalar conservation law. The linear convergence theory is extended into a weak regime. The extension is based on the usual two ingredients of stability and consistency. On the one hand, the counterexamples show that one must strengthen the linearized L(sup 2)-stability requirement. It is assumed that the approximate solutions are Lip(sup +)-stable in the sense that they satisfy a one-sided Lipschitz condition, in agreement with Oleinik's E-condition for the entropy solution. On the other hand, the lack of smoothness requires to weaken the consistency requirement, which is measured in the Lip'-(semi)norm. It is proved for Lip(sup +)-stable approximate solutions, that their Lip'convergence rate to the entropy solution is of the same order as their Lip'-consistency. The Lip'-convergence rate is then converted into stronger L(sup p) convergence rate estimates.
Wakefield, J C
1993-02-01
Spitzer and Endicott (1978) proposed an operational definition of mental disorder that is a more rigorous version of the brief definitions that appeared in the 3rd and revised 3rd editions of the Diagnostic and Statistical Manual of Mental Disorders. The heart of their proposal is a translation of the concept of dysfunction into operational terms. I argue that their definition fails to capture the concept of dysfunction and is subject to many counterexamples. I use my harmful dysfunction account of disorder (Wakefield, 1992a, 1992b), which interprets dysfunction in evolutionary terms, to explain both the appeal and the problems of Spitzer and Endicott's definition and to provide support for the harmful dysfunction view. I conclude that the failure of Spitzer and Endicott's sophisticated attempt at operationalization indicates that nonoperational definitions that use functional concepts must play a role in formulating valid diagnostic criteria.
NASA Astrophysics Data System (ADS)
Huang, Yu; Chen, Yun; Gao, Weixiang; Yang, Zhengxuan; Wang, Lingling
2018-04-01
Depending on the experimental conditions and plasmonic systems, the correlations between near-field surface enhanced Raman scattering (SERS) behaviors and far-field optical responses have sometimes been accepted directly, or argued, or explored. In this work, we have numerically demonstrated the anomalous spectral correlations between the near- and far-field properties for roughened Au mesoparticles. As a counterexample, it is witnessed that the dipole extinction peak of the mesoparticles may mislead us in seeking favorable SERS performance. The simple Rayleigh scattering spectra can also be misguided in the presence of dark modes. For roughened mesoparticles with a moderate size here, the huge near-field enhancement is a synergistic result of the overall dark quadrupole mode and the substructural bonding dipole coupling. The conclusions demonstrated here would be of general interest to the field of plasmonics, especially the optimization of single-particle SERS substrates.
NASA Technical Reports Server (NTRS)
Choudhari, Meelan; Hall, Philip; Streett, Craig
1992-01-01
The generation of long-wavelength, viscous-inviscid interactive Goertler vortices is studied in the linear regime by numerically solving the time-dependent governing equations. It is found that time-dependent surface deformations, which assume a fixed nonzero shape at large times, generate steady Goertler vortices that amplify in the downstream direction. Thus, the Goertler instability in this regime is shown to be convective in nature, contrary to the earlier findings of Ruban and Savenkov. The disturbance pattern created by steady and streamwise-elongated surface obstacles on a concave surface is examined in detail, and also contrasted with the flow pattern due to roughness elements with aspect ratio of order unity on flat surfaces. Finally, the applicability of the Briggs-Bers criterion to unstable physical systems of this type is questioned by providing a counterexample in the form of the inviscid limit of interactive Goertler vortices.
Can the baryon asymmetry arise from initial conditions?
Krnjaic, Gordan
2017-08-01
In this letter, we quantify the challenge of explaining the baryon asymmetry using initial conditions in a universe that undergoes inflation. Contrary to lore, we find that such an explanation is possible if netmore » $B-L$ number is stored in a light bosonic field with hyper-Planckian initial displacement and a delicately chosen field velocity prior to inflation. However, such a construction may require extremely tuned coupling constants to ensure that this asymmetry is viably communicated to the Standard Model after reheating; the large field displacement required to overcome inflationary dilution must not induce masses for Standard Model particles or generate dangerous washout processes. While these features are inelegant, this counterexample nonetheless shows that there is no theorem against such an explanation. We also comment on potential observables in the double $$\\beta$$-decay spectrum and on model variations that may allow for more natural realizations.« less
Slaves, embryos, and nonhuman animals: moral status and the limitations of common morality theory.
Lindsay, Ronald A
2005-12-01
Common morality theory must confront apparent counterexamples from the history of morality, such as the widespread acceptance of slavery in prior eras, that suggest core norms have changed over time. A recent defense of common morality theory addresses this problem by drawing a distinction between the content of the norms of the common morality and the range of individuals to whom these norms apply. This distinction is successful in reconciling common morality theory with practices such as slavery, but only at the cost of underscoring the limits of common morality theory, in particular its inability to resolve disputes about the moral status of entities. Given that many controversies in bioethics center on the disputed status of various entities, such as embryos and nonhuman animals, this is an important limitation. Nonetheless, common morality theory still can be a useful resource in diminishing moral conflict on issues that do not involve disputes over moral status.
Zhang, Xuefeng; Chen, YangQuan
2017-11-01
The paper considers the stabilization issue of linear continuous singular systems by dealing with strict linear matrix inequalities (LMIs) without invoking equality constraint and proposes a complete and effective solved LMIs formulation. The criterion is necessary and sufficient condition and can be directly solved the feasible solutions with LMI toolbox and is much more tractable and reliable in numerical simulation than existing results, which involve positive semi-definite LMIs with equality constraints. The most important property of the criterion proposed in the paper is that it can overcome the drawbacks of the invalidity caused by the singularity of Ω=PE T +SQ for stabilization of singular systems. Two counterexamples are presented to avoid the disadvantages of the existing condition of stabilization of continuous singular systems. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.
What does Pirahã grammar have to teach us about human language and the mind?
Everett, Daniel L
2012-11-01
Pirahã is a language isolate of the Brazilian Amazon. Among the lessons it has to teach us about human language and the mind, two are highlighted here. The first is that recursion is not a necessary condition for human syntax, because there is no evidence for recursive sentential syntax in the language. This is a stark counterexample to the claims of Chomsky and others. The second lesson is that the influence of culture on Pirahã grammar, coupled with much established and newer research, indicates that the idea of an innate, universal grammar has little if any role to play in our understanding of the nature, origins, and use of human language. WIREs Cogn Sci 2012 doi: 10.1002/wcs.1195 For further resources related to this article, please visit the WIREs website. Copyright © 2012 John Wiley & Sons, Inc.
Comments on Samal and Henderson: Parallel consistent labeling algorithms
DOE Office of Scientific and Technical Information (OSTI.GOV)
Swain, M.J.
Samal and Henderson claim that any parallel algorithm for enforcing arc consistency in the worst case must have {Omega}(na) sequential steps, where n is the number of nodes, and a is the number of labels per node. The authors argue that Samal and Henderon's argument makes assumptions about how processors are used and give a counterexample that enforces arc consistency in a constant number of steps using O(n{sup 2}a{sup 2}2{sup na}) processors. It is possible that the lower bound holds for a polynomial number of processors; if such a lower bound were to be proven it would answer an importantmore » open question in theoretical computer science concerning the relation between the complexity classes P and NC. The strongest existing lower bound for the arc consistency problem states that it cannot be solved in polynomial log time unless P = NC.« less
About one counterexample of applying method of splitting in modeling of plating processes
NASA Astrophysics Data System (ADS)
Solovjev, D. S.; Solovjeva, I. A.; Litovka, Yu V.; Korobova, I. L.
2018-05-01
The paper presents the main factors that affect the uniformity of the thickness distribution of plating on the surface of the product. The experimental search for the optimal values of these factors is expensive and time-consuming. The problem of adequate simulation of coating processes is very relevant. The finite-difference approximation using seven-point and five-point templates in combination with the splitting method is considered as solution methods for the equations of the model. To study the correctness of the solution of equations of the mathematical model by these methods, the experiments were conducted on plating with a flat anode and cathode, which relative position was not changed in the bath. The studies have shown that the solution using the splitting method was up to 1.5 times faster, but it did not give adequate results due to the geometric features of the task under the given boundary conditions.
Weak cosmic censorship: as strong as ever.
Hod, Shahar
2008-03-28
Spacetime singularities that arise in gravitational collapse are always hidden inside of black holes. This is the essence of the weak cosmic censorship conjecture. The hypothesis, put forward by Penrose 40 years ago, is still one of the most important open questions in general relativity. In this Letter, we reanalyze extreme situations which have been considered as counterexamples to the weak cosmic censorship conjecture. In particular, we consider the absorption of scalar particles with large angular momentum by a black hole. Ignoring back reaction effects may lead one to conclude that the incident wave may overspin the black hole, thereby exposing its inner singularity to distant observers. However, we show that when back reaction effects are properly taken into account, the stability of the black-hole event horizon is irrefutable. We therefore conclude that cosmic censorship is actually respected in this type of gedanken experiments.
CO2 fixation by anaerobic non-photosynthetic mixotrophy for improved carbon conversion.
Jones, Shawn W; Fast, Alan G; Carlson, Ellinor D; Wiedel, Carrissa A; Au, Jennifer; Antoniewicz, Maciek R; Papoutsakis, Eleftherios T; Tracy, Bryan P
2016-09-30
Maximizing the conversion of biogenic carbon feedstocks into chemicals and fuels is essential for fermentation processes as feedstock costs and processing is commonly the greatest operating expense. Unfortunately, for most fermentations, over one-third of sugar carbon is lost to CO 2 due to the decarboxylation of pyruvate to acetyl-CoA and limitations in the reducing power of the bio-feedstock. Here we show that anaerobic, non-photosynthetic mixotrophy, defined as the concurrent utilization of organic (for example, sugars) and inorganic (for example, CO 2 ) substrates in a single organism, can overcome these constraints to increase product yields and reduce overall CO 2 emissions. As a proof-of-concept, Clostridium ljungdahlii was engineered to produce acetone and achieved a mass yield 138% of the previous theoretical maximum using a high cell density continuous fermentation process. In addition, when enough reductant (that is, H 2 ) is provided, the fermentation emits no CO 2 . Finally, we show that mixotrophy is a general trait among acetogens.
Universal Hitting Time Statistics for Integrable Flows
NASA Astrophysics Data System (ADS)
Dettmann, Carl P.; Marklof, Jens; Strömbergsson, Andreas
2017-02-01
The perceived randomness in the time evolution of "chaotic" dynamical systems can be characterized by universal probabilistic limit laws, which do not depend on the fine features of the individual system. One important example is the Poisson law for the times at which a particle with random initial data hits a small set. This was proved in various settings for dynamical systems with strong mixing properties. The key result of the present study is that, despite the absence of mixing, the hitting times of integrable flows also satisfy universal limit laws which are, however, not Poisson. We describe the limit distributions for "generic" integrable flows and a natural class of target sets, and illustrate our findings with two examples: the dynamics in central force fields and ellipse billiards. The convergence of the hitting time process follows from a new equidistribution theorem in the space of lattices, which is of independent interest. Its proof exploits Ratner's measure classification theorem for unipotent flows, and extends earlier work of Elkies and McMullen.
Science in the Looking Glass - What Do Scientists Really Know?
NASA Astrophysics Data System (ADS)
Davies, E. Brian
2007-04-01
How do scientific conjectures become laws? Why does proof mean different things in different sciences? Do numbers exist, or were they invented? Why do some laws turn out to be wrong? In this wide-ranging book, Brian Davies discusses the basis for scientists' claims to knowledge about the world. He looks at science historically, emphasizing not only the achievements of scientists from Galileo onwards, but also their mistakes. He rejects the claim that all scientific knowledge is provisional, by citing examples from chemistry, biology and geology. A major feature of the book is its defence of the view that mathematics was invented rather than discovered. While experience has shown that disentangling knowledge from opinion and aspiration is a hard task, this book provides a clear guide to the difficulties. Full of illuminating examples and quotations, and with a scope ranging from psychology and evolution to quantum theory and mathematics, this book brings alive issues at the heart of all science.
[Best practice in risk management of Neisseria meningitidis bacterial meningitis at nurseries].
Santoro, A; Vinci, M R; Menichella, A; Montaldi, V; Camisa, V; Di Felice, C; Musolino, A M C; Zaffina, S
2012-01-01
In many contexts is often underestimated the biological risk and schools can be an example. Proof of this is the exclusion of work in the school from the example of the work activities of biohazard included in Annex XLIV of Legislative Decree 81/08. Our work proposes a protocol for risk management meningitis contagious in the specific environment of the nursery taking a cue from the specific experience gained by the Service of Prevention and Protection Bambino Gesù Children's Hospital following the course accreditation Joint Commision. This is primary prevention measures (training and information) and secondary (vaccination, reporting of suspected cases, chemoprophylaxis of contacts, contact tracing, counseling) to be applied consistently even and especially in the absence of sick people, at which time the shares are aimed exclusively to control its spread to be taken and monitored, with the cooperation of all subject involved in various capacities in the protection of the health of workers, within these specific working environments.
Uses and misuses of Bayes' rule and Bayesian classifiers in cybersecurity
NASA Astrophysics Data System (ADS)
Bard, Gregory V.
2017-12-01
This paper will discuss the applications of Bayes' Rule and Bayesian Classifiers in Cybersecurity. While the most elementary form of Bayes' rule occurs in undergraduate coursework, there are more complicated forms as well. As an extended example, Bayesian spam filtering is explored, and is in many ways the most triumphant accomplishment of Bayesian reasoning in computer science, as nearly everyone with an email address has a spam folder. Bayesian Classifiers have also been responsible significant cybersecurity research results; yet, because they are not part of the standard curriculum, few in the mathematics or information-technology communities have seen the exact definitions, requirements, and proofs that comprise the subject. Moreover, numerous errors have been made by researchers (described in this paper), due to some mathematical misunderstandings dealing with conditional independence, or other badly chosen assumptions. Finally, to provide instructors and researchers with real-world examples, 25 published cybersecurity papers that use Bayesian reasoning are given, with 2-4 sentence summaries of the focus and contributions of each paper.
ERIC Educational Resources Information Center
Padula, Janice
2006-01-01
One of the most interesting and important proofs in the history of mathematics is the Pythagorean school's proof of the "irrationality" of the square root of 2. After a brief look at G. H. Hardy (1941) thoughts regarding it, two versions of the classic Pythagorean proof are examined and discussed in this article, one written by an American…
A Semantic Basis for Proof Queries and Transformations
NASA Technical Reports Server (NTRS)
Aspinall, David; Denney, Ewen W.; Luth, Christoph
2013-01-01
We extend the query language PrQL, designed for inspecting machine representations of proofs, to also allow transformation of proofs. PrQL natively supports hiproofs which express proof structure using hierarchically nested labelled trees, which we claim is a natural way of taming the complexity of huge proofs. Query-driven transformations enable manipulation of this structure, in particular, to transform proofs produced by interactive theorem provers into forms that assist their understanding, or that could be consumed by other tools. In this paper we motivate and define basic transformation operations, using an abstract denotational semantics of hiproofs and queries. This extends our previous semantics for queries based on syntactic tree representations.We define update operations that add and remove sub-proofs, and manipulate the hierarchy to group and ungroup nodes. We show that
NASA Astrophysics Data System (ADS)
Stefaneas, Petros; Vandoulakis, Ioannis M.
2015-12-01
This paper outlines a logical representation of certain aspects of the process of mathematical proving that are important from the point of view of Artificial Intelligence. Our starting-point is the concept of proof-event or proving, introduced by Goguen, instead of the traditional concept of mathematical proof. The reason behind this choice is that in contrast to the traditional static concept of mathematical proof, proof-events are understood as processes, which enables their use in Artificial Intelligence in such contexts, in which problem-solving procedures and strategies are studied. We represent proof-events as problem-centered spatio-temporal processes by means of the language of the calculus of events, which captures adequately certain temporal aspects of proof-events (i.e. that they have history and form sequences of proof-events evolving in time). Further, we suggest a "loose" semantics for the proof-events, by means of Kolmogorov's calculus of problems. Finally, we expose the intented interpretations for our logical model from the fields of automated theorem-proving and Web-based collective proving.
Deriving Safety Cases from Automatically Constructed Proofs
NASA Technical Reports Server (NTRS)
Basir, Nurlida; Denney, Ewen; Fischer, Bernd
2009-01-01
Formal proofs provide detailed justification for the validity of claims and are widely used in formal software development methods. However, they are often complex and difficult to understand, because the formalism in which they are constructed and encoded is usually machine-oriented, and they may also be based on assumptions that are not justified. This causes concerns about the trustworthiness of using formal proofs as arguments in safety-critical applications. Here, we present an approach to develop safety cases that correspond to formal proofs found by automated theorem provers and reveal the underlying argumentation structure and top-level assumptions. We concentrate on natural deduction style proofs, which are closer to human reasoning than resolution proofs, and show how to construct the safety cases by covering the natural deduction proof tree with corresponding safety case fragments. We also abstract away logical book-keeping steps, which reduces the size of the constructed safety cases. We show how the approach can be applied to the proofs found by the Muscadet prover.
Assurance Cases for Proofs as Evidence
NASA Technical Reports Server (NTRS)
Chaki, Sagar; Gurfinkel, Arie; Wallnau, Kurt; Weinstock, Charles
2009-01-01
Proof-carrying code (PCC) provides a 'gold standard' for establishing formal and objective confidence in program behavior. However, in order to extend the benefits of PCC - and other formal certification techniques - to realistic systems, we must establish the correspondence of a mathematical proof of a program's semantics and its actual behavior. In this paper, we argue that assurance cases are an effective means of establishing such a correspondence. To this end, we present an assurance case pattern for arguing that a proof is free from various proof hazards. We also instantiate this pattern for a proof-based mechanism to provide evidence about a generic medical device software.
Code of Federal Regulations, 2010 CFR
2010-01-01
... INDUSTRIES § 23.10 Misuse of “corrosion proof,” “noncorrosive,” “corrosion resistant,” “rust proof,” “rust...,” “rust proof,” or any other term of similar meaning to describe an industry product unless all parts of the product will be immune from rust and other forms of corrosion during the life expectancy of the...
Code of Federal Regulations, 2011 CFR
2011-01-01
... INDUSTRIES § 23.10 Misuse of “corrosion proof,” “noncorrosive,” “corrosion resistant,” “rust proof,” “rust...,” “rust proof,” or any other term of similar meaning to describe an industry product unless all parts of the product will be immune from rust and other forms of corrosion during the life expectancy of the...
Code of Federal Regulations, 2013 CFR
2013-01-01
... INDUSTRIES § 23.10 Misuse of “corrosion proof,” “noncorrosive,” “corrosion resistant,” “rust proof,” “rust...,” “rust proof,” or any other term of similar meaning to describe an industry product unless all parts of the product will be immune from rust and other forms of corrosion during the life expectancy of the...
Code of Federal Regulations, 2014 CFR
2014-01-01
... INDUSTRIES § 23.10 Misuse of “corrosion proof,” “noncorrosive,” “corrosion resistant,” “rust proof,” “rust...,” “rust proof,” or any other term of similar meaning to describe an industry product unless all parts of the product will be immune from rust and other forms of corrosion during the life expectancy of the...
Code of Federal Regulations, 2012 CFR
2012-01-01
... INDUSTRIES § 23.10 Misuse of “corrosion proof,” “noncorrosive,” “corrosion resistant,” “rust proof,” “rust...,” “rust proof,” or any other term of similar meaning to describe an industry product unless all parts of the product will be immune from rust and other forms of corrosion during the life expectancy of the...
Mathematical Proof. Description of Teacher Inservice Education Materials.
ERIC Educational Resources Information Center
National Education Association, Washington, DC. Project on Utilization of Inservice Education R & D Outcomes.
The learning module described here is designed to help teachers plan and present a lesson on mathematical proof to pupils. The main topics covered are structure, hypothesis and conclusion, analysis, contrapositive, proof by contradiction, part proof worksheet, and conclusion and posttest. This descriptive report provides information on the…
Optimum structural design based on reliability and proof-load testing
NASA Technical Reports Server (NTRS)
Shinozuka, M.; Yang, J. N.
1969-01-01
Proof-load test eliminates structures with strength less than the proof load and improves the reliability value in analysis. It truncates the distribution function of strength at the proof load, thereby alleviating verification of a fitted distribution function at the lower tail portion where data are usually nonexistent.
Preparing for Formal Proofs in Geometry
ERIC Educational Resources Information Center
Johnson, Art
2009-01-01
One way in which geometry teachers can help students develop their reasoning is by providing proof-readiness experiences. Blum and Kirsch (1991) suggest that "preformal proofs" can help students develop deductive reasoning. Preformal proofs, which follow the basic principles of deductive reasoning, can help prepare students for formal deduction in…
38 CFR 10.28 - Proof of death evidence.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 38 Pensions, Bonuses, and Veterans' Relief 1 2010-07-01 2010-07-01 false Proof of death evidence... COMPENSATION Adjusted Compensation; General § 10.28 Proof of death evidence. Evidence required in establishing proof of death under the act, as amended, shall conform with the requirements set forth in the...
16 CFR 614.1 - Appropriate proof of identity.
Code of Federal Regulations, 2010 CFR
2010-01-01
... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Appropriate proof of identity. 614.1 Section... IDENTITY § 614.1 Appropriate proof of identity. (a) Consumer reporting agencies shall develop and implement reasonable requirements for what information consumers shall provide to constitute proof of identity for...
16 CFR 614.1 - Appropriate proof of identity.
Code of Federal Regulations, 2011 CFR
2011-01-01
... 16 Commercial Practices 1 2011-01-01 2011-01-01 false Appropriate proof of identity. 614.1 Section... IDENTITY § 614.1 Appropriate proof of identity. (a) Consumer reporting agencies shall develop and implement reasonable requirements for what information consumers shall provide to constitute proof of identity for...
16 CFR 614.1 - Appropriate proof of identity.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 16 Commercial Practices 1 2012-01-01 2012-01-01 false Appropriate proof of identity. 614.1 Section... IDENTITY § 614.1 Appropriate proof of identity. (a) Consumer reporting agencies shall develop and implement reasonable requirements for what information consumers shall provide to constitute proof of identity for...
38 CFR 10.28 - Proof of death evidence.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 38 Pensions, Bonuses, and Veterans' Relief 1 2014-07-01 2014-07-01 false Proof of death evidence... COMPENSATION Adjusted Compensation; General § 10.28 Proof of death evidence. Evidence required in establishing proof of death under the act, as amended, shall conform with the requirements set forth in the...
38 CFR 10.28 - Proof of death evidence.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 38 Pensions, Bonuses, and Veterans' Relief 1 2013-07-01 2013-07-01 false Proof of death evidence... COMPENSATION Adjusted Compensation; General § 10.28 Proof of death evidence. Evidence required in establishing proof of death under the act, as amended, shall conform with the requirements set forth in the...
38 CFR 10.28 - Proof of death evidence.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 38 Pensions, Bonuses, and Veterans' Relief 1 2011-07-01 2011-07-01 false Proof of death evidence... COMPENSATION Adjusted Compensation; General § 10.28 Proof of death evidence. Evidence required in establishing proof of death under the act, as amended, shall conform with the requirements set forth in the...
38 CFR 10.28 - Proof of death evidence.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 38 Pensions, Bonuses, and Veterans' Relief 1 2012-07-01 2012-07-01 false Proof of death evidence... COMPENSATION Adjusted Compensation; General § 10.28 Proof of death evidence. Evidence required in establishing proof of death under the act, as amended, shall conform with the requirements set forth in the...
Proof Construction and Evaluation Practices of Prospective Mathematics Educators
ERIC Educational Resources Information Center
Imamoglu, Yesim; Togrol, Aysenur Yontar
2015-01-01
This study was conducted with 93 freshmen and 82 senior prospective mathematicians and mathematics teachers in order to investigate how they construct and evaluate proofs and whether there are any significant differences in their proof construction (with respect to department and grade) and proof evaluation (with respect to department)…
Johannesen, Kasper M; Claxton, Karl; Sculpher, Mark J; Wailoo, Allan J
2018-02-01
This paper presents a conceptual framework to analyse the design of the cost-effectiveness appraisal process of new healthcare technologies. The framework characterises the appraisal processes as a diagnostic test aimed at identifying cost-effective (true positive) and non-cost-effective (true negative) technologies. Using the framework, factors that influence the value of operating an appraisal process, in terms of net gain to population health, are identified. The framework is used to gain insight into current policy questions including (a) how rigorous the process should be, (b) who should have the burden of proof, and (c) how optimal design changes when allowing for appeals, price reductions, resubmissions, and re-evaluations. The paper demonstrates that there is no one optimal appraisal process and the process should be adapted over time and to the specific technology under assessment. Optimal design depends on country-specific features of (future) technologies, for example, effect, price, and size of the patient population, which might explain the difference in appraisal processes across countries. It is shown that burden of proof should be placed on the producers and that the impact of price reductions and patient access schemes on the producer's price setting should be considered when designing the appraisal process. Copyright © 2017 John Wiley & Sons, Ltd.
NASA Astrophysics Data System (ADS)
Arroyo, Ana; Mendibil Eguiluz, Javier; Sánchez Cupido, Laura
2018-03-01
One strategy to overcome the challenges related to critical raw materials (CRMs) is their substitution and recycling. However, the bright scientific idea, proof of concept or laboratory demonstration need to cross the valley of death in order to become stated as ‘a substitute’ instead of ‘a potential substitute’. Most PhD students and Post Docs specialize within a given thematic area; for example on specific materials or on substitution in a certain application. This specialization could limit the ability to generate innovations and profitable business models if there are not enough tools and skills to transform new knowledge and research results into an appealing value proposition towards customers and to a business opportunity for the current markets. The project proposes a framework for developing substitution and recycling related cross-sectorial skills and tools. These are applied for training business-related competences e.g. teamwork, management, communication, value proposition and business models design, especially within RTOs and industries. The proposed learning itinerary can radically improve the path from scientific proof of concept into innovation and lean start up or industrial market launch. The developed framework is tested by a pilot group having several topics within the areas of substitution and recycling of critical raw materials.
Proof of the Wave Nature of Plants
NASA Astrophysics Data System (ADS)
Wagner, Orvin
2008-03-01
I assume plants operate with a set of frequencies. These frequencies and the means of these frequencies are equal in all directions. We can then write (vh/λ)avh=(vv/λ)avv where the subscripts h and v represent horizontal and vertical respectively and av is average,. or vv/vh=(1/λh)av/(1/λv)av. I use an internodal spacing as λ/2 or the the distance between adjacent branches, leaves, etc. The ratios, vv/vh, are ratios of small integers for sufficient samplings. For example, for Ponderosa pine the ratio is 3/1 or for delicious apple 4/3. Note that these ratios represent the shape of the tree or other plant and their interactions with gravity. These ratios are derivable by other means such as use the ratio of # of horizontal needles per unit length from a horizontal sample to the # of needles per unit length from a vertical sample from p-pine. Or measure the vertical and horizontal velocities. My literature provides many other proofs of the wave nature of plants. I suggest that the waves in and related waves outside of plants (outside 4.9 m/s) are a dark matter related since they travel at such low velocities. See my present web site at home.budget.net/˜oedphd.
Response of the Alliance 1 Proof-of-Concept Airplane Under Gust Loads
NASA Technical Reports Server (NTRS)
Naser, A. S.; Pototzky, A. S.; Spain, C. V.
2001-01-01
This report presents the work performed by Lockheed Martin's Langley Program Office in support of NASA's Environmental Research Aircraft and Sensor Technology (ERAST) program. The primary purpose of this work was to develop and demonstrate a gust analysis method which accounts for the span-wise variation of gust velocity. This is important because these unmanned aircraft having high aspect ratios and low wing loading are very flexible, and fly at low speeds. The main focus of the work was therefore to perform a two-dimensional Power Spectrum Density (PSD) analysis of the Alliance 1 Proof-of-Concept Unmanned Aircraft, As of this writing, none of the aircraft described in this report have been constructed. They are concepts represented by analytical models. The process first involved the development of suitable structural and aeroelastic Finite Element Models (FEM). This was followed by development of a one-dimensional PSD gust analysis, and then the two-dimensional (PSD) analysis of the Alliance 1. For further validation and comparison, two additional analyses were performed. A two-dimensional PSD gust analysis was performed on a simplet MSC/NASTRAN example problem. Finally a one-dimensional discrete gust analysis was performed on Alliance 1. This report describes this process, shows the relevant comparisons between analytical methods, and discusses the physical meanings of the results.
Autosophy: an alternative vision for satellite communication, compression, and archiving
NASA Astrophysics Data System (ADS)
Holtz, Klaus; Holtz, Eric; Kalienky, Diana
2006-08-01
Satellite communication and archiving systems are now designed according to an outdated Shannon information theory where all data is transmitted in meaningless bit streams. Video bit rates, for example, are determined by screen size, color resolution, and scanning rates. The video "content" is irrelevant so that totally random images require the same bit rates as blank images. An alternative system design, based on the newer Autosophy information theory, is now evolving, which transmits data "contend" or "meaning" in a universally compatible 64bit format. This would allow mixing all multimedia transmissions in the Internet's packet stream. The new systems design uses self-assembling data structures, which grow like data crystals or data trees in electronic memories, for both communication and archiving. The advantages for satellite communication and archiving may include: very high lossless image and video compression, unbreakable encryption, resistance to transmission errors, universally compatible data formats, self-organizing error-proof mass memories, immunity to the Internet's Quality of Service problems, and error-proof secure communication protocols. Legacy data transmission formats can be converted by simple software patches or integrated chipsets to be forwarded through any media - satellites, radio, Internet, cable - without needing to be reformatted. This may result in orders of magnitude improvements for all communication and archiving systems.
Micromachined force-balance feedback accelerometer with optical displacement detection
Nielson, Gregory N.; Langlois, Eric; Baker, Michael; Okandan, Murat; Anderson, Robert
2014-07-22
An accelerometer includes a proof mass and a frame that are formed in a handle layer of a silicon-on-an-insulator (SOI). The proof mass is separated from the frame by a back-side trench that defines a boundary of the proof mass. The accelerometer also includes a reflector coupled to a top surface of the proof mass. An optical detector is located above the reflector at the device side. The accelerometer further includes at least one suspension spring. The suspension spring has a handle anchor that extends downwards from the device side to the handle layer to mechanically support upward and downward movement of the proof mass relative to a top surface of the proof mass.
Deriving Safety Cases from Machine-Generated Proofs
NASA Technical Reports Server (NTRS)
Basir, Nurlida; Fischer, Bernd; Denney, Ewen
2009-01-01
Proofs provide detailed justification for the validity of claims and are widely used in formal software development methods. However, they are often complex and difficult to understand, because they use machine-oriented formalisms; they may also be based on assumptions that are not justified. This causes concerns about the trustworthiness of using formal proofs as arguments in safety-critical applications. Here, we present an approach to develop safety cases that correspond to formal proofs found by automated theorem provers and reveal the underlying argumentation structure and top-level assumptions. We concentrate on natural deduction proofs and show how to construct the safety cases by covering the proof tree with corresponding safety case fragments.
Granularity analysis for mathematical proofs.
Schiller, Marvin R G
2013-04-01
Mathematical proofs generally allow for various levels of detail and conciseness, such that they can be adapted for a particular audience or purpose. Using automated reasoning approaches for teaching proof construction in mathematics presupposes that the step size of proofs in such a system is appropriate within the teaching context. This work proposes a framework that supports the granularity analysis of mathematical proofs, to be used in the automated assessment of students' proof attempts and for the presentation of hints and solutions at a suitable pace. Models for granularity are represented by classifiers, which can be generated by hand or inferred from a corpus of sample judgments via machine-learning techniques. This latter procedure is studied by modeling granularity judgments from four experts. The results provide support for the granularity of assertion-level proofs but also illustrate a degree of subjectivity in assessing step size. Copyright © 2013 Cognitive Science Society, Inc.
ESIM_DSN Web-Enabled Distributed Simulation Network
NASA Technical Reports Server (NTRS)
Bedrossian, Nazareth; Novotny, John
2002-01-01
In this paper, the eSim(sup DSN) approach to achieve distributed simulation capability using the Internet is presented. With this approach a complete simulation can be assembled from component subsystems that run on different computers. The subsystems interact with each other via the Internet The distributed simulation uses a hub-and-spoke type network topology. It provides the ability to dynamically link simulation subsystem models to different computers as well as the ability to assign a particular model to each computer. A proof-of-concept demonstrator is also presented. The eSim(sup DSN) demonstrator can be accessed at http://www.jsc.draper.com/esim which hosts various examples of Web enabled simulations.
A quantum informational approach for dissecting chemical reactions
NASA Astrophysics Data System (ADS)
Duperrouzel, Corinne; Tecmer, Paweł; Boguslawski, Katharina; Barcza, Gergely; Legeza, Örs; Ayers, Paul W.
2015-02-01
We present a conceptionally different approach to dissect bond-formation processes in metal-driven catalysis using concepts from quantum information theory. Our method uses the entanglement and correlation among molecular orbitals to analyze changes in electronic structure that accompany chemical processes. As a proof-of-principle example, the evolution of nickel-ethene bond-formation is dissected, which allows us to monitor the interplay of back-bonding and π-donation along the reaction coordinate. Furthermore, the reaction pathway of nickel-ethene complexation is analyzed using quantum chemistry methods, revealing the presence of a transition state. Our study supports the crucial role of metal-to-ligand back-donation in the bond-forming process of nickel-ethene.
A new class of finite-time nonlinear consensus protocols for multi-agent systems
NASA Astrophysics Data System (ADS)
Zuo, Zongyu; Tie, Lin
2014-02-01
This paper is devoted to investigating the finite-time consensus problem for a multi-agent system in networks with undirected topology. A new class of global continuous time-invariant consensus protocols is constructed for each single-integrator agent dynamics with the aid of Lyapunov functions. In particular, it is shown that the settling time of the proposed new class of finite-time consensus protocols is upper bounded for arbitrary initial conditions. This makes it possible for network consensus problems that the convergence time is designed and estimated offline for a given undirected information flow and a group volume of agents. Finally, a numerical simulation example is presented as a proof of concept.
Progress Toward National Aeronautics Goals
NASA Technical Reports Server (NTRS)
Russo, Carlo J.; Sehra, Arun K.
1999-01-01
NASA has made definitive progress towards achieving several bold U.S. goals in aeronautics related to air breathing engines. The advanced technologies developed towards these goals span applications from general aviation to large subsonic and supersonic aircraft. The proof of successful technology development is demonstrated through successful technology transfer to U.S. industry and projected fleet impact. Specific examples of progress are discussed that quantifies the achievement towards these goals. In addition, a more detailed vision for NASA aeronautics is defined and key strategic issues are explored which invite international and national debate and involvement especially in reduced environmental impact for subsonic and supersonic aircraft, dramatic new capabilities in general aviation engines, and reduced development cycle time and costs.
Critical Manifolds, Travelling Waves and an Example from Population Genetics.
1980-11-01
sko ). in fact, If e seo0 k E [ zk 0 , k1 ] and u c N(k), then whenever Izj = k, z l < 0 and whenever Iwj = k, Iw 1 0. -6- Proof. The last sentence...s .k Let cI be aboundfor JZJ and JWJ forall u E N(k’l) and e :s F0 . Choose k 0 so that ko (2 + cl) is a lower bound for the quadratic forms -Z (x...7- Now since k E [sk0 , kl] - ko k+ s50. Also, because k I /cok O , - ko + kc 0 :_ 0. Furthermore at least one of these terms is negative, so (Z < 0. If
Classical multiparty computation using quantum resources
NASA Astrophysics Data System (ADS)
Clementi, Marco; Pappa, Anna; Eckstein, Andreas; Walmsley, Ian A.; Kashefi, Elham; Barz, Stefanie
2017-12-01
In this work, we demonstrate a way to perform classical multiparty computing among parties with limited computational resources. Our method harnesses quantum resources to increase the computational power of the individual parties. We show how a set of clients restricted to linear classical processing are able to jointly compute a nonlinear multivariable function that lies beyond their individual capabilities. The clients are only allowed to perform classical xor gates and single-qubit gates on quantum states. We also examine the type of security that can be achieved in this limited setting. Finally, we provide a proof-of-concept implementation using photonic qubits that allows four clients to compute a specific example of a multiparty function, the pairwise and.
A history of development in rotordynamics: A manufacturer's perspective
NASA Technical Reports Server (NTRS)
Shemeld, David E.
1987-01-01
The subject of rotordynamics and instability problems in high performance turbomachinery has been a topic of considerable industry discussion and debate over the last 15 or so years. This paper reviews an original equipment manufacturer's history of development of concepts and equipment as applicable to multistage centrifugal compressors. The variety of industry user compression requirements and resultant problematical situations tends to confound many of the theories and analytical techniques set forth. The experiences and examples described herein support the conclusion that the successful addressing of potential rotordynamics problems is best served by a fundamental knowledge of the specific equipment. This in addition to having the appropriate analytical tools. Also, that the final proof is in the doing.
Busch, Michael; Wodrich, Matthew D; Corminboeuf, Clémence
2015-12-01
Linear free energy scaling relationships and volcano plots are common tools used to identify potential heterogeneous catalysts for myriad applications. Despite the striking simplicity and predictive power of volcano plots, they remain unknown in homogeneous catalysis. Here, we construct volcano plots to analyze a prototypical reaction from homogeneous catalysis, the Suzuki cross-coupling of olefins. Volcano plots succeed both in discriminating amongst different catalysts and reproducing experimentally known trends, which serves as validation of the model for this proof-of-principle example. These findings indicate that the combination of linear scaling relationships and volcano plots could serve as a valuable methodology for identifying homogeneous catalysts possessing a desired activity through a priori computational screening.
XNsim: Internet-Enabled Collaborative Distributed Simulation via an Extensible Network
NASA Technical Reports Server (NTRS)
Novotny, John; Karpov, Igor; Zhang, Chendi; Bedrossian, Nazareth S.
2007-01-01
In this paper, the XNsim approach to achieve Internet-enabled, dynamically scalable collaborative distributed simulation capabilities is presented. With this approach, a complete simulation can be assembled from shared component subsystems written in different formats, that run on different computing platforms, with different sampling rates, in different geographic locations, and over singlelmultiple networks. The subsystems interact securely with each other via the Internet. Furthermore, the simulation topology can be dynamically modified. The distributed simulation uses a combination of hub-and-spoke and peer-topeer network topology. A proof-of-concept demonstrator is also presented. The XNsim demonstrator can be accessed at http://www.jsc.draver.corn/xn that hosts various examples of Internet enabled simulations.
45 CFR 81.85 - Offer of proof.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 45 Public Welfare 1 2011-10-01 2011-10-01 false Offer of proof. 81.85 Section 81.85 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION PRACTICE AND PROCEDURE FOR HEARINGS UNDER PART 80 OF THIS TITLE Hearing Procedures § 81.85 Offer of proof. An offer of proof made in connection with...
45 CFR 81.85 - Offer of proof.
Code of Federal Regulations, 2010 CFR
2010-10-01
... 45 Public Welfare 1 2010-10-01 2010-10-01 false Offer of proof. 81.85 Section 81.85 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION PRACTICE AND PROCEDURE FOR HEARINGS UNDER PART 80 OF THIS TITLE Hearing Procedures § 81.85 Offer of proof. An offer of proof made in connection with...
Using Sudoku to Introduce Proof Techniques
ERIC Educational Resources Information Center
Snyder, Brian A.
2010-01-01
In this article we show how the Sudoku puzzle and the three simple rules determining its solution can be used as an introduction to proof-based mathematics. In the completion of the puzzle, students can construct multi-step solutions that involve sequencing of steps, use methods such as backtracking and proof by cases, and proof by contradiction…
Key Ideas: What Are They and How Can They Help Us Understand How People View Proof?
ERIC Educational Resources Information Center
Raman, Manya
2003-01-01
Examines the views of proof held by university-level mathematics students and teachers. Develops a framework for characterizing people's views of proof based on a distinction between public and private aspects of proof and the key ideas that link these two domains. (Author/KHR)
Proof-Related Reasoning in High School Textbooks
ERIC Educational Resources Information Center
Johnson, Gwendolyn J.; Thompson, Denisse R.; Senk, Sharon L.
2010-01-01
Recognizing that textbooks play a prominent role in fostering students' understanding of reasoning and proof, the authors conducted a study to examine the extent to which textbooks used in U.S. high schools provide opportunities for students to encounter proof-related reasoning and how the nature of proof-related reasoning in textbooks varies by…
Code of Federal Regulations, 2010 CFR
2010-07-01
... participated onsite in the atmospheric detonation of a nuclear device. ... requisite period and proof of participation onsite during a period of atmospheric nuclear testing. 79.13... presence for the requisite period and proof of participation onsite during a period of atmospheric nuclear...
Code of Federal Regulations, 2012 CFR
2012-07-01
... requisite period and proof of participation onsite during a period of atmospheric nuclear testing. 79.13... presence for the requisite period and proof of participation onsite during a period of atmospheric nuclear... participated onsite in the atmospheric detonation of a nuclear device. ...
Code of Federal Regulations, 2014 CFR
2014-07-01
... requisite period and proof of participation onsite during a period of atmospheric nuclear testing. 79.13... presence for the requisite period and proof of participation onsite during a period of atmospheric nuclear... participated onsite in the atmospheric detonation of a nuclear device. ...
Code of Federal Regulations, 2013 CFR
2013-07-01
... requisite period and proof of participation onsite during a period of atmospheric nuclear testing. 79.13... presence for the requisite period and proof of participation onsite during a period of atmospheric nuclear... participated onsite in the atmospheric detonation of a nuclear device. ...
Code of Federal Regulations, 2011 CFR
2011-07-01
... requisite period and proof of participation onsite during a period of atmospheric nuclear testing. 79.13... presence for the requisite period and proof of participation onsite during a period of atmospheric nuclear... participated onsite in the atmospheric detonation of a nuclear device. ...
47 CFR 76.1704 - Proof-of-performance test data.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 47 Telecommunication 4 2012-10-01 2012-10-01 false Proof-of-performance test data. 76.1704 Section 76.1704 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Documents to be Maintained for Inspection § 76.1704 Proof-of-performance test data. (a) The proof of...
47 CFR 76.1704 - Proof-of-performance test data.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 47 Telecommunication 4 2014-10-01 2014-10-01 false Proof-of-performance test data. 76.1704 Section 76.1704 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) BROADCAST RADIO SERVICES MULTICHANNEL VIDEO AND CABLE TELEVISION SERVICE Documents to be Maintained for Inspection § 76.1704 Proof-of-performance test data. (a) The proof of...
28 CFR 79.34 - Proof of medical condition.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 28 Judicial Administration 2 2012-07-01 2012-07-01 false Proof of medical condition. 79.34 Section... COMPENSATION ACT Eligibility Criteria for Claims by Onsite Participants § 79.34 Proof of medical condition. Proof of medical condition under this subpart will be made in the same manner and according to the same...
28 CFR 79.34 - Proof of medical condition.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 28 Judicial Administration 2 2013-07-01 2013-07-01 false Proof of medical condition. 79.34 Section... COMPENSATION ACT Eligibility Criteria for Claims by Onsite Participants § 79.34 Proof of medical condition. Proof of medical condition under this subpart will be made in the same manner and according to the same...
39 CFR 501.5 - Burden of proof standard.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 39 Postal Service 1 2010-07-01 2010-07-01 false Burden of proof standard. 501.5 Section 501.5 Postal Service UNITED STATES POSTAL SERVICE POSTAGE PROGRAMS AUTHORIZATION TO MANUFACTURE AND DISTRIBUTE POSTAGE EVIDENCING SYSTEMS § 501.5 Burden of proof standard. The burden of proof is on the Postal Service...
28 CFR 79.34 - Proof of medical condition.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Proof of medical condition. 79.34 Section... COMPENSATION ACT Eligibility Criteria for Claims by Onsite Participants § 79.34 Proof of medical condition. Proof of medical condition under this subpart will be made in the same manner and according to the same...
12 CFR 1022.123 - Appropriate proof of identity.
Code of Federal Regulations, 2013 CFR
2013-01-01
... 12 Banks and Banking 8 2013-01-01 2013-01-01 false Appropriate proof of identity. 1022.123 Section...) Duties of Consumer Reporting Agencies Regarding Identity Theft § 1022.123 Appropriate proof of identity... information consumers shall provide to constitute proof of identity for purposes of sections 605A, 605B, and...
12 CFR 1022.123 - Appropriate proof of identity.
Code of Federal Regulations, 2014 CFR
2014-01-01
... 12 Banks and Banking 8 2014-01-01 2014-01-01 false Appropriate proof of identity. 1022.123 Section...) Duties of Consumer Reporting Agencies Regarding Identity Theft § 1022.123 Appropriate proof of identity... information consumers shall provide to constitute proof of identity for purposes of sections 605A, 605B, and...
12 CFR 1022.123 - Appropriate proof of identity.
Code of Federal Regulations, 2012 CFR
2012-01-01
... 12 Banks and Banking 8 2012-01-01 2012-01-01 false Appropriate proof of identity. 1022.123 Section...) Duties of Consumer Reporting Agencies Regarding Identity Theft § 1022.123 Appropriate proof of identity... information consumers shall provide to constitute proof of identity for purposes of sections 605A, 605B, and...
7 CFR 319.56-42 - Peppers from the Republic of Korea.
Code of Federal Regulations, 2011 CFR
2011-01-01
... Republic of Korea in insect-proof greenhouses approved by and registered with the National Plant Quarantine... approved production sites. The peppers must be safeguarded by an insect-proof mesh screen or plastic... peppers must be packed in insect-proof cartons or containers, or covered with insect-proof mesh or plastic...
Mathematicians' Perspectives on Features of a Good Pedagogical Proof
ERIC Educational Resources Information Center
Lai, Yvonne; Weber, Keith; Mejia-Ramos, Juan Pablo
2012-01-01
In this article, we report two studies investigating what mathematicians value in a pedagogical proof. Study 1 is a qualitative study of how eight mathematicians revised two proofs that would be presented in a course for mathematics majors. These mathematicians thought that introductory and concluding sentences should be included in the proofs,…
30 CFR 778.21 - Proof of publication.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 30 Mineral Resources 3 2013-07-01 2013-07-01 false Proof of publication. 778.21 Section 778.21....21 Proof of publication. A copy of the newspaper advertisements of the application for a permit, significant revision of a permit, or renewal of a permit, or proof of publication of the advertisements which...
38 CFR 8.20 - Proof of death, age, relationship and marriage.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 38 Pensions, Bonuses, and Veterans' Relief 1 2014-07-01 2014-07-01 false Proof of death, age... AFFAIRS NATIONAL SERVICE LIFE INSURANCE Proof of Death, Age, Or Relationship § 8.20 Proof of death, age, relationship and marriage. Whenever it is necessary for a claimant to prove death, age, relationship or...
38 CFR 8.20 - Proof of death, age, relationship and marriage.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 38 Pensions, Bonuses, and Veterans' Relief 1 2012-07-01 2012-07-01 false Proof of death, age... AFFAIRS NATIONAL SERVICE LIFE INSURANCE Proof of Death, Age, Or Relationship § 8.20 Proof of death, age, relationship and marriage. Whenever it is necessary for a claimant to prove death, age, relationship or...
38 CFR 8.20 - Proof of death, age, relationship and marriage.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 38 Pensions, Bonuses, and Veterans' Relief 1 2013-07-01 2013-07-01 false Proof of death, age... AFFAIRS NATIONAL SERVICE LIFE INSURANCE Proof of Death, Age, Or Relationship § 8.20 Proof of death, age, relationship and marriage. Whenever it is necessary for a claimant to prove death, age, relationship or...
29 CFR 1919.28 - Unit proof tests-cranes and gear accessory thereto.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 7 2010-07-01 2010-07-01 false Unit proof tests-cranes and gear accessory thereto. 1919.28... ADMINISTRATION, DEPARTMENT OF LABOR (CONTINUED) GEAR CERTIFICATION Certification of Vessels: Tests and Proof Loads; Heat Treatment; Competent Persons § 1919.28 Unit proof tests—cranes and gear accessory thereto...
43 CFR 3863.1-2 - Proof of improvements for patent.
Code of Federal Regulations, 2013 CFR
2013-10-01
... 43 Public Lands: Interior 2 2013-10-01 2013-10-01 false Proof of improvements for patent. 3863.1-2... MANAGEMENT, DEPARTMENT OF THE INTERIOR MINERALS MANAGEMENT (3000) MINERAL PATENT APPLICATIONS Placer Mining Claim Patent Applications § 3863.1-2 Proof of improvements for patent. The proof of improvements must...
43 CFR 3863.1-2 - Proof of improvements for patent.
Code of Federal Regulations, 2012 CFR
2012-10-01
... 43 Public Lands: Interior 2 2012-10-01 2012-10-01 false Proof of improvements for patent. 3863.1-2... MANAGEMENT, DEPARTMENT OF THE INTERIOR MINERALS MANAGEMENT (3000) MINERAL PATENT APPLICATIONS Placer Mining Claim Patent Applications § 3863.1-2 Proof of improvements for patent. The proof of improvements must...
43 CFR 3863.1-2 - Proof of improvements for patent.
Code of Federal Regulations, 2014 CFR
2014-10-01
... 43 Public Lands: Interior 2 2014-10-01 2014-10-01 false Proof of improvements for patent. 3863.1-2... MANAGEMENT, DEPARTMENT OF THE INTERIOR MINERALS MANAGEMENT (3000) MINERAL PATENT APPLICATIONS Placer Mining Claim Patent Applications § 3863.1-2 Proof of improvements for patent. The proof of improvements must...
43 CFR 3863.1-2 - Proof of improvements for patent.
Code of Federal Regulations, 2011 CFR
2011-10-01
... 43 Public Lands: Interior 2 2011-10-01 2011-10-01 false Proof of improvements for patent. 3863.1-2... MANAGEMENT, DEPARTMENT OF THE INTERIOR MINERALS MANAGEMENT (3000) MINERAL PATENT APPLICATIONS Placer Mining Claim Patent Applications § 3863.1-2 Proof of improvements for patent. The proof of improvements must...
Changing What You See by Changing What You Know: The Role of Attention
Lupyan, Gary
2017-01-01
Attending is a cognitive process that incorporates a person’s knowledge, goals, and expectations. What we perceive when we attend to one thing is different from what we perceive when we attend to something else. Yet, it is often argued that attentional effects do not count as evidence that perception is influenced by cognition. I investigate two arguments often given to justify excluding attention. The first is arguing that attention is a post-perceptual process reflecting selection between fully constructed perceptual representations. The second is arguing that attention as a pre-perceptual process that simply changes the input to encapsulated perceptual systems. Both of these arguments are highly problematic. Although some attentional effects can indeed be construed as post-perceptual, others operate by changing perceptual content across the entire visual hierarchy. Although there is a natural analogy between spatial attention and a change of input, the analogy falls apart when we consider other forms of attention. After dispelling these arguments, I make a case for thinking of attention not as a confound, but as one of the mechanisms by which cognitive states affect perception by going through cases in which the same or similar visual inputs are perceived differently depending on the observer’s cognitive state, and instances where cuing an observer using language affects what one sees. Lastly, I provide two compelling counter-examples to the critique that although cognitive influences on perception can be demonstrated in the laboratory, it is impossible to really experience them for oneself in a phenomenologically compelling way. Taken together, the current evidence strongly supports the thesis that what we know routinely influences what we see, that the same sensory input can be perceived differently depending on the current cognitive state of the viewer, and that phenomenologically salient demonstrations are possible if certain conditions are met. PMID:28507524
31 CFR 341.4 - Proof of purchase.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false Proof of purchase. 341.4 Section 341... BONDS § 341.4 Proof of purchase. At the time a Retirement Plan Bond is issued, the issuing agent will... name the bond is inscribed, to the registered owner as well, proof of the purchase on Form PD 3550. The...
Research-Based Interventions in the Area of Proof: The Past, the Present, and the Future
ERIC Educational Resources Information Center
Stylianides, Gabriel J.; Stylianides, Andreas J.
2017-01-01
The concept of "proof" has attracted considerable research attention over the past decades in part due to its indisputable importance to the discipline of mathematics and to students' learning of mathematics. Yet, the teaching and learning of proof is an instructionally arduous territory, with proof being recognized as a hard-to-teach…
Using Toulmin Analysis to Analyse an Instructor's Proof Presentation in Abstract Algebra
ERIC Educational Resources Information Center
Fukawa-Connelly, Timothy
2014-01-01
This paper provides a method for analysing undergraduate teaching of proof-based courses using Toulmin's model (1969) of argumentation. It presents a case study of one instructor's presentation of proofs. The analysis shows that the instructor presents different levels of detail in different proofs; thus, the students have an inconsistent set of…
Bridging the Gap between Graphical Arguments and Verbal-Symbolic Proofs in a Real Analysis Context
ERIC Educational Resources Information Center
Zazkis, Dov; Weber, Keith; Mejía-Ramos, Juan Pablo
2016-01-01
We examine a commonly suggested proof construction strategy from the mathematics education literature--that students first produce a graphical argument and then work to construct a verbal-symbolic proof based on that graphical argument. The work of students who produce such graphical arguments when solving proof construction tasks was analyzed to…
Should Proof Be Minimal? Ms T's Evaluation of Secondary School Students' Proofs
ERIC Educational Resources Information Center
Tsamir, Pessia; Tirosh, Dina; Dreyfus, Tommy; Barkai, Ruthi; Tabach, Michal
2009-01-01
Calls for reform in mathematics education around the world state that proofs should be part of school mathematics at all levels. Turning these calls into a reality falls on teachers' shoulders. This paper focuses on one secondary school teacher's reactions to students' suggested proofs and justifications in elementary number theory. To determine…
7 CFR 1.657 - What is the standard of proof?
Code of Federal Regulations, 2010 CFR
2010-01-01
... 7 Agriculture 1 2010-01-01 2010-01-01 false What is the standard of proof? 1.657 Section 1.657 Agriculture Office of the Secretary of Agriculture ADMINISTRATIVE REGULATIONS Conditions in FERC Hydropower Licenses Hearing, Briefing, and Decision § 1.657 What is the standard of proof? The standard of proof is a...
38 CFR 10.38 - Proof of age of veteran's child.
Code of Federal Regulations, 2014 CFR
2014-07-01
... 38 Pensions, Bonuses, and Veterans' Relief 1 2014-07-01 2014-07-01 false Proof of age of veteran's... ADJUSTED COMPENSATION Adjusted Compensation; General § 10.38 Proof of age of veteran's child. A child of a veteran shall be required to submit proof of age in accordance with the requirements set forth in the...
38 CFR 10.38 - Proof of age of veteran's child.
Code of Federal Regulations, 2012 CFR
2012-07-01
... 38 Pensions, Bonuses, and Veterans' Relief 1 2012-07-01 2012-07-01 false Proof of age of veteran's... ADJUSTED COMPENSATION Adjusted Compensation; General § 10.38 Proof of age of veteran's child. A child of a veteran shall be required to submit proof of age in accordance with the requirements set forth in the...
38 CFR 10.38 - Proof of age of veteran's child.
Code of Federal Regulations, 2013 CFR
2013-07-01
... 38 Pensions, Bonuses, and Veterans' Relief 1 2013-07-01 2013-07-01 false Proof of age of veteran's... ADJUSTED COMPENSATION Adjusted Compensation; General § 10.38 Proof of age of veteran's child. A child of a veteran shall be required to submit proof of age in accordance with the requirements set forth in the...
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-10
... DEPARTMENT OF THE TREASURY United States Mint Price for the American Eagle Silver Proof and... price of silver, the United States Mint is raising the price of its American Eagle Silver Proof and... price 2012 American Eagle Silver Proof $59.95 2012 American Eagle Silver Uncirculated 50.95 2011...
Ten Things to Consider when Teaching Proof
ERIC Educational Resources Information Center
Cirillo, Michelle
2009-01-01
As she sat in a high school geometry class and observed a beginning teacher, Matt (a pseudonym), teaching proof for the first time, the author was reminded of her own experiences in teaching formal proof to secondary school students. Matt seemed to struggle with some of the same challenges she encountered when she began teaching proof. For…
How Mathematicians Determine if an Argument Is a Valid Proof
ERIC Educational Resources Information Center
Weber, Keith
2008-01-01
The purpose of this article is to investigate the mathematical practice of proof validation--that is, the act of determining whether an argument constitutes a valid proof. The results of a study with 8 mathematicians are reported. The mathematicians were observed as they read purported mathematical proofs and made judgments about their validity;…
Shorter unentangled proofs for ground state connectivity
NASA Astrophysics Data System (ADS)
Caha, Libor; Nagaj, Daniel; Schwarz, Martin
2018-07-01
Can one considerably shorten a proof for a quantum problem by using a protocol with a constant number of unentangled provers? We consider a frustration-free variant of the sf {QCMA}-complete ground state connectivity (GSCON) problem for a system of size n with a proof of superlinear size. We show that we can shorten this proof in sf {QMA}(2): There exists a two-copy, unentangled proof with length of order n, up to logarithmic factors, while the completeness-soundness gap of the new protocol becomes a small inverse polynomial in n.
Kustatscher, Georg; Grabowski, Piotr; Rappsilber, Juri
2016-02-01
Subcellular localization is an important aspect of protein function, but the protein composition of many intracellular compartments is poorly characterized. For example, many nuclear bodies are challenging to isolate biochemically and thus remain inaccessible to proteomics. Here, we explore covariation in proteomics data as an alternative route to subcellular proteomes. Rather than targeting a structure of interest biochemically, we target it by machine learning. This becomes possible by taking data obtained for one organelle and searching it for traces of another organelle. As an extreme example and proof-of-concept we predict mitochondrial proteins based on their covariation in published interphase chromatin data. We detect about ⅓ of the known mitochondrial proteins in our chromatin data, presumably most as contaminants. However, these proteins are not present at random. We show covariation of mitochondrial proteins in chromatin proteomics data. We then exploit this covariation by multiclassifier combinatorial proteomics to define a list of mitochondrial proteins. This list agrees well with different databases on mitochondrial composition. This benchmark test raises the possibility that, in principle, covariation proteomics may also be applicable to structures for which no biochemical isolation procedures are available. © 2015 The Authors. Proteomics Published by WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Proponents of Creationism but not Proponents of Evolution Frame the Origins Debate in Terms of Proof
NASA Astrophysics Data System (ADS)
Barnes, Ralph M.; Church, Rebecca A.
2013-03-01
In Study 1, 72 internet documents containing creationism, ID (intelligent design), or evolution content were selected for analysis. All instances of proof cognates (the word "proof" and related terms such as "proven", "disproof", etc.) contained within these documents were identified and labeled in terms of the manner in which the terms were used. In Study 2, frequency counts for six terms (proof, evidence, establish, experiment, test, trial) were conducted on a sample of peer-reviewed research articles in the journal Science and the 72 internet documents included in Study 1. Quantitative and qualitative analyses revealed that proponents of creationism were much more likely than proponents of evolution to frame the creationism/evolution issue in terms of proof (ID proponents fell partway between the other two). Proponents of creationism frequently described empirical data favoring their position as proof of their position. Even more frequently, proponents of creationism described evolutionary scientists as being engaged in failed attempts to prove the truth of the evolutionary position. Evolution documents included fewer proof cognates than creationism or ID documents and the few proof cognates found in evolution documents were rarely used to describe the status of the theory of evolution. Qualitative data analysis indicated that proof cognates were often used to indicate certainty. The asymmetry between evolution and creationism documents was limited primarily to proof cognates; there were no major asymmetries for the terms evidence, establish, experiment, test, and trial. The results may reveal differences in the epistemological commitments of the involved parties.
A Historical Note on the Proof of the Area of a Circle
ERIC Educational Resources Information Center
Wilamowsky, Yonah; Epstein, Sheldon; Dickman, Bernard
2011-01-01
Proofs that the area of a circle is nr[superscript 2] can be found in mathematical literature dating as far back as the time of the Greeks. The early proofs, e.g. Archimedes, involved dividing the circle into wedges and then fitting the wedges together in a way to approximate a rectangle. Later more sophisticated proofs relied on arguments…
Code of Federal Regulations, 2010 CFR
2010-07-01
... years after first exposure, and proof of onset of a specified compensable disease more than five years... a specified compensable disease more than five years after first exposure. Absent any indication to... the specified compensable disease. Proof of the onset of leukemia shall be established in accordance...
Code of Federal Regulations, 2011 CFR
2011-07-01
... years after first exposure, and proof of onset of a specified compensable disease more than five years... a specified compensable disease more than five years after first exposure. Absent any indication to... the specified compensable disease. Proof of the onset of leukemia shall be established in accordance...
One Problem, Nine Student-Produced Proofs
ERIC Educational Resources Information Center
Birky, Geoffrey; Campbell, Connie M.; Raman, Manya; Sandefur, James; Somers, Kay
2011-01-01
This paper tells the story of what happened when students in the authors' sophomore-level introduction-to-proof classes were given a theorem to prove with no expectation about what proof method to use. The paper discusses the nine different student-produced proofs of the statement: If "n" is an integer such that "n" is greater than or equal to 3,…
29 CFR 1919.71 - Unit proof test and examination of cranes.
Code of Federal Regulations, 2011 CFR
2011-07-01
... 29 Labor 7 2011-07-01 2011-07-01 false Unit proof test and examination of cranes. 1919.71 Section... § 1919.71 Unit proof test and examination of cranes. (a) Unit proof tests of cranes shall be carried out at the following times: (1) In the cases of new cranes, before initial use and every 4 years...
Code of Federal Regulations, 2013 CFR
2013-07-01
... years after first exposure, and proof of onset of a specified compensable disease more than five years... a specified compensable disease more than five years after first exposure. Absent any indication to... the specified compensable disease. Proof of the onset of leukemia shall be established in accordance...
Code of Federal Regulations, 2014 CFR
2014-07-01
... years after first exposure, and proof of onset of a specified compensable disease more than five years... a specified compensable disease more than five years after first exposure. Absent any indication to... the specified compensable disease. Proof of the onset of leukemia shall be established in accordance...
Code of Federal Regulations, 2012 CFR
2012-07-01
... years after first exposure, and proof of onset of a specified compensable disease more than five years... a specified compensable disease more than five years after first exposure. Absent any indication to... the specified compensable disease. Proof of the onset of leukemia shall be established in accordance...
29 CFR 1919.71 - Unit proof test and examination of cranes.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 29 Labor 7 2010-07-01 2010-07-01 false Unit proof test and examination of cranes. 1919.71 Section... § 1919.71 Unit proof test and examination of cranes. (a) Unit proof tests of cranes shall be carried out at the following times: (1) In the cases of new cranes, before initial use and every 4 years...
Code of Federal Regulations, 2011 CFR
2011-04-01
... determination of proof for spirits containing solids of 400 milligrams or less per 100 milliliters. 30.71... determination of proof for spirits containing solids of 400 milligrams or less per 100 milliliters. The proof of... containing solids of 400 milligrams or less per 100 milliliters shall be determined by the use of a...
Code of Federal Regulations, 2010 CFR
2010-04-01
... determination of proof for spirits containing solids of 400 milligrams or less per 100 milliliters. 30.71... determination of proof for spirits containing solids of 400 milligrams or less per 100 milliliters. The proof of... containing solids of 400 milligrams or less per 100 milliliters shall be determined by the use of a...
NASA Astrophysics Data System (ADS)
Benfenati, Francesco; Beretta, Gian Paolo
2018-04-01
We show that to prove the Onsager relations using the microscopic time reversibility one necessarily has to make an ergodic hypothesis, or a hypothesis closely linked to that. This is true in all the proofs of the Onsager relations in the literature: from the original proof by Onsager, to more advanced proofs in the context of linear response theory and the theory of Markov processes, to the proof in the context of the kinetic theory of gases. The only three proofs that do not require any kind of ergodic hypothesis are based on additional hypotheses on the macroscopic evolution: Ziegler's maximum entropy production principle (MEPP), the principle of time reversal invariance of the entropy production, or the steepest entropy ascent principle (SEAP).
An Empirical Evaluation of Automated Theorem Provers in Software Certification
NASA Technical Reports Server (NTRS)
Denney, Ewen; Fischer, Bernd; Schumann, Johann
2004-01-01
We describe a system for the automated certification of safety properties of NASA software. The system uses Hoare-style program verification technology to generate proof obligations which are then processed by an automated first-order theorem prover (ATP). We discuss the unique requirements this application places on the ATPs, focusing on automation, proof checking, and usability. For full automation, however, the obligations must be aggressively preprocessed and simplified, and we demonstrate how the individual simplification stages, which are implemented by rewriting, influence the ability of the ATPs to solve the proof tasks. Our results are based on 13 certification experiments that lead to more than 25,000 proof tasks which have each been attempted by Vampire, Spass, e-setheo, and Otter. The proofs found by Otter have been proof-checked by IVY.
Microelectromechanical inertial sensor
Okandan, Murat [Edgewood, NM; Nielson, Gregory N [Albuquerque, NM
2012-06-26
A microelectromechanical (MEM) inertial sensor is disclosed which can be used to sense a linear acceleration, or a Coriolis acceleration due to an angular rotation rate, or both. The MEM inertial sensor has a proof mass which is supported on a bridge extending across an opening through a substrate, with the proof mass being balanced on the bridge by a pivot, or suspended from the bridge by the pivot. The proof mass can be oscillated in a tangential direction in the plane of the substrate, with any out-of-plane movement of the proof mass in response to a sensed acceleration being optically detected using transmission gratings located about an outer edge of the proof mass to generate a diffracted light pattern which changes with the out-of-plane movement of the proof mass.
Non-Abelian clouds around Reissner-Nordström black holes: The existence line
NASA Astrophysics Data System (ADS)
Radu, Eugen; Tchrakian, D. H.; Yang, Yisong
2016-06-01
A known feature of electrically charged Reissner-Nordström-anti-de Sitter planar black holes is that they can become unstable when considered as solutions of Einstein-Yang-Mills theory. The mechanism for this is that the linearized Yang-Mills equations in the background of the Reissner-Nordström (RN) black holes possess a normalizable zero mode, resulting in non-Abelian (nA) magnetic clouds near the horizon. In this work we show that the same pattern may occur also for asymptotically flat RN black holes. Different from the anti-de Sitter case, in the Minkowskian background the prerequisites for the existence of the nA clouds are (i) a large enough gauge group, and (ii) the presence of some extra interaction terms in the matter Lagrangian. To illustrate this mechanism we present two specific examples, one in four- and the other in five-dimensional asymptotically flat spacetime. In the first case, we augment the usual S U (3 ) Yang-Mills Lagrangian with a higher-order (quartic) curvature term, while for the second one we add the Chern-Simons density to the S O (6 ) Yang-Mills system. In both cases, an Abelian gauge symmetry is spontaneously broken near a RN black hole horizon with the appearance of a condensate of nA gauge fields. In addition to these two examples, we review the corresponding picture for anti-de Sitter black holes. All these solutions are studied both analytically and numerically, existence proofs being provided for nA clouds in the background of RN black holes. The proofs use shooting techniques which are suggested by and in turn offer insights for our numerical methods. They indicate that, for a black hole of given mass, appropriate electric charge values are required to ensure the existence of solutions interpolating desired boundary behavior at the horizons and spatial infinity.
Claessens, Jacqueline; Schram-Bijkerk, Dieneke; Dirven-van Breemen, Liesbet; Otte, Piet; van Wijnen, Harm
2014-07-01
One of the effects of climate change expected to take place in urban areas in the Netherlands is an increase in periods of extreme heat and drought. How the soil can contribute to making cities more climate proof is often neglected. Unsealed soil and green spaces increase water storage capacity and can consequently prevent flooding. The planning of public or private green spaces can have a cooling effect and, in general, have a positive effect on how people perceive their health. This paper reviews existing guidelines from Dutch policy documents regarding unsealed soil and green spaces in the Netherlands; do they support climate adaptation policies? Scientific literature was used to quantify the positive effects of green spaces on water storage capacity, cooling and public health. Finally we present a case study of a model town where different policy areas are linked together. Maps were made to provide insight into the ratio of unsealed soil and the number of green spaces in relation to existing guidelines using Geographical Information Systems (GIS). Maps marking the age and social-economic status of the population were also made. The benefits of green spaces are difficult to express in averages because they depend on many different factors such as soil properties, type of green spaces, population characteristics and spatial planning. Moreover, it is not possible to provide quantifications of the benefits of green spaces because of a lack of scientific evidence at the moment. Based on the maps, however, policy assessments can be made, for example, in which site a neighborhood will most benefit from investment in parks and public gardens. Neighborhoods where people have a low social-economic status have for example fewer green spaces than others. This offers opportunities for efficient adaptation policies linking goals of several policy fields. Copyright © 2014 Elsevier B.V. All rights reserved.
ECC-based grouping-proof RFID for inpatient medication safety.
Lin, Qiping; Zhang, Fangguo
2012-12-01
Several papers were proposed in which symmetric cryptography was used to design RFID grouping-proof for medication safety in the Journal of Medical Systems. However, if we want to ensure privacy, authentication and protection against the tracking of RFID-tags without losing system scalability, we must design an asymmetric cryptography-based RFID. This paper will propose a new ECC-based grouping-proof for RFID. Our ECC-based grouping-proof reduces the computation of tags and prevents timeout problems from occurring in n-party grouping-proof protocol. Based on asymmetric cryptography, the proposed scheme is practical, secure and efficient for medication applications.
31 CFR 306.75 - Individual fiduciaries.
Code of Federal Regulations, 2012 CFR
2012-07-01
... fiduciaries must be supported by appropriate proof. This requires: (1) Proof of the death, resignation... apply. (Form PD 2446 may be used to furnish proof of incumbency of fiduciaries.) Assignments by...
31 CFR 306.75 - Individual fiduciaries.
Code of Federal Regulations, 2011 CFR
2011-07-01
... fiduciaries must be supported by appropriate proof. This requires: (1) Proof of the death, resignation... apply. (Form PD 2446 may be used to furnish proof of incumbency of fiduciaries.) Assignments by...
31 CFR 306.75 - Individual fiduciaries.
Code of Federal Regulations, 2013 CFR
2013-07-01
... fiduciaries must be supported by appropriate proof. This requires: (1) Proof of the death, resignation... apply. (Form PD 2446 may be used to furnish proof of incumbency of fiduciaries.) Assignments by...
31 CFR 306.75 - Individual fiduciaries.
Code of Federal Regulations, 2014 CFR
2014-07-01
... fiduciaries must be supported by appropriate proof. This requires: (1) Proof of the death, resignation... apply. (Form PD 2446 may be used to furnish proof of incumbency of fiduciaries.) Assignments by...
31 CFR 306.75 - Individual fiduciaries.
Code of Federal Regulations, 2010 CFR
2010-07-01
... fiduciaries must be supported by appropriate proof. This requires: (1) Proof of the death, resignation... apply. (Form PD 2446 may be used to furnish proof of incumbency of fiduciaries.) Assignments by...
ERIC Educational Resources Information Center
Fiallo, Jorge; Gutiérrez, Angel
2017-01-01
We present results from a classroom-based intervention designed to help a class of grade 10 students (14-15 years old) learn proof while studying trigonometry in a dynamic geometry software environment. We analysed some students' solutions to conjecture-and-proof problems that let them gain experience in stating conjectures and developing proofs.…
NASA Technical Reports Server (NTRS)
Aspinall, David; Denney, Ewen; Lueth, Christoph
2012-01-01
We motivate and introduce a query language PrQL designed for inspecting machine representations of proofs. PrQL natively supports hiproofs which express proof structure using hierarchical nested labelled trees. The core language presented in this paper is locally structured (first-order), with queries built using recursion and patterns over proof structure and rule names. We define the syntax and semantics of locally structured queries, demonstrate their power, and sketch some implementation experiments.
Putting time into proof outlines
NASA Technical Reports Server (NTRS)
Schneider, Fred B.; Bloom, Bard; Marzullo, Keith
1993-01-01
A logic for reasoning about timing properties of concurrent programs is presented. The logic is based on Hoare-style proof outlines and can handle maximal parallelism as well as certain resource-constrained execution environments. The correctness proof for a mutual exclusion protocol that uses execution timings in a subtle way illustrates the logic in action. A soundness proof using structural operational semantics is outlined in the appendix.
NASA Astrophysics Data System (ADS)
Demiray, Esra; Işıksal Bostan, Mine
2017-03-01
The purposes of this study are to investigate whether pre-service middle school mathematics teachers evaluate discussions in the cases regarding proof by contradiction correctly, to what extent they explain their correct evaluations by referring to proof by contradiction, and the reasons of their misinterpretations of discussions in the cases regarding proof by contradiction. Data were collected from pre-service middle school mathematics teachers enrolled in a state university in Ankara, Turkey, by asking them to evaluate discussions in two cases related to proof by contradiction. In data analysis, descriptive statistics and item-based analysis were employed. The results of the study indicated that pre-service middle school mathematics teachers are successful in evaluating discussions in the cases regarding proof by contradiction. In terms of year level, it was found that the percentage of the second year students' correct answers was the lowest in both cases. Moreover, the first year students were the most successful group in the first case, and the third year students were the most successful group in the second case. Nearly half of the students explained their correct answers by referring to proof by contradiction in the first case while the percentage of students who explained their correct answers by mentioning proof by contradiction in the second case was considerably low. When incorrect answers of pre-service middle school mathematics teachers were analyzed, two reasons of their misinterpretations of discussions were emerged as "misunderstanding of the assumption" and "perceiving proof as unnecessary".
Decidability of formal theories and hyperincursivity theory
NASA Astrophysics Data System (ADS)
Grappone, Arturo G.
2000-05-01
This paper shows the limits of the Proof Standard Theory (briefly, PST) and gives some ideas of how to build a proof anticipatory theory (briefly, PAT) that has no such limits. Also, this paper considers that Gödel's proof of the undecidability of Principia Mathematica formal theory is not valid for axiomatic theories that use a PAT to build their proofs because the (hyper)incursive functions are self-representable.
ERIC Educational Resources Information Center
Demiray, Esra; Isiksal Bostan, Mine
2017-01-01
The purposes of this study are to investigate Turkish pre-service middle school mathematics teachers' ability in conducting valid proofs for statements regarding numbers and algebra in terms of their year of enrollment in a teacher education program, to determine the proof methods used in their valid proofs, and to examine the reasons for their…
Proof of factorization using background field method of QCD
NASA Astrophysics Data System (ADS)
Nayak, Gouranga C.
2010-02-01
Factorization theorem plays the central role at high energy colliders to study standard model and beyond standard model physics. The proof of factorization theorem is given by Collins, Soper and Sterman to all orders in perturbation theory by using diagrammatic approach. One might wonder if one can obtain the proof of factorization theorem through symmetry considerations at the lagrangian level. In this paper we provide such a proof.
Proof of factorization using background field method of QCD
DOE Office of Scientific and Technical Information (OSTI.GOV)
Nayak, Gouranga C.
Factorization theorem plays the central role at high energy colliders to study standard model and beyond standard model physics. The proof of factorization theorem is given by Collins, Soper and Sterman to all orders in perturbation theory by using diagrammatic approach. One might wonder if one can obtain the proof of factorization theorem through symmetry considerations at the lagrangian level. In this paper we provide such a proof.