ECLiPSe – From LP to CLP

2011 ◽  
Vol 12 (1-2) ◽  
pp. 127-156 ◽  
Author(s):  
JOACHIM SCHIMPF ◽  
KISH SHEN

AbstractECLiPSe is a Prolog-based programming system, aimed at the development and deployment of constraint programming applications. It is also used for teaching most aspects of combinatorial problem solving, for example, problem modelling, constraint programming, mathematical programming and search techniques. It uses an extended Prolog as its high-level modelling and control language, complemented by several constraint solver libraries, interfaces to third-party solvers, an integrated development environment and interfaces for embedding into host environments. This paper discusses language extensions, implementation aspects, components, and tools that we consider relevant on the way from Logic Programming to Constraint Logic Programming.

2015 ◽  
Vol 16 (2) ◽  
pp. 189-235 ◽  
Author(s):  
DANIELA INCLEZAN ◽  
MICHAEL GELFOND

AbstractThe paper introduces a new modular action language,${\mathcal ALM}$, and illustrates the methodology of its use. It is based on the approach of Gelfond and Lifschitz (1993,Journal of Logic Programming 17, 2–4, 301–321; 1998,Electronic Transactions on AI 3, 16, 193–210) in which a high-level action language is used as a front end for a logic programming system description. The resulting logic programming representation is used to perform various computational tasks. The methodology based on existing action languages works well for small and even medium size systems, but is not meant to deal with larger systems that requirestructuring of knowledge.$\mathcal{ALM}$is meant to remedy this problem. Structuring of knowledge in${\mathcal ALM}$is supported by the concepts ofmodule(a formal description of a specific piece of knowledge packaged as a unit),module hierarchy, andlibrary, and by the division of a system description of${\mathcal ALM}$into two parts:theoryandstructure. Atheoryconsists of one or more modules with a common theme, possibly organized into a module hierarchy based on adependency relation. It contains declarations of sorts, attributes, and properties of the domain together with axioms describing them.Structuresare used to describe the domain's objects. These features, together with the means for defining classes of a domain as special cases of previously defined ones, facilitate the stepwise development, testing, and readability of a knowledge base, as well as the creation of knowledge representation libraries.


10.29007/7ths ◽  
2018 ◽  
Author(s):  
Steve Prestwich ◽  
S. Armagan Tarim ◽  
Roberto Rossi

Constraint Programming is a powerful and expressive framework for modelling and solving combinatorial problems. It is nevertheless not always easy to use, which has led to the development of high-level specification languages. We show that Constraint Logic Programming can be used as a meta-language to describe itself more compactly at a higher level of abstraction. This can produce problem descriptions of comparable size to those in existing specification languages, via techniques similar to those used in data compression. An advantage over existing specification languages is that, for a problem whose specification requires the solution of an auxiliary problem, a single specification can unify the two problems. Moreover, using a symbolic representation of domain values leads to a natural way of modelling channelling constraints.


2011 ◽  
Vol 12 (3) ◽  
pp. 319-360 ◽  
Author(s):  
RICARDO LOPES ◽  
VÍTOR SANTOS COSTA ◽  
FERNANDO SILVA

AbstractLogic programming provides a high-level view of programming, giving implementers a vast latitude into what techniques to explore to achieve the best performance for logic programs. Towards obtaining maximum performance, one of the holy grails of logic programming has been to design computational models that could be executed efficiently and that would allow both for a reduction of the search space and for exploiting all the available parallelism in the application. These goals have motivated the design of the Extended Andorra Model (EAM), a model where goals that do not constrain nondeterministic goals can execute first. In this work, we present and evaluate the Basic design for EAM, a system that builds upon David H. D. Warren's original EAM with Implicit Control. We provide a complete description and implementation of the Basic design for EAM System as a set of rewrite and control rules. We present the major data structures and execution algorithms that are required for efficient execution, and evaluate system performance. A detailed performance study of our system is included. Our results show that the system achieves acceptable base performance and that a number of applications benefit from the advanced search inherent to the EAM.


2020 ◽  
Author(s):  
Reham AlTamime ◽  
Vincent Marmion ◽  
Wendy Hall

BACKGROUND Mobile apps and IoT-enabled smartphones technologies facilitate collecting, sharing, and inferring from a vast amount of data about individuals’ location, health conditions, mobility status, and other factors. The use of such technology highlights the importance of understanding individuals’ privacy concerns to design applications that integrate their privacy expectations and requirements. OBJECTIVE This paper explores, assesses, and predicts individuals’ privacy concerns in relation to collecting and disclosing data on mobile health apps. METHODS We designed a questionnaire to identify participants’ privacy concerns pertaining to a set of 432 mobile apps’ data collection and sharing scenarios. Participants were presented with 27 scenarios that varied across three categorical factors: (1) type of data collected (e.g. health, demographic, behavioral, and location); (2) data sharing (e.g., whether it is shared, and for what purpose); and, (3) retention rate (e.g., forever, until the purpose is satisfied, unspecified, week, or year). RESULTS Our findings show that type of data, data sharing, and retention rate are all factors that affect individuals’ privacy concerns. However, specific factors such as collecting and disclosing health data to a third-party tracker play a larger role than other factors in triggering privacy concerns. CONCLUSIONS Our findings suggest that it is possible to predict privacy concerns based on these three factors. We propose design approaches that can improve users’ awareness and control of their data on mobile applications


Author(s):  
Roger Magnusson

Non-communicable diseases (NCDs), including cardiovascular disease, cancer, chronic respiratory diseases, and diabetes, are responsible for around 70 percent of global deaths each year. This chapter describes how NCDs have become prevalent and critically evaluates global efforts to address NCDs and their risk factors, with a particular focus on the World Health Organization (WHO) and United Nations (UN) system. It explores the factors that have prevented those addressing NCDs from achieving access to resources and a priority commensurate with their impact on people’s lives. The chapter evaluates the global response to NCDs both prior to and since the UN High-Level Meeting on Prevention and Control of Non-communicable Diseases, held in 2011, and considers opportunities for strengthening that response in future.


Author(s):  
Laura Vieten ◽  
Anne Marit Wöhrmann ◽  
Alexandra Michel

Abstract Objective Due to recent trends such as globalization and digitalization, more and more employees tend to have flexible working time arrangements, including boundaryless working hours. The aim of this study was to investigate the relationships of various aspects of boundaryless working hours (overtime, Sunday work, and extended work availability) with employees’ state of recovery. Besides, we examined the mediating and moderating role of recovery experiences (psychological detachment, relaxation, mastery, and control) in these relationships. Methods We used data from 8586 employees (48% women; average age of 48 years) who took part in the 2017 BAuA-Working Time Survey, a representative study of the German working population. Regression analyses were conducted to test main effects as well as mediation and moderation. Results Overtime work, Sunday work, and extended work availability were negatively related to state of recovery. Psychological detachment mediated these relationships. Furthermore, we found that relaxation and control mediated the association between extended work availability and state of recovery. However, no relevant moderating effects were found. Conclusions Altogether, our findings indicate that various aspects of boundaryless working hours pose a risk to employees’ state of recovery and that especially psychological detachment is a potential mechanism in these relationships. In addition, the results suggest that a high level of recovery experiences cannot attenuate these negative relationships in leisure time. Therefore, employers and employees alike should try to avoid or minimize boundaryless working hours.


Author(s):  
Ya-Fang Hu ◽  
Li-Ping Jia ◽  
Fang-Yuan Yu ◽  
Li-Ying Liu ◽  
Qin-Wei Song ◽  
...  

Abstract Background Coxsackievirus A16 (CVA16) is one of the major etiological agents of hand, foot and mouth disease (HFMD). This study aimed to investigate the molecular epidemiology and evolutionary characteristics of CVA16. Methods Throat swabs were collected from children with HFMD and suspected HFMD during 2010–2019. Enteroviruses (EVs) were detected and typed by real-time reverse transcription-polymerase chain reaction (RT-PCR) and RT-PCR. The genotype, evolutionary rate, the most recent common ancestor, population dynamics and selection pressure of CVA16 were analyzed based on viral protein gene (VP1) by bioinformatics software. Results A total of 4709 throat swabs were screened. EVs were detected in 3180 samples and 814 were CVA16 positive. More than 81% of CVA16-positive children were under 5 years old. The prevalence of CVA16 showed obvious periodic fluctuations with a high level during 2010–2012 followed by an apparent decline during 2013–2017. However, the activities of CVA16 increased gradually during 2018–2019. All the Beijing CVA16 strains belonged to sub-genotype B1, and B1b was the dominant strain. One B1c strain was detected in Beijing for the first time in 2016. The estimated mean evolutionary rate of VP1 gene was 4.49 × 10–3 substitution/site/year. Methionine gradually fixed at site-23 of VP1 since 2012. Two sites were detected under episodic positive selection, one of which (site-223) located in neutralizing linear epitope PEP71. Conclusions The dominant strains of CVA16 belonged to clade B1b and evolved in a fast evolutionary rate during 2010–2019 in Beijing. To provide more favorable data for HFMD prevention and control, it is necessary to keep attention on molecular epidemiological and evolutionary characteristics of CVA16.


Sensors ◽  
2021 ◽  
Vol 21 (10) ◽  
pp. 3515
Author(s):  
Sung-Ho Sim ◽  
Yoon-Su Jeong

As the development of IoT technologies has progressed rapidly recently, most IoT data are focused on monitoring and control to process IoT data, but the cost of collecting and linking various IoT data increases, requiring the ability to proactively integrate and analyze collected IoT data so that cloud servers (data centers) can process smartly. In this paper, we propose a blockchain-based IoT big data integrity verification technique to ensure the safety of the Third Party Auditor (TPA), which has a role in auditing the integrity of AIoT data. The proposed technique aims to minimize IoT information loss by multiple blockchain groupings of information and signature keys from IoT devices. The proposed technique allows IoT information to be effectively guaranteed the integrity of AIoT data by linking hash values designated as arbitrary, constant-size blocks with previous blocks in hierarchical chains. The proposed technique performs synchronization using location information between the central server and IoT devices to manage the cost of the integrity of IoT information at low cost. In order to easily control a large number of locations of IoT devices, we perform cross-distributed and blockchain linkage processing under constant rules to improve the load and throughput generated by IoT devices.


2021 ◽  
Vol 9 (5) ◽  
pp. 1050
Author(s):  
Jing Zhu ◽  
Xiang Sun ◽  
Zhi-Dong Zhang ◽  
Qi-Yong Tang ◽  
Mei-Ying Gu ◽  
...  

Endophytic bacteria and fungi colonize plants that grow in various types of terrestrial and aquatic ecosystems. Our study investigates the communities of endophytic bacteria and fungi of halophyte Kalidium schrenkianum growing in stressed habitats with ionizing radiation. The geochemical factors and radiation (at low, medium, high level and control) both affected the structure of endophytic communities. The bacterial class Actinobacteria and the fungal class Dothideomycetes predominated the endophytic communities of K. schrenkianum. Aerial tissues of K. schrenkianum had higher fungal diversity, while roots had higher bacterial diversity. Radiation had no significant effect on the abundance of bacterial classes. Soil pH, total nitrogen, and organic matter showed significant effects on the diversity of root endophytes. Radiation affected bacterial and fungal community structure in roots but not in aerial tissues, and had a strong effect on fungal co-occurrence networks. Overall, the genetic diversity of both endophytic bacteria and fungi was higher in radioactive environments, however negative correlations were found between endophytic bacteria and fungi in the plant. The genetic diversity of both endophytic bacteria and fungi was higher in radioactive environments. Our findings suggest that radiation affects root endophytes, and that the endophytes associated with aerial tissues and roots of K. schrenkianum follow different mechanisms for community assembly and different paradigms in stress response.


Sign in / Sign up

Export Citation Format

Share Document