Ethnic assertions worldwide have assumed different forms ranging from moderate methods of articulation of autonomy to extremist means of violent struggle. Resort to extremism by some sections of an ethnic group usuall...Ethnic assertions worldwide have assumed different forms ranging from moderate methods of articulation of autonomy to extremist means of violent struggle. Resort to extremism by some sections of an ethnic group usually triggers inter-ethnic conflicts with other groups on the one hand and leads to confrontation with the state on the other. This paper seeks to examine the dynamics of this phenomenon in the context of Bodos, the largest plains tribe of Assam, a State of Northeast India. The paper enquires as to whether extremist politics has met the Bodo aspirations for self-determination or has intensified the conflicts and contradictions within the Bodo society with ramifications for other ethnic groups inhabiting the Bodo-dominated areas. It is also necessary to explore the responses of the Union and State governments to Bodo extremist politics for an understanding of the conflict management process.展开更多
John Dryden’s poem Mac Flecknoe satirizes his literary enemy Thomas Shadwell by the aid of the image of Flecknoewhile it reveals some of his literature assertions.This paper tries to expound them from the following t...John Dryden’s poem Mac Flecknoe satirizes his literary enemy Thomas Shadwell by the aid of the image of Flecknoewhile it reveals some of his literature assertions.This paper tries to expound them from the following three perspectives:the attitudes towards Ben Johnson,the proposals for drama language and the selection,and the attitudes towards French classicism forthe purpose of a further understanding about John Dryden.展开更多
Mining from simulation data of the golden model in hardware design verification is an effective solution to assertion generation.While the simulation data is inherently incomplete,it is necessary to evaluate the truth...Mining from simulation data of the golden model in hardware design verification is an effective solution to assertion generation.While the simulation data is inherently incomplete,it is necessary to evaluate the truth values of the mined assertions.This paper presents an approach to evaluating and constraining hardware assertions with absent scenarios.A Belief-fail Rate metric is proposed to predict the truth/falseness of generated assertions.By considering both the occurrences of free variable assignments and the conflicts of absent scenarios,we use the metric to sort true assertions in higher ranking and false assertions in lower ranking.Our Belief-failRate guided assertion constraining method leverages the quality of generated assertions.The experimental results show that the Belief-failRate framework performs better than the existing methods.In addition,the assertion evaluating and constraining procedure can find more assertions that cover new design functionality in comparison with the previous methods.展开更多
A method using quantifier-elimination is proposed for automatically generating program invariants/inductive assertions. Given a program, inductive assertions, hypothesized as parameterized formulas in a theory, are as...A method using quantifier-elimination is proposed for automatically generating program invariants/inductive assertions. Given a program, inductive assertions, hypothesized as parameterized formulas in a theory, are associated with program locations. Parameters in inductive assertions are discovered by generating constraints on parameters by ensuring that an inductive assertion is indeed preserved by all execution paths leading to the associated location of the program. The method can be used to discover loop invariants-properties of variables that remain invariant at the entry of a loop. The parameterized formula can be successively refined by considering execution paths one by one; heuristics can be developed for determining the order in which the paths are considered. Initialization of program variables as well as the precondition and postcondition, if available, can also be used to further refine the hypothesized invariant. The method does not depend on the availability of the precondition and postcondition of a program. Constraints on parameters generated in this way are solved for possible values of parameters. If no solution is possible, this means that an invariant of the hypothesized form is not likely to exist for the loop under the assumptions/approximations made to generate the associated verification condition. Otherwise, if the parametric constraints are solvable, then under certain conditions on methods for generating these constraints, the strongest possible invariant of the hypothesized form can be generated from most general solutions of the parametric constraints. The approach is illustrated using the logical languages of conjunction of polynomial equations as well as Presburger arithmetic for expressing assertions.展开更多
G.Brewka presented a modified default logic (CDL) and obtained some properties of CDL,such as the existence of extensions,semimonotonicity,which the Reiters normal default logic shares.The Reiter’s default has been g...G.Brewka presented a modified default logic (CDL) and obtained some properties of CDL,such as the existence of extensions,semimonotonicity,which the Reiters normal default logic shares.The Reiter’s default has been generalized,a default logic about assertion’s has been obtained,and the assertion that the Brewka’s CDL is a special normal default logic of the new version has been proved.展开更多
To promote the efficiency of knowledge base retrieval based on description logic, the concept of assertional graph (AG), which is directed labeled graph, is defined and a new AG-based retrieval method is put forward...To promote the efficiency of knowledge base retrieval based on description logic, the concept of assertional graph (AG), which is directed labeled graph, is defined and a new AG-based retrieval method is put forward. This method converts the knowledge base and query clause into knowledge AG and query AG by making use of the given rules and then makes use of graph traversal to carry out knowledge base retrieval. The experiment indicates that the efficiency of this method exceeds, respectively, the popular RACER and KAON2 system by 0.4% and 3.3%. This method can obviously promote the efficiency of knowledge base retrieval.展开更多
This document presents an extension of the multiple factorial analysis to symbolic data and especially to space data. The analysis makes use of the characteristic coding method to obtain active individuals and the rec...This document presents an extension of the multiple factorial analysis to symbolic data and especially to space data. The analysis makes use of the characteristic coding method to obtain active individuals and the reconstitutive coding method for additional individuals in order to conserve the variability of assertion objects. Traditional analysis methods of the main components are applied to coded objects. Certain interpretation aids are presented after the coding process. This method was applied to poverty data.展开更多
Traditional approach of design by contract, due to mixing the contract code with application code, is difficult for the extensibility and reusability of software system. This paper presents a framework named JADBC for...Traditional approach of design by contract, due to mixing the contract code with application code, is difficult for the extensibility and reusability of software system. This paper presents a framework named JADBC for design by contract based on Aspect-Oriented Programming (AOP) to resolve these problems. By providing a new modularized element, aspect, the framework successfully separates the contracts in design by contract, from functional codes. The implementation of this framework is based on dynamic AOP which can have the contract changed at rtmtime, consequently, enhancing program flexibility. JADBC framework modularizes the contracts in a clear-cut fashion that is easier to design, implement, and maintain.展开更多
For the past three decades, interoperability among heterogeneous systems had been a hard nut to crack due to the schematic and semantic perspectives that exist between objects. These systems were built under different...For the past three decades, interoperability among heterogeneous systems had been a hard nut to crack due to the schematic and semantic perspectives that exist between objects. These systems were built under different data models. As such, levels of the local schemas are semantically very poor due to the limited expressiveness of traditional data models in which they were designed. Further more, most of the existing schema integration architectural components are inadequately equipped to handle the mapping schemas, especially when the semantics and structural conflicts are involved. This paper introduces an Intelligent Binary Schema Matching system (IBSMS), which exploits the phenomenon of making its components intelligent. That’s equipping its components such as translators and integrators with adequate knowledge about various data models. This allows the components acquire enough intelligence to maneuver or manipulate the correspondence between constructs from different models. In addition, the system has a Binary Matcher, which compares the attribute correspondences of various databases in a pairwise form, in order to establish the equivalences. With the establishment of the mappings, the users shall be able to access them (mappings) for their desired usage.展开更多
Dependable computer based systems employing fault tolerance and robust software development techniques demand additional error detection and recovery related tasks. This results in tangling of core functionality with ...Dependable computer based systems employing fault tolerance and robust software development techniques demand additional error detection and recovery related tasks. This results in tangling of core functionality with these cross cutting non-functional concerns. In this regard current work identifies these dependability related non-functional and cross-cutting concerns and proposes design and implementation solutions in an aspect oriented framework that modularizes and separates them from core functionality. The degree of separation has been quantified using software metrics. A Lego NXT Robot based case study has been completed to evaluate the proposed design framework.展开更多
Objective: This article aimed to evaluate the effects of an educational intervention programme on improving peer educator (PE) knowledge in issues around growth and development and its risk behavior problems of ado...Objective: This article aimed to evaluate the effects of an educational intervention programme on improving peer educator (PE) knowledge in issues around growth and development and its risk behavior problems of adolescents in Indonesia. Methods: The study was conducted in 31 of PEs to evaluate their knowledge in adolescents. The PEs received health education and were assessed by individual work during the structured three-week programme. Data were collected before and after the training programme as pre- and post-tests. Results: The PE demonstrated significant improvements in their knowledge after attending the three-week structured training programme. The post-test scores had significant effects on the dimensions of PE knowledge scores. The PE become knowledgeable to maintain and monitor adolescents health issues around growth and development and its risk behavior problems of adolescents. Conclusions: The PE become knowledgeable to respond to the adolescent problems and readiness to become PE during puberty.展开更多
文摘Ethnic assertions worldwide have assumed different forms ranging from moderate methods of articulation of autonomy to extremist means of violent struggle. Resort to extremism by some sections of an ethnic group usually triggers inter-ethnic conflicts with other groups on the one hand and leads to confrontation with the state on the other. This paper seeks to examine the dynamics of this phenomenon in the context of Bodos, the largest plains tribe of Assam, a State of Northeast India. The paper enquires as to whether extremist politics has met the Bodo aspirations for self-determination or has intensified the conflicts and contradictions within the Bodo society with ramifications for other ethnic groups inhabiting the Bodo-dominated areas. It is also necessary to explore the responses of the Union and State governments to Bodo extremist politics for an understanding of the conflict management process.
文摘John Dryden’s poem Mac Flecknoe satirizes his literary enemy Thomas Shadwell by the aid of the image of Flecknoewhile it reveals some of his literature assertions.This paper tries to expound them from the following three perspectives:the attitudes towards Ben Johnson,the proposals for drama language and the selection,and the attitudes towards French classicism forthe purpose of a further understanding about John Dryden.
基金supported in part by the National Natural Science Foundation of China under Grant Nos.61876173,61432017,and 61532017.
文摘Mining from simulation data of the golden model in hardware design verification is an effective solution to assertion generation.While the simulation data is inherently incomplete,it is necessary to evaluate the truth values of the mined assertions.This paper presents an approach to evaluating and constraining hardware assertions with absent scenarios.A Belief-fail Rate metric is proposed to predict the truth/falseness of generated assertions.By considering both the occurrences of free variable assignments and the conflicts of absent scenarios,we use the metric to sort true assertions in higher ranking and false assertions in lower ranking.Our Belief-failRate guided assertion constraining method leverages the quality of generated assertions.The experimental results show that the Belief-failRate framework performs better than the existing methods.In addition,the assertion evaluating and constraining procedure can find more assertions that cover new design functionality in comparison with the previous methods.
基金This research was partially supported by an National Science Foundation(NSF)Information Technology Research(ITR)award CCR-0113611an NSF award CCR-0203051.
文摘A method using quantifier-elimination is proposed for automatically generating program invariants/inductive assertions. Given a program, inductive assertions, hypothesized as parameterized formulas in a theory, are associated with program locations. Parameters in inductive assertions are discovered by generating constraints on parameters by ensuring that an inductive assertion is indeed preserved by all execution paths leading to the associated location of the program. The method can be used to discover loop invariants-properties of variables that remain invariant at the entry of a loop. The parameterized formula can be successively refined by considering execution paths one by one; heuristics can be developed for determining the order in which the paths are considered. Initialization of program variables as well as the precondition and postcondition, if available, can also be used to further refine the hypothesized invariant. The method does not depend on the availability of the precondition and postcondition of a program. Constraints on parameters generated in this way are solved for possible values of parameters. If no solution is possible, this means that an invariant of the hypothesized form is not likely to exist for the loop under the assumptions/approximations made to generate the associated verification condition. Otherwise, if the parametric constraints are solvable, then under certain conditions on methods for generating these constraints, the strongest possible invariant of the hypothesized form can be generated from most general solutions of the parametric constraints. The approach is illustrated using the logical languages of conjunction of polynomial equations as well as Presburger arithmetic for expressing assertions.
基金Project supported by the High Technology Research and Development Program of China.
文摘G.Brewka presented a modified default logic (CDL) and obtained some properties of CDL,such as the existence of extensions,semimonotonicity,which the Reiters normal default logic shares.The Reiter’s default has been generalized,a default logic about assertion’s has been obtained,and the assertion that the Brewka’s CDL is a special normal default logic of the new version has been proved.
基金The National Natural Science Foundation of China(No.69975010,60374054),the National Research Foundation for the Doctoral Program of Higher Education of China (No.20050007023).
文摘To promote the efficiency of knowledge base retrieval based on description logic, the concept of assertional graph (AG), which is directed labeled graph, is defined and a new AG-based retrieval method is put forward. This method converts the knowledge base and query clause into knowledge AG and query AG by making use of the given rules and then makes use of graph traversal to carry out knowledge base retrieval. The experiment indicates that the efficiency of this method exceeds, respectively, the popular RACER and KAON2 system by 0.4% and 3.3%. This method can obviously promote the efficiency of knowledge base retrieval.
文摘This document presents an extension of the multiple factorial analysis to symbolic data and especially to space data. The analysis makes use of the characteristic coding method to obtain active individuals and the reconstitutive coding method for additional individuals in order to conserve the variability of assertion objects. Traditional analysis methods of the main components are applied to coded objects. Certain interpretation aids are presented after the coding process. This method was applied to poverty data.
基金the National Natural Science Foundation of China (60773006)the Specialized Research Fund for the Doctoral Program of Higher Education of China (20060486045)
文摘Traditional approach of design by contract, due to mixing the contract code with application code, is difficult for the extensibility and reusability of software system. This paper presents a framework named JADBC for design by contract based on Aspect-Oriented Programming (AOP) to resolve these problems. By providing a new modularized element, aspect, the framework successfully separates the contracts in design by contract, from functional codes. The implementation of this framework is based on dynamic AOP which can have the contract changed at rtmtime, consequently, enhancing program flexibility. JADBC framework modularizes the contracts in a clear-cut fashion that is easier to design, implement, and maintain.
文摘For the past three decades, interoperability among heterogeneous systems had been a hard nut to crack due to the schematic and semantic perspectives that exist between objects. These systems were built under different data models. As such, levels of the local schemas are semantically very poor due to the limited expressiveness of traditional data models in which they were designed. Further more, most of the existing schema integration architectural components are inadequately equipped to handle the mapping schemas, especially when the semantics and structural conflicts are involved. This paper introduces an Intelligent Binary Schema Matching system (IBSMS), which exploits the phenomenon of making its components intelligent. That’s equipping its components such as translators and integrators with adequate knowledge about various data models. This allows the components acquire enough intelligence to maneuver or manipulate the correspondence between constructs from different models. In addition, the system has a Binary Matcher, which compares the attribute correspondences of various databases in a pairwise form, in order to establish the equivalences. With the establishment of the mappings, the users shall be able to access them (mappings) for their desired usage.
文摘Dependable computer based systems employing fault tolerance and robust software development techniques demand additional error detection and recovery related tasks. This results in tangling of core functionality with these cross cutting non-functional concerns. In this regard current work identifies these dependability related non-functional and cross-cutting concerns and proposes design and implementation solutions in an aspect oriented framework that modularizes and separates them from core functionality. The degree of separation has been quantified using software metrics. A Lego NXT Robot based case study has been completed to evaluate the proposed design framework.
基金supported by the Ministry of Research,Technology,and Higher Education(Kementerian Riset,Teknologi,dan Pendidikan Tinggi/KEMENRISTEK-DIKTI)at the expense of Hibah Bersaing Research 2016
文摘Objective: This article aimed to evaluate the effects of an educational intervention programme on improving peer educator (PE) knowledge in issues around growth and development and its risk behavior problems of adolescents in Indonesia. Methods: The study was conducted in 31 of PEs to evaluate their knowledge in adolescents. The PEs received health education and were assessed by individual work during the structured three-week programme. Data were collected before and after the training programme as pre- and post-tests. Results: The PE demonstrated significant improvements in their knowledge after attending the three-week structured training programme. The post-test scores had significant effects on the dimensions of PE knowledge scores. The PE become knowledgeable to maintain and monitor adolescents health issues around growth and development and its risk behavior problems of adolescents. Conclusions: The PE become knowledgeable to respond to the adolescent problems and readiness to become PE during puberty.