MR-PBGP: A Multi-Root Tree Model for Parallel BGP

Author(s):  
Yaping Liu ◽  
Shuo Zhang ◽  
Baosheng Wang
Keyword(s):  

Author(s):  
Preeti Puri ◽  
◽  
Shefali Shefali ◽  

This article is an attempt to move beyond the conventional binary heuristic of identity to its progressive representation based on multiplicity, difference, and dispersion popularized by the ‘rhizomatic’ theory of Gilles Deleuze and Félix Guattari, in Charlotte Perkins Gilman’s story, “The Yellow Wall Paper”. It is a cliché belief that multiplicity comprises of numerous units, and these units can be eventually united under one category such as the ages of population. Deleuze and Guattari interrogated such logocentric assumptions, and ‘arborescent root- tree’ model of objectified structures, language, identity and self. This article seeks to trace the voyage of Jane’s identity whose dairy constitutes the story “The Yellow Wall Paper”. Her identity has evoked ramified and conflicting networks of references. Feminists broach that she is caged to be a conventional caring mother; for a Freudian she is a ‘hysteric’ struggling with temporary nervous depression, Lacanian posit that she is a ‘psychotic’ who persistently tries to satisfy the ‘gaze’ of her physician husband John, and for a Deleuzian the moment she fails to bear the burden of capitalism driven ‘bio-power’ and ‘nuclear family’ she becomes a ‘schizo’. The object of study of this article is not Jane’s mind which romanticizes asylums rather the interrelation between ‘bio-power’ and her ‘desire’. The article will portray that Jane’s ‘self’ is evacuated from its fixed position to cherish free form of human interaction, and her identity is not handcuffed by any law, rather it is in a state of constant ‘flux’, in a ceaseless motion of ‘becoming’, it is a ‘rhizome’, facilitating a non- hierarchical network.



2020 ◽  
pp. 57-65
Author(s):  
Eusébio Conceiçã ◽  
João Gomes ◽  
Maria Manuela Lúcio ◽  
Jorge Raposo ◽  
Domingos Xavier Viegas ◽  
...  

This paper refers to a numerical study of the hypo-thermal behaviour of a pine tree in a forest fire environment. The pine tree thermal response numerical model is based on energy balance integral equations for the tree elements and mass balance integral equation for the water in the tree. The simulation performed considers the heat conduction through the tree elements, heat exchanges by convection between the external tree surfaces and the environment, heat exchanges by radiation between the flame and the external tree surfaces and water heat loss by evaporation from the tree to the environment. The virtual three-dimensional tree model has a height of 7.5 m and is constituted by 8863 cylindrical elements representative of its trunks, branches and leaves. The fire front has 10 m long and a 2 m high. The study was conducted taking into account that the pine tree is located 5, 10 or 15 m from the fire front. For these three analyzed distances, the numerical results obtained regarding to the distribution of the view factors, mean radiant temperature and surface temperatures of the pine tree are presented. As main conclusion, it can be stated that the values of the view factor, MRT and surface temperatures of the pine tree decrease with increasing distance from the pine tree in front of fire.



2016 ◽  
Vol 4 (6) ◽  
pp. 26
Author(s):  
Zaidan Ali Jassem

This paper traces the Arabic origins or cognates of the “definite articles” in English and Indo-European languages from a radical linguistic (or lexical root) theory perspective. The data comprises the definite articles in English, German, French, Spanish, Portuguese, Italian, Romanian, Latin, Greek, Macedonian, Russian, Polish, Sanskrit, Hindi, Bengali, Persian, and Arabic. The results clearly indicate that five different types of such articles emerged in the data, all of which have true Arabic cognates with the same or similar forms and meanings, whose differences are due to natural and plausible causes and different routes of linguistic change, especially lexical, semantic, or morphological shift. Therefore, the results support the adequacy of the radical linguistic theory according to which, unlike the Family Tree Model or Comparative Method, Arabic, English, German, French, Latin, Greek, and Sanskrit not only belong to the same language family, renamed Eurabian or Urban family, but also are dialects of the same language, with Arabic being their origin all because only it shares the whole cognates with them all and because it has a huge phonetic, morphological, grammatical, and lexical variety. They also manifest fundamental flaws and grave drawbacks which plague English and Indo-European lexicography for ignoring Arabic as an ultimate ancestor and progenitor not only in the treatment of the topic at hand but in all others in general. On a more general level, they also show that there is a radical language from which all human languages stemmed and which has been preserved almost intact in Arabic, thus being the most conservative and productive language



1992 ◽  
Vol 26 (5-6) ◽  
pp. 1411-1420 ◽  
Author(s):  
S. H. Choudhury ◽  
S. L. Yu ◽  
Y. Y. Haimes

This paper presents an integrated methodology that allows determining the probability of noncompliance for a given wastewater treatment plant. The methodology applies fault-tree analysis, which uses failure probabilities of individual components, to predict the overall system failure probability. The methodology can be divided into two parts : risk identification and risk quantification. In risk identification, the key components in the system are determined by analyzing the contribution of individual component failures toward system failure (i.e., noncompliance). In risk quantification, a fault-tree model is constructed for the particular system, component failure probabilities are estimated, and the fault-tree model is evaluated to determine the probability of occurrence of the top event (i.e., noncompliance). A list can be developed that ranks critical events on the basis of their contributions to the probability of noncompliance. Such a ranking should assist managers to determine which components require most attention for a better performance of the entire system. A wastewater treatment plant for treating metal-bearing rinse water from an electroplating industry is used as an example to demonstrate the application of this methodology.



Author(s):  
Takuya MIYASHITA ◽  
Nobuhito MORI ◽  
Katsuichiro GODA
Keyword(s):  




2021 ◽  
pp. 109442812110029
Author(s):  
Tianjun Sun ◽  
Bo Zhang ◽  
Mengyang Cao ◽  
Fritz Drasgow

With the increasing popularity of noncognitive inventories in personnel selection, organizations typically wish to be able to tell when a job applicant purposefully manufactures a favorable impression. Past faking research has primarily focused on how to reduce faking via instrument design, warnings, and statistical corrections for faking. This article took a new approach by examining the effects of faking (experimentally manipulated and contextually driven) on response processes. We modified a recently introduced item response theory tree modeling procedure, the three-process model, to identify faking in two studies. Study 1 examined self-reported vocational interest assessment responses using an induced faking experimental design. Study 2 examined self-reported personality assessment responses when some people were in a high-stakes situation (i.e., selection). Across the two studies, individuals instructed or expected to fake were found to engage in more extreme responding. By identifying the underlying differences between fakers and honest respondents, the new approach improves our understanding of faking. Percentage cutoffs based on extreme responding produced a faker classification precision of 85% on average.



Author(s):  
Avijit Kumar Chaudhuri ◽  
Deepankar Sinha ◽  
Dilip K. Banerjee ◽  
Anirban Das


Algorithms ◽  
2021 ◽  
Vol 14 (6) ◽  
pp. 176
Author(s):  
Wei Zhu ◽  
Xiaoyang Zeng

Applications have different preferences for caches, sometimes even within the different running phases. Caches with fixed parameters may compromise the performance of a system. To solve this problem, we propose a real-time adaptive reconfigurable cache based on the decision tree algorithm, which can optimize the average memory access time of cache without modifying the cache coherent protocol. By monitoring the application running state, the cache associativity is periodically tuned to the optimal cache associativity, which is determined by the decision tree model. This paper implements the proposed decision tree-based adaptive reconfigurable cache in the GEM5 simulator and designs the key modules using Verilog HDL. The simulation results show that the proposed decision tree-based adaptive reconfigurable cache reduces the average memory access time compared with other adaptive algorithms.



Sign in / Sign up

Export Citation Format

Share Document