Dissertations / Theses on the topic 'Core logics'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Core logics.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Ng, Yat Sze. "At the Intersection of Fintech and Strategy: Case Studies of the Competitive Strategies of Fintech Platforms." Thesis, The University of Sydney, 2022. https://hdl.handle.net/2123/29360.
Full textChen, Fei. "Enabling system validation for the many-core supercomputer." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 208 p, 2009. http://proquest.umi.com/pqdweb?did=1891590561&sid=7&Fmt=2&clientId=8331&RQT=309&VName=PQD.
Full textWalker, Douglas H. "Women in ministry: The logical core of the debate." TRINITY INTERNATIONAL UNIVERSITY, 2012. http://pqdtopen.proquest.com/#viewpdf?dispub=3487789.
Full textDomingues, Miguel Brazão. "Core language for web applications." Master's thesis, Faculdade de Ciências e Tecnologia, 2010. http://hdl.handle.net/10362/5103.
Full textWeb applications have a very high demand for rapid development and constant change. Several languages were created for this kind of applications, which are very flexible but many times trade the benefits of strongly-typed programming languages by untyped interpreted languages. With this kind of languages the interaction between different layers in a web application is usually developed using dialects and programming conventions with no real mechanical verifications between the client and server sides, and the SQL code within the application and the database. We present a typed core language for web applications that integrates the typing of the interface definition, business logic, and database manipulation representing these interactions at a high abstract level. Using only one language, typed and with its own instructions to define the interface and the interaction with the database, becomes possible to make static checks. Thereby, avoiding execution errors caused by the usual heterogeneity among web applications. We also describe the implementation of a prototype with a highly flexible programming environment for our language that allows the application development and publishing tasks to be done through a web interface, interacting directly with the application and without loosing the integrity checks. This kind of development relies on an agile development methodology. Therefore, the modifications made to the application are made active using the dynamic reconfiguration mechanism, avoiding the recompilation of the application and system restart.
Han, Yi. "A high-performance CMOS programmable logic core for system-on-chip applications /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/5948.
Full textHaftmann, Florian. "Code generation from specifications in higher-order logic." kostenfrei, 2009. https://mediatum2.ub.tum.de/node?id=886023.
Full textDavis, Justin S. "An FPGA-based digital logic core for ATE support and embedded test applications." Diss., Georgia Institute of Technology, 2003. http://hdl.handle.net/1853/15639.
Full textSeater, Robert Morrison. "Core extraction and non-example generation : debugging and understanding logical models." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/34127.
Full textIncludes bibliographical references (p. 127-132).
Declarative models, in which conjunction and negation are freely used, are a powerful tool for software specification and verification. Unfortunately, tool support for developing and debugging such models is limited. The challenges to developing such tools are twofold: technical information must be extracted from the model, then that information must be presented to the user in way that is both meaningful and manageable. This document introduces two such techniques to help fill the gap. Non-example generation allows the user to ask for the role of a particular subformula in a model. A formula's role is explained in terms of how the set of satisfying solutions to the model would change were that subformula removed or altered. Core extraction helps detect and localize unintentional overconstraint, in which real counterexamples are masked by bugs in the model. It leverages recent advances in SAT solvers to identify irrelevant portions of an unsatisfiable model. Experiences are reported from applying these two techniques to a variety of existing models.
by Robert Morrison Seater.
S.M.
Mathur, Garima. "Fuzzy logic control for infant-incubator systems." University of Akron / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=akron1153768682.
Full textMéndez, Real Maria. "Spatial Isolation against Logical Cache-based Side-Channel Attacks in Many-Core Architectures." Thesis, Lorient, 2017. http://www.theses.fr/2017LORIS454/document.
Full textThe technological evolution and the always increasing application performance demand have made of many-core architectures the necessary new trend in processor design. These architectures are composed of a large number of processing resources (hundreds or more) providing massive parallelism and high performance. Indeed, many-core architectures allow a wide number of applications coming from different sources, with a different level of sensitivity and trust, to be executed in parallel sharing physical resources such as computation, memory and communication infrastructure. However, this resource sharing introduces important security vulnerabilities. In particular, sensitive applications sharing cache memory with potentially malicious applications are vulnerable to logical cache-based side-channel attacks. These attacks allow an unprivileged application to access sensitive information manipulated by other applications despite partitioning methods such as memory protection and virtualization. While a lot of efforts on countering these attacks on multi-core architectures have been done, these have not been designed for recently emerged many-core architectures and require to be evaluated, and/or revisited in order to be practical for these new technologies. In this thesis work, we propose to enhance the operating system services with security-aware application deployment and resource allocation mechanisms in order to protect sensitive applications against cached-based attacks. Different application deployment strategies allowing spatial isolation are proposed and compared in terms of several performance indicators. Our proposal is evaluated through virtual prototyping based on SystemC and Open Virtual Platforms(OVP) technology
Ronfeldt, Matthew Stephen. "Crafting core selves during professional education /." May be available electronically:, 2008. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.
Full textStroiński, Mateusz. "Simple Transitive 2-Representations of Cell 2-Subcategories for Algebras with a Self-Injective Core." Thesis, Uppsala universitet, Algebra och geometri, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-411491.
Full textJefferies, A. S. "An incrementally compiled code approach to concurrent switch level logic simulation." Thesis, University of Kent, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.374685.
Full textQuintero, Flores Perfecto Malaquias. "Fuzzy Gradual Pattern Mining Based on Multi-Core Architectures." Thesis, Montpellier 2, 2013. http://www.theses.fr/2013MON20232/document.
Full textGradual patterns aim at describing co-variations of data such as the older, the higher the salary. They have been more and more studied from the data mining point of view in recent years, leading to several ways of defining their meaning and and several algorithms to automatically extract them.They consider that data can be ordered regarding the values taken on the attributes (e.g. the age and the salary).However, in many application domains, it is hardly possible to consider that data values are crisply ordered. For instance, when considering gene expression, it is not true, from the biological point of view, to say that Gene 1 is more expressed than Gene 2 if the levels of expression only differ from the tenth decimal. This thesis thus considers fuzzy orderings and propose both formal definitions and algorithms to extract gradual patterns considering fuzzy orderings. As these algorithms are both time and memory consuming, we propose some optimizations based on an efficient storage of the fuzzy ordering informationcoupled with parallel algorithms. Experimental results run on synthetic and real database show the interest or our proposal
Thompson, Michael. "Roots and Role of the Imagination in Kant: Imagination at the Core." [Tampa, Fla] : University of South Florida, 2009. http://purl.fcla.edu/usf/dc/et/SFE0002945.
Full textFraga, Wilton Bezerra de. "Study of the performance of assymmetrical two-core non linear directional fiber coupler operating logic gates." Universidade Federal do CearÃ, 2006. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=0.
Full textWe investigate the performance of three different non linear directional assymmetrical fibers couplers that include a profile of self-modulation of increasing and decreasing phase. The asymmetry is associated with the profile of self-modulation of phase of one of the chanels. Initially, we investigate the performance of the considered coupler using ultrashort pulses, type sÃliton with 2ps of width and later operating with signal CW. Observing the characteristics of transmission of the device, through the direct chanel and cross chanel, we made a study of the extinction ratio (Xratio) of the devices. The extinction ratio of a switching on-off is the relation among the exit power in the state on and the power of exit in the state off. It was observed that the performance of gates AND, XOR, OR are dependents of the profile of non linearity. In the profile of constant it was not verified that logics AND and XOR present one better performance with the device operating in CW, while logic OR present better with the coupler operating in pulse regime. We conclude that coupler to operate it as logic gate we can control the non-linearity profile to optimize the characteristics of transmission through the extinction ratio.
NÃs investigamos o desempenho de trÃs diferentes acopladores direcionais nÃolineares duplo assimÃtrico que incluem um perfil de auto modulaÃÃo de fase crescente e decrescente. A assimetria està associada ao perfil de auto modulaÃÃo de fase de um dos canais. Inicialmente, investigamos o desempenho do acoplador proposto utilizando pulsos ultracurtos, tipo sÃliton com 2ps de largura e posteriormente operando com sinal CW. Observando as caracterÃsticas de transmissÃo do dispositivo, atravÃs do canal direto e cruzado, fizemos um estudo do coeficiente de extinÃÃo (Xratio) dos dispositivos. O coeficiente de extinÃÃo de um chaveamento on-off à a relaÃÃo entre a potÃncia de saÃda no estado on e a potÃncia de saÃda no estado off . Foi observado que a performance de portas AND, XOR, OR sÃo dependentes do perfil de nÃo linearidade. No perfil de nÃo linearidade constante verificou-se que as lÃgicas AND e XOR apresentam um melhor desempenho com o dispositivo operando em CW, enquanto a lÃgica OR mostra-se melhor com o acoplador operando em regime pulsado. ConcluÃmos que para o acoplador operar como porta lÃgica nÃs podemos controlar o perfil de nÃo linearidade para otimizar as caracterÃsticas de transmissÃo atravÃs do coeficiente de extinÃÃo.
Hartford, Margaret Ann. "Core conditions in student-centered learning environments." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2009. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textLu, Weiyun. "Formally Verified Code Obfuscation in the Coq Proof Assistant." Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39994.
Full textParham, M. J. "Adaptive logic network correlation techniques for optical code division multiple access systems." Thesis, University of Surrey, 1994. http://epubs.surrey.ac.uk/843838/.
Full textShaw, Ryan Phillip. "Application of Subjective Logic to Vortex Core Line Extraction and Tracking from Unsteady Computational Fluid Dynamics Simulations." BYU ScholarsArchive, 2012. https://scholarsarchive.byu.edu/etd/2989.
Full textSpeciale, Giovanni Maria. "Il Ragionamento Logico come Forma di Apprendimento: Sviluppo di Un Framework per ILP." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/23786/.
Full textLi, He. "Synthesis and characterization of metal-carbon core-shell nanoparticles /." May be available electronically:, 2008. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.
Full textBoskovitz, Agnes, and abvi@webone com au. "Data Editing and Logic: The covering set method from the perspective of logic." The Australian National University. Research School of Information Sciences and Engineering, 2008. http://thesis.anu.edu.au./public/adt-ANU20080314.163155.
Full textWaite, Stephen J. "A logic model to review material nominated for inclusion into project code PL3." Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/26045.
Full textCui, Song. "Hardware mapping of critical paths of a GaAs core processor for solid modelling accelerator /." Title page, contents and abstract only, 1996. http://web4.library.adelaide.edu.au/theses/09PH/09phc9661.pdf.
Full textCrick, Thomas. "Superoptimisation : provably optimal code generation using answer set programming." Thesis, University of Bath, 2009. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.518295.
Full textBlack-Schaffer, David. "Block parallel programming for real-time applications on multi-core processors /." May be available electronically:, 2008. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.
Full textBiallas, Sebastian [Verfasser]. "Verification of Programmable Logic Controller Code using Model Checking and Static Analysis / Sebastian Biallas." Aachen : Shaker, 2016. http://d-nb.info/1118258428/34.
Full textMortensen, Clifton H. "A Computational Fluid Dynamics Feature Extraction Method Using Subjective Logic." BYU ScholarsArchive, 2010. https://scholarsarchive.byu.edu/etd/2208.
Full textAlba, Castro Mauricio Fernando. "Abstract Certification of Java Programs in Rewriting Logic." Doctoral thesis, Universitat Politècnica de València, 2011. http://hdl.handle.net/10251/13617.
Full textAlba Castro, MF. (2011). Abstract Certification of Java Programs in Rewriting Logic [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/13617
Palancia
Pippin, William E. Jr. "Optimizing Threads of Computation in Constraint Logic Programs." The Ohio State University, 2003. http://rave.ohiolink.edu/etdc/view?acc_num=osu1041551800.
Full textChen, Jiehua. "Regression models with spatially correlated residuals : applications to urban core growth in China /." May be available electronically:, 2008. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.
Full textJohansson, Adam, and Tim Johansson. "Code generation for programmable logic controllers : Evaluating model-based engineering practices in a real-world context." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18714.
Full textCoffman, Michael G. "Using a programmable logic controller to implement a (16,8) 2-bit error detection and correction code /." Available to subscribers only, 2007. http://proquest.umi.com/pqdweb?did=1456292311&sid=1&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Full textYe, Xin. "Model checking self modifying code." Thesis, Université de Paris (2019-....), 2019. http://www.theses.fr/2019UNIP7010.
Full textA Self modifying code is code that modifies its own instructions during execution time. It is nowadays widely used, especially in malware to make the code hard to analyse and to detect by anti-viruses. Thus, the analysis of such self modifying programs is a big challenge. Pushdown Systems (PDSs) is a natural model that is extensively used for the analysis of sequential programs because it allows to accurately model procedure calls and mimic the program’s stack. In this thesis, we propose to extend the PushDown System model with self-modifying rules. We call the new model Self-Modifying PushDown System (SM-PDS). A SM-PDS is a PDS that can modify its own set of transitions during execution. First, we show how SM-PDSs can be used to naturally represent self-modifying programs and provide efficient algorithms to compute the backward and forward reachable configurations of SM-PDSs. Then, we consider the LTL model-checking problem of self-modifying code. We reduce this problem to the emptiness problem of Self-modifying Büchi Pushdown Systems (SM-BPDSs). We also consider the CTL model-checking problem of self-modifying code. We reduce this problem to the emptiness problem of Self-modifying Alternating Büchi Pushdown Systems (SM-ABPDSs). We implement our techniques in a tool called SMODIC. We obtained encouraging results. In particular, our tool was able to detect several self-modifying malwares; it could even detect several malwares that well-known anti-viruses such as McAfee, Norman, BitDefender, Kinsoft, Avira, eScan, Kaspersky, Qihoo-360, Avast and Symantec failed to detect
Tuch, Harvey Computer Science & Engineering Faculty of Engineering UNSW. "Formal memory models for verifying C systems code." Publisher:University of New South Wales. Computer Science & Engineering, 2008. http://handle.unsw.edu.au/1959.4/41233.
Full textSurdilovic, Tihomir. "Fuzzy Mouse Cursor Control System for Computer Users with Spinal Cord Injuries." Digital Archive @ GSU, 2006. http://digitalarchive.gsu.edu/cs_theses/49.
Full textColombier, Brice. "Methods for protecting intellectual property of IP cores designers." Thesis, Lyon, 2017. http://www.theses.fr/2017LYSES038/document.
Full textDesigning integrated circuits is now an extremely complex task. This is why designers adopt a modular approach, where each functional block is described independently. These functional blocks, called intellectual property (IP) cores, are sold by their designers to system integrators who use them in complex projects. This division led to the rise of cases of illegal copying of IP cores. In order to fight this threat against intellectual property of lP core designers, the objective of this PhD thesis was to develop a secure remote activation scheme for IP cores, allowing the designer to know exactly how many IP cores are currently used. To achieve this, the first two contributions of thesis thesis deal with the modification of combinational logic of an IP core to make it activable. The first method allows to controllably force the outputs to a fixed logic value. The second is an efficient technique to select the nodes to controllably alter, so that the IP core is temporarily unusable. The third contribution of this thesis is a lightweight method of error correction to use with PUF (Physical Undonable Functions) responses, which are an intrinsic identifier of instances of the lP core. Reusing an error-correction protocol used in quantum key ex.change, this method is much more lightweight than error-correcting
Escobar, Rozas Freddy. "Leibniz, the Science and the Civil Code." IUS ET VERITAS, 2016. http://repositorio.pucp.edu.pe/index/handle/123456789/122768.
Full textEl presente artículo aborda la temática sobre las diferencias entre los cuerpos normativos antiguos y los Códigos Civiles actuales. El autor realiza un análisis desde la época Medieval hasta la actualidad para evidenciar el cambio y la evolución que hicieron los pensadores para aplicar el método geométrico al Derecho y la forma de configurar de las normas en el Civil Law. Asimismo, se reconoce y analiza los aportes de los escritores y pensadores europeos, que impulsaron la Revolución Científica del siglo XVII, en especial la obra del abogado Gottfried Wilhelm Leibniz.
Biallas, Sebastian [Verfasser], Stefan [Akademischer Betreuer] Kowalewski, and Alexander [Akademischer Betreuer] Fay. "Verification of programmable logic controller code using model checking and static analysis / Sebastian Biallas ; Stefan Kowalewski, Alexander Fay." Aachen : Universitätsbibliothek der RWTH Aachen, 2016. http://d-nb.info/1129875946/34.
Full textCominotte, Alexandre. "Uso de imagens biométricas para predição do peso corporal e de carcaça quente de bovinos Nelore /." Jaboticabal, 2018. http://hdl.handle.net/11449/157479.
Full textBanca: João Ricardo Rebouças Dorea
Banca: Guilherme Luis Pereira
Resumo: O trabalho foi dividido em dois estudos. No estudo 1, objetivou-se predizer o peso corporal (PC) e o ganho médio diário (GMD) de bovinos Nelore por meio de imagens tridimensionais e comparar quatro modelos de predição: Regressão Linear Múltipla (RLM), Regressão LASSO (LASSO), Partial Least Squares (PLS) e Artificial Neural Networks (ANN). Foram coletadas 234 imagens de bovinos Nelore. As coletas de dados foram realizadas em quatro fases da ao longo da vida do animal: Desmame aos 244 dias de idade e 202,3 kg (± 27,1), Recria aos 457 dias de idade e 213,9 kg (± 25,1), Inicio da Terminação aos 590 dias de idade e 334,5 kg (± 29,2) e Final da Terminação aos 763 dias de idade e 449,5 kg (± 47,5). Nas três primeiras fases foram coletadas imagens de 62 bovinos Nelore, enquanto que na última fase apenas 48 imagens foram coletadas. O GMD foi medido: 1: Desmama - Recria, 2: Desmama - Inicio da Terminação, 3: Desmama - Final da Terminação, 4: Recria - Inicio da Terminacao, 5: Recria - Final da Terminação e 6: Inicio da Terminação - Final da Terminação. No estudo 2, quatrocentas e cinquenta imagens de bovinos Nelore foram coletadas em quatro experimentos para predição de PC e peso de carcaça quente (PCQ). Quatro conjuntos experimentais foram considerados: Set 1 inclui os experimentos 1, 2 e 3 para treinamento e experimento 4 para validação; Set 2 inclui os experimentos 1, 2 e 4 para treinamento e experimento 3 para validação; Set 3 inclui os experimentos 1, 3 e 4 para treinamento e exper... (Resumo completo, clicar acesso eletrônico abaixo)
Abstract: The work was divided in two studies. The objective of this study was to predict the body weight (BW) and the average daily gain (ADG) of Nellore cattle by 3-D images and to compare four prediction models: Multiple Linear Regression (MLR), LASSO Regression, Partial Least Squares (PLS) and Artificial Neural Networks (ANN). A total of 234 images of bovine Nellore were collected. Data collection was performed in four stages throughout the life of the animal: Weaning at 244 days of age and 202.3 kg (± 27.1), Stocker at 457 days of age and 213.9 kg (± 25.1), Initial of Termination at 590 days of age and 334.5 kg (± 29.2) and Finish of Termination at 763 days of age and 449.5 kg (± 47.5). In the first three phases images of 62 Nellore cattle were collected, while in the last phase only 48 images were collected. The ADG was measured: 1: Weaning - Stocker, 2: Weaning - Initial of Termination, 3: Weaning - Finish of Termination, 4: Stocker - Initial of Termination, 5: Stocker - Finish of Termination and 6: Initial of Termination - Final of Termination. In study 2, four hundred and fifty images of Nellore cattle were collected in four experiments for prediction of BW and hot carcass weight (HCW). Four experimental sets were considered: Set 1 includes experiments 1, 2 and 3 for training and experiment 4 for validation; Set 2 includes experiments 1, 2 and 4 for training and experiment 3 for validation; Set 3 includes experiments 1, 3 and 4 for training and experiment 2 for validation; Set... (Complete abstract click electronic access below)
Mestre
Gunputh, Rajendra Parsad. "L'interprétation du code Napoléon par les juridictions mauriciennes." La Réunion, 2005. http://elgebar.univ-reunion.fr/login?url=http://thesesenligne.univ.run/05_24_Gunputh.pdf.
Full textThis thesis demonstrates how the Napoleon Code is interpreted in a Commonwealth country where there is also a great resistance from the common law. Thought there is the interpretation General Clauses Act 1974, which is English inspired, most interpretation is nevertheless borrowed from the french doctrine and jurisprudence. Judgments from the famous Cour de cassation are constantly referred to. In fact, there is no proper autonomy or originality from judgments given by the Mauritian tribunals especially the Supreme Court. In fact, the Supreme Court still relies on the decisions of the Privy Council based in London. Mauritian law, however, innovate in certain vvay because the legislator has passed a certain number of reforms related to the law of successions. The three pillars of french civil law Family, Property and Obligations, are fully discussed to demonstrate the great similarities and differences between french and mauritian law. This can be achieved by reference to local jurisprudence and how the Supreme Court normally sticks to local statutes, the Napoleon Code and stare decisis or precedent cases in order to sum up with his ratio decidendi
Thapalia, Anita. "Zinc and copper isotopes as tracers of anthropogenic contamination in a sediment core from an urban lake." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2009. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textZhu, Lei. "Circular reconstruction and scatter correction in X-ray cone-beam CT /." May be available electronically:, 2007. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.
Full textSandberg, Natalia. "Automatic Generation of PLC Code Based on Net Condition Event Systems." Scholar Commons, 2008. http://scholarcommons.usf.edu/etd/3771.
Full textCome, David. "Analyse de la qualité de code via une approche logique et application à la robotique." Thesis, Toulouse 3, 2019. http://www.theses.fr/2019TOU30008.
Full textThe quality of source code depends not only on its functional correctness but also on its readability, intelligibility and maintainability. This is currently an important problem in robotics where many open-source frameworks do not spread well in the industry because of uncertainty about the quality of the code. Code analysis and search tools are effective in improving these aspects. It is important that they let the user specify what she is looking for in order to be able to take into account the specific features of the project and of the domain. There exist two main representations of the source code : its Abstract Syntax Tree (AST) and the Control Flow Graph (CFG) of its functions. Existing specification mechanisms only use one of these representations, which is unfortunate because they offer complementaty information. The objective of this work is therefore to develop a method for verifying code compliance with user rules that can take benefit from both the AST and the CFG. The method is underpinned by a new logic we developed in this work : FO++ , which is a temporal extension of first-order logic. Relying on this logic has two advantages. First of all, it is independent of any programming language and has a formal semantics. Then, once instantiated for a given programming language, it can be used as a mean to formalize user provided properties. Finally, the study of its model-checking problem provides a mechanism for the automatic and correct verification of code compliance. These different concepts have been implemented in Pangolin, a tool for the C++ language. Given the code to be checked and a specification (which corresponds to an FO++ formula, written using Pangolin language), the tool indicates whether or not the code meets the specification. It also offers a summary of the evaluation in order to be able to find the code that violate the property as well as a certificate of the result correctness. Pangolin and FO++ have been applied to the field of robotics through the analysis of the quality of ROS packages and the formalization of a ROS-specific design-pattern. As a second and more general application to the development of programs in C++, we have formalized various good practice rules for this language. Finally, we have showed how it is possible to specify and verify rules that are closely related to a specific project by checking properties on the source code of Pangolin itself
Jackson, Ugueto Eileen Elizabeth. "Progress towards the synthesis of gnidimacrin and its analogues synthesis of a highly advanced oxygen-rich intermediate incorporating the carbotricyclic core of gnidimacrin /." May be available electronically:, 2008. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.
Full textMenezes, Josà Wally MendonÃa. "ImplementaÃao de porta lÃgicas Ãpticas com acoplador direcional nÃo linear triplo planar simÃtrico de fÃbras Ãpticas." Universidade Federal do CearÃ, 2006. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=189.
Full textNeste trabalho, portas lÃgicas Ãpticas sÃo propostas a partir da utilizaÃÃo de um acoplador direcional nÃo linear (NLDC) triplo planar simÃtrico de fibra Ãptica e com um dos guias operando como controle. Para tal fim, obtemos as caracterÃsticas de transmissÃo do acoplador e, em seguida, fizemos uma anÃlise do coeficiente de extinÃÃo e do fator de compressÃo. Inicialmente, investigamos o desempenho do acoplador proposto operando no regime CW e posteriormente utilizando pulsos ultracurtos, tipo sÃliton com 2ps de largura. Com o modelo proposto para o dispositivo, conseguimos efetivar portas lÃgicas AND, NAND, OR, XOR e NOT para um conjunto de fases aplicadas ao pulso de controle. As portas lÃgicas geradas com o dispositivo operando com sinais CW, apresentaram-se mais eficientes que as mesmas portas geradas com sinais pulsados.
In this work, optical logical gates are proposed starting from the use of a symmetric three-core nonlinear directional coupler (NLDC) of fiber optic and with one of the guides operating as control. For such end, we obtain the characteristics of transmission of the coupler and, soon afterwards, we made an analysis of the extinction ratio and of the compression factor. Initially, we investigated the acting of the proposed coupler operating in the regime CW and later using ultra short pulses, type sÃliton with 2ps of width. With the model proposed for the device, we got to execute logical gates AND, NAND, OR, XOR and NOT for a group of applied phases to the control pulse. The logical gates generated with the device operating with signs CW, they came more efficient than the same gates generated with soliton pulses.
Menezes, José Wally Mendonça. "Implementação de porta lógicas ópticas com acoplador direcional não linear triplo planar simétrico de fíbras ópticas." reponame:Repositório Institucional da UFC, 2006. http://www.repositorio.ufc.br/handle/riufc/12468.
Full textSubmitted by Edvander Pires (edvanderpires@gmail.com) on 2015-05-25T22:18:49Z No. of bitstreams: 1 2006_dis_jwmmenezes.pdf: 2170108 bytes, checksum: 0615686d0a317fa8d05e85006ca06e1b (MD5)
Approved for entry into archive by Edvander Pires(edvanderpires@gmail.com) on 2015-05-27T18:52:06Z (GMT) No. of bitstreams: 1 2006_dis_jwmmenezes.pdf: 2170108 bytes, checksum: 0615686d0a317fa8d05e85006ca06e1b (MD5)
Made available in DSpace on 2015-05-27T18:52:06Z (GMT). No. of bitstreams: 1 2006_dis_jwmmenezes.pdf: 2170108 bytes, checksum: 0615686d0a317fa8d05e85006ca06e1b (MD5) Previous issue date: 2006
In this work, optical logical gates are proposed starting from the use of a symmetric three-core nonlinear directional coupler (NLDC) of fiber optic and with one of the guides operating as control. For such end, we obtain the characteristics of transmission of the coupler and, soon afterwards, we made an analysis of the extinction ratio and of the compression factor. Initially, we investigated the acting of the proposed coupler operating in the regime CW and later using ultra short pulses, type sóliton with 2ps of width. With the model proposed for the device, we got to execute logical gates AND, NAND, OR, XOR and NOT for a group of applied phases to the control pulse. The logical gates generated with the device operating with signs CW, they came more efficient than the same gates generated with soliton pulses.
Neste trabalho, portas lógicas ópticas são propostas a partir da utilização de um acoplador direcional não linear (NLDC) triplo planar simétrico de fibra óptica e com um dos guias operando como controle. Para tal fim, obtemos as características de transmissão do acoplador e, em seguida, fizemos uma análise do coeficiente de extinção e do fator de compressão. Inicialmente, investigamos o desempenho do acoplador proposto operando no regime CW e posteriormente utilizando pulsos ultracurtos, tipo sóliton com 2ps de largura. Com o modelo proposto para o dispositivo, conseguimos efetivar portas lógicas AND, NAND, OR, XOR e NOT para um conjunto de fases aplicadas ao pulso de controle. As portas lógicas geradas com o dispositivo operando com sinais CW, apresentaram-se mais eficientes que as mesmas portas geradas com sinais pulsados.
Quintana, Joel. "Hybrid optical network using incoherent optical code division multiple access via optical delay lines." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2009. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full text