Automated Procedures for Robust and Efficient Solution of Over-Constrained Multibody Dynamics

Author(s):  
Roger A. Wehage

The basic steps of a computer-based methodology that generates optimized runtime algorithms to achieve robust, stable, and efficient solution of constrained, multibody dynamics are summarized. The concept of using processors operating in the background to improve many aspects of an executing program’s performance on arbitrary models is introduced. Among the many optimizing tasks, algorithm processors extract model topology from body and joint descriptions, set up recursive spatial kinematics and generalized dynamics algorithms, block-partition constraints and apply Gaussian elimination with complete pivoting to identify and change dependent and independent variable sets, convert constraints into row-reduced, echelon form, permute the constrained generalized equations to achieve stable and efficient solutions, and set up recursive sparse uncoupling and solve algorithms to minimize fills and operations count. To accomplish these tasks, processors assess model-specific algorithm requirements and use this information to generate source and destination memory pointer arrays and arrays of pointers to structures and optimized functions. In essence, they wire and rewire runtime algorithms as needed to maintain robust, stable, and efficient solutions throughout a simulation.


1987 ◽  
Vol 116 (1_Suppl) ◽  
pp. S312-S317 ◽  
Author(s):  
G. Benker ◽  
D. Reinwein ◽  
H. Creutzig ◽  
H. Hirche ◽  
W. D. Alexander ◽  
...  

Abstract. In spite of the long-established use of antithyroid drugs, there are many unsettled questions connected with this treatment of Graves' disease. There is a lack of controlled prospective trials studying the results of antithyroid drug therapy while considering the many variables such as disease heterogeneity, regional differences, drug dosage and duration of treatment. Therefore, a multicenter study has been set up in order to compare the effects of two fixed doses of methimazole (10 vs 40 mg) with thyroid hormone supplementation on the clinical, biochemical and immunological course of Graves' disease and on remission rates. Experience accumulated so far suggests that treatment is safe using either 10 or 40 mg of methimazole. While there is a tendency for an advantage of the higher dose within the first weeks (higher effectiveness in controlling hyperthyroidism), this difference is not significant. The impact of dosage on remission rates remains to be shown.



2015 ◽  
Author(s):  
Pieraugusto Panzalis ◽  
Andrea Deiana ◽  
Sarah Caronni ◽  
Augusto Navone

Marine Protected Areas (MPAs) are acknowledged globally as effective tools for the protection and management of the marine environment; however, to get effective results it is necessary to set up a proper and continuous mapping of the marine territory, in order to gain detailed knowledge of its different aspects. Therefore, the implementation and maintenance of a modern GIS (Geographic Information System) has become an indispensable task for the MPA of Tavolara - Punta Coda Cavallo to collect, aggregate, classify, and track the conducted mapping activities. Between 2011 and 2012 the sea bottom of the MPA was surveyed using different methods: by means of a multi-beam echo sounder and of a side scan sonar, as well as conducting fast scientific scuba divings with re-breathers and underwater position system technologies. High resolution geodatasets, characterized by a significantly high quality in representing and describing the sea bottom and its habitats, were produced in both feature (scale up to 1:1.250) and raster formats (up to 30cm/pixel for sonar images and 1m/pixel for bathymetry) and they currently constitute the basis of the MPA's GIS, including its 3D applications and its web map services for desktop and mobile devices (iPhone & Android). To update the above described geodatasets during time, acquiring new data on the conservation targets considered in monitoring activities, among which the status of P. oceanica meadows is of the most important ones, a long term mapping plan was realized on the basis of an innovative methodology elaborated by the MPA considering both the wideness of the area and the limited funds available at present. The whole MPA was divided in territorial units by means of a regular grid of square cells having a 100m side with the logic of starting the mapping activities from the mainly important areas and then to spread the surveys up to fill the whole mosaic. All the new data acquired with this methodology could then be mixed, compared and indexed within the same cell and/or in the many already available geodatases, starting from those dated 2006 having a regular grid with square cells of 500m per side.



1970 ◽  
pp. 55
Author(s):  
Inge Andriansen

Dybbøl is the brow of a hill located about 30 km north-east of the border between Denmark and Germany. This area was once the former Danish Duchy of Schleswig, which was under German rule in the period from 1864 to 1920. Dybbøl was also the site of intense fighting during the Schleswig-Holstein Revolt of 1848–50 and the Danish-German War of 1864. There are remains of both Danish and German fortifications and earthworks, along with large mass graves in which troops from Denmark, Schleswig-Holstein and Germany lie buried. After a plebiscite about the placing of the border was held in 1920, Schleswig was divided up, and the northern part – which included Dybbøl – became part of Denmark. This was followed by a comprehensive ”Danishification” of the cultural landscape, which had previously been dominated by a large Prussian victory monument and numerous German memorial stones. A Danish national park was set up at Dybbøl in 1924, with the backing of the local population and financial sup- port from a national collection appeal, and formally opened by the Danish prime minister. After this, Dybbøl became the epitome of the institutionalised cultural heritage of the state of Denmark, and would almost certainly be included in any ”cultural canon” of the most significant geographical locations that have helped shape the Danish sense of national identity. However, Dybbøl also features another – less comfortable – aspect of the Danish cultural heritage, bearing witness to Danish acts of vandalism perpetrated against the German monuments found here. Any study of the use of the history associated with Dybbøl uncovers layer upon layer of episodes that speak of conflicting interests and countless metamorphoses that led to the site being imbued with new values and a sequence of new identities. And in step with the resurgence of nationalist sentiments in Denmark since the mid-1980s, there has been a corresponding, strengthened re-annexation of the cultural heritage associated with Dybbøl. The need to cling on to and retain establis- hed, familiar positions and a fundamental sense of belonging are well-known aspects of the process of globalisation, and are seen throughout the world. In Dybbøl, this deep-felt need has resulted in the construction of a Danish fortification, and the Danish flag flying atop the many flagpoles has become more frequent sight. This process can also be interpreted as an expression of Danish foreign policy taking on a more active role in the world.



1952 ◽  
Vol 17 (2) ◽  
pp. 105-116 ◽  
Author(s):  
Hao Wang

Certain axiomatic systems involve more than one category of fundamental objects; for example, points, lines, and planes in geometry; individuals, classes of individuals, etc. in the theory of types or in predicate calculi of orders higher than one. It is natural to use variables of different kinds with their ranges respectively restricted to different categories of objects, and to assume as substructure the usual quantification theory (the restricted predicate calculus) for each of the various kinds of variables together with the usual theory of truth functions for the formulas of the system. An axiomatic theory set up in this manner will be called many-sorted. We shall refer to the theory of truth functions and quantifiers in it as its (many-sorted) elementary logic, and call the primitive symbols and axioms (including axiom schemata) the proper primitive symbols and proper axioms of the system. Our purpose in this paper is to investigate the many-sorted systems and their elementary logics.Among the proper primitive symbols of a many-sorted system Tn (n = 2, …, ω) there may be included symbols of some or all of the following kinds: (1) predicates denoting the properties and relations treated in the system; (2) functors denoting the functions treated in the system; (3) constant names for certain objects of the system. We may either take as primitive or define a predicate denoting the identity relation in Tn.



Author(s):  
Etsuko Takushi Crissey

In September, 1945, with most Okinawans still in refugee camps, the U.S. military ordered elections for civilian leaders in which women were granted the right to vote for the first time, seven months earlier than in mainland Japan. Yet they were far more concerned about the many rapes committed by American soldiers. Women and girls were abducted from fields while searching for food, dragged away from their homes, and assaulted in front of their families. After months of inaction, the U.S. military decided to set up “special amusement areas” for prostitution in certain towns. Some Okinawans favoured this policy as a “breakwater” to protect women and children of “good” families, while others opposed it as exploitation of women. In 1967, at the peak of the Vietnam War, an estimated 10,000 women engaged in prostitution. In 1948 the U.S. military rescinded a ban on marriages between U.S. soldiers and Okinawan women that failed to prevent couples from having intimate relations and living together. Still, commanding officers pressured soldiers not to marry, threatening disciplinary transfers. By 1967, among thousands of biracial children in Okinawa, about half were raised by mothers or their relatives with little or no financial support from fathers.



2013 ◽  
pp. 399-424 ◽  
Author(s):  
Graham Heaslip

The term civil military coordination (CIMIC) suggests the seamless division of labor between aid workers and international military forces. The images of humanitarian organizations distributing food and medicines under the protection of military forces, or aid workers and military working together to construct refugee camps, set up field hospitals, provide emergency water and sanitation, et cetera, has become more frequent. The media coverage from crises such as New Orleans, Kosovo, the tsunami in Asia, Pakistan, Liberia, Sierra Leone, Chad, and more recently Haiti and Japan, has heightened the expectation of a smooth interaction between humanitarian organizations and military forces. Due to fundamental differences between international military forces, humanitarian and development organizations (in terms of the principles and doctrines guiding their work, their agendas, operating styles, and roles), the area of civil military coordination in disaster relief has proven to be more difficult than other interagency relationships. This chapter will identify the many factors that render integration and collaboration problematic between diverse organizations, and especially so between civilian and military agencies. The chapter will conclude with proposals to improve CIMIC within disaster relief.



2020 ◽  
pp. 11-30
Author(s):  
Jack Parkin

Chapter 1 opens the lid on Bitcoin so that all of its attributes, problems, and connotations come spilling out. At the same time, it pulls these disparate strands back into focus by outlining the many discrepancies examined in subsequent chapters. So while in some ways the chapter acts like a primer for cryptocurrencies, blockchains, and their political economies, the material laid out works to set up the book’s underlying argument: asymmetric concentrations of power inevitably form though processes of algorithmic decentralisation. In the process, a short history of Bitcoin introduces some of its key stakeholders as well as some of its core technical functions.



Author(s):  
Youssef Gahi ◽  
Imane El Alaoui ◽  
Mouhcine Guennoun

Database-as-a-service (DBaaS) is a trend allowing organizations to outsource their databases and computations to external parties. However, despite the many advantages provided by this service in terms of cost reduction and efficiency, DBaaS raises many security issues regarding data privacy and access control. The protection of privacy has been addressed by several research contributions proposing efficient solutions such as encrypted databases and blind queries over encrypted data, called blind processing. In this latter context, almost all proposed schemes consider an architecture of a single user (the data owner) that requests the database server for encrypted records while he is the only one capable of decrypting. From a practical perspective, a database system is set up to support not only a single user but multiple users initiating multiple queries. However, managing various accesses to an encrypted database introduces several challenges by itself, like key sharing, key revocation, and data re-encryption. In this article, we propose a simple and efficient blind processing protocol that allows multiple users to query the same encrypted data and decrypt the retrieved results without getting access to the secret key.



Author(s):  
Reinhard Bork ◽  
Renato Mangano

This chapter deals with European cross-border issues concerning groups of companies. This chapter, after outlining the difficulties encountered throughout the world in defining and regulating the group, focuses on the specific policy choices endorsed by the EIR, which clearly does not lay down any form of substantive consolidation. Instead, the EIR, on the one hand, seems to permit the ‘one group—one COMI’ rule, even to a limited extent, and, on the other hand, provides for two different regulatory devices of procedural consolidation, one based on the duties of ‘cooperation and communication’ and the other on a system of ‘coordination’ to be set up between the many proceedings affecting companies belonging to the same group.



Author(s):  
Hans Lehmann

This case tells the story of a Food Products Co-op from “Australasia” and their attempt to create a global information system. The Co-op is among the 20 largest food enterprises in the world, and international information systems (IIS) have taken on increasing importance as the organization expanded rapidly during the 1980s and even more so as the enterprise refined their global operations in the last decade. Set in the six years since 1995, the story demonstrates the many pitfalls in the process of evolving an IIS as it follows the Co-op’s global business development. Two key findings stood out among the many lessons that can be drawn from the case: first, the notion of an “information system migration” following the development of the Global Business Strategy of the multi-national enterprise through various stages; second, the failure of the IIS to adapt to the organization’s strategy changes set up a field of antagonistic forces, in which business resistance summarily killed all attempts by the information technology department to install a standard global information system.



Sign in / Sign up

Export Citation Format

Share Document