Download (8Mb)

Total Page:16

File Type:pdf, Size:1020Kb

Download (8Mb) University of Warwick institutional repository: http://go.warwick.ac.uk/wrap A Thesis Submitted for the Degree of PhD at the University of Warwick http://go.warwick.ac.uk/wrap/58566 This thesis is made available online and is protected by original copyright. Please scroll down to view the document itself. Please refer to the repository record for this item for information to help you to cite it. Our policy information is available from the repository home page. WA~IC]< Aspects of Functional Programming by Gary Meehan Thesis Submitted to the University of Warwick for the degree of Doctor of Philosophy Computer Science August 1999 Contents List of Tables viii List of Figures ix Acknowledgments xi Declarations xii Abstract xiii Chapter 1 Introduction 1 Chapter 2 Background 7 2.1 FUnctions, The A-calculus and Supercombinators 7 2.2 Strictness and Laziness. 8 2.3 Graph Reduction. 10 2.4 Types, Polymorphism and Overloading . 13 2.5 Abstract Machines . 17 Chapter 3 Fuzzy Functional Programming 20 3.1 FUzzy Logic . 21 3.2 FUzzy Subsets . 25 3.2.1 The Domain, Support and FUzziness of a FUzzy Subset. 28 III 3.2.2 Fuzzy Subset Operations . 30 3.2.3 Hedges and Fuzzy Numbers 32 3.2.4 Defuzzification . 36 3.2.5 An Example - Fuzzy Database Queries. 38 3.3 Fuzzy Systems .. 41 3.4 Further Examples. 47 3.4.1 Controlling a Shower. 47 3.4.2 Pricing Goods 55 3.5 Summary . 57 Chapter 4 Compiling Lazy Functional Programs to Java Byte-code 58 4.1 The Java Virtual Machine. 59 4.2 The Ginger Language ... 63 4.3 Representation of Graph Nodes 64 4.3.1 Updating 67 4.3.2 Evaluation 70 4.3.3 Printing. 73 4.4 Primitives . 75 4.4.1 Fuzzy Primitives 77 4.5 Compilation . 78 4.5.1 Compiling Supercombinators 82 4.5.2 The 'R Compilation Scheme . 83 4.5.3 The C Compilation Scheme 90 4.5.4 The £ Compilation Scheme 90 4.5.5 Tail Recursion 91 4.5.6 Initial Results. 91 4.6 Optimisations . 92 iv 4.6.1 Direct Function Invocations. 93 4.6.2 Single-instance Constants 94 4.7 Results and Other Work 96 4.8 Summary . 100 Chapter 5 The Aladin Abstract Machine 102 5.1 The Semantics of the AAM . 103 5.1.1 The Original Denotational Semantics. 104 5.1.2 The Denotational Semantics with Explicit Updates. 105 5.1.3 The Operational Semantics . 111 5.1.4 An Example of the Operational Semantics. 116 5.2 A Scripting Language for Aladin 120 5.2.1 Package Declarations . 122 5.2.2 Import Declarations 123 5.2.3 Strictness Signatures . 123 5.2.4 Definitions . 125 5.3 Representation and Evaluation of Aladin Programs. 128 5.3.1 Aladin Programs 130 5.3.2 Data Structures. 132 5.3.3 The Evaluation Mechanism 135 5.4 Primitives.............. 140 5.4.1 Java and Aladin Primitives 141 5.4.2 C Primitives .... 143 5.4.3 Primitives in Ginger 145 5.4.4 Overloading ... 149 5.4.5 Fuzzy Primitives 150 5.4.6 Importing Primitives . 154 v 5.5 Compilation . 155 5.5.1 Compiling Scripts .. 156 5.5.2 Compiling Constants and Strictness Signatures 158 5.5.3 Compiling Strictness Declarations 159 5.5.4 Compiling Imports . 160 5.5.5 Compiling and Optimising Local Blocks 160 5.5.6 Compiling Simple Programs . 164 5.5.7 Compiling the Target Code and Using the Resultant Classes 165 5.6 Summary . 167 Chapter 6 Partial Evaluation in Aladin 170 6.1 The Denotational Semantics . 171 6.2 The Operational Semantics 172 6.3 Implementation . 174 6.4 Partially Evaluating Programs 178 6.5 Primitives and Partial Evaluation. 181 6.5.1 Partial Data Structures ... 186 6.5.2 Partial Evaluation and C Primitives 192 6.5.3 Partial Evaluation and Ginger Primitives 194 6.6 Further Examples and Results 196 6.6.1 Matrix Multiplication 196 6.6.2 Gaussian Elimination 200 6.6.3 Exponentiation . 206 6.6.4 Polynomials . 208 6.6.5 Integration by Simpson's Rule 209 6.6.6 Fuzzy Systems 212 6.6.7 Results .... 215 vi 6.7 Summary . 220 Chapter 7 Conclusion and Further Work 221 7.1 Integrating Aladin and Ginger 223 7.2 Ginger and Type Systems 223 7.3 Parallel Aladin . 226 7.4 Other Aladin Enhancements . 228 Bibliography 230 vii List of Tables 4.1 Initial running times of programs produced by the Ginger compiler. 92 4.2 Running times (s) of programs produced by the Ginger compiler with and without direct function invocation.. .. 94 4.3 Running times (s) of programs produced by the Ginger compiler with and without single-instance constants. .. 97 4.4 Comparisons of running times of various lazy functional language implementations 98 4.5 Running times (s) of programs produced by the Ginger compiler with initial heap sizes of 1 and 4 megabytes ... 100 5.1 Aladin infix operators and their prefix form 126 5.2 Aladin 'dot-dot' lists and their prefix form. 128 6.1 Comparisons of running times of Aladin programs with and without partial evaluation. 216 6.2 Compile + Run times of Aladin programs with and without partial evaluation . 217 6.3 Comparisons of Running times of Ginger programs with and without partial evaluation . 219 Vlll List of Figures 2.1 The steps taken by an Abstract Machine. 18 3.1 Crisp definition of Profit. 26 3.2 Fuzzy definition of Profit. 26 3.3 Standard fuzzy subset distributions . 27 3.4 Operations on fuzzy subsets. .... 30 3.5 Very profitable and Somewhat profitable. 33 3.6 Fuzzy approximations to 20. 35 3.7 Defuzzifying a fuzzy subset 36 3.8 The fuzzy rule base for the height ~ shoe size expert system 42 3.9 Weighting, adding and defuzzifying the rules for a height of 1.75m 44 3.10 Fuzzy subsets of temperature, flow and tap change ......... 48 4.1 The EBNF of the Ginger language after lambda-lifting and depen- dency analysis. 64 5.1 An generic unwound application 108 5.2 Application of a function to too many arguments 109 5.3 Application of a function to too many arguments after evaluation of inner application . 109 5.4 The fp. aladin package 129 ix 5.5 A GU! for Aladin. .. 168 x Acknowledgments I would primarily like to thank my supervisor, Mike Joy, for his advice and help throughout the duration of my research, for getting me on the course in the first place, and not being too uptight about the size of my coffee bill. I'd also like to thank Steve Matthews for his encouragement, especially with regards to the fuzzy stuff (surely I'm allowed one colloquialism, Mike); Tom Axford, who along with Mike Joy, laid the groundwork for Aladin; and Ananda Amatya for various comments and papers over the years. In addition, I'd like to thank Mike and Steve for their comments and editorial advice on this thesis, and their corrections of my lousy typing. Finally, I'd like to say to Richard Gault: 'Beat you!' xi Declarations The work on fuzzy logic and functional programming, described in Chapter 3, is based largely on that detailed in [77] published in the Journal of Functional pro- gramming and its preceding technical report [75]. The published paper was written in collaboration with my supervisor, Dr Mike Joy, who acted in an advisory and editorial capacity; the technical report was authored by me alone. The Ginger compiler described in Chapter 4 has its origins in the technical report written by Dr Joy [53]. The compiler was written from scratch by me alone, apart from the parser for the language which is based on one developed by Dr Joy for a Ginger interpreter written in Java. The text of Chapter 4 is based on [78]published in Software - Practice and Experience, co-authored with Dr Joy who acted in an advisory and editorial capacity. An earlier version of the compiler is described in a technical report [74], written solely by me. My work on Aladin detailed in Chapters 5 and 6 is based on that done by Dr Joy and Dr Tom Axford of Birmingham University [10, 11]. I developed the updating denotational semantics for Aladin, with and without partial evaluation, from which an operational semantics for Aladin was obtained. My implementation of the Aladin without partial evaluation, based on this semantics, has previously been described in a technical report [76]. Nothing has yet been published on my work on partial evaluation and Aladin. xii Abstract This thesis explores the application of functional programming in new areas and its implementation using new technologies. We show how functional languages can be used to implement solutions to problems in fuzzy logic using a number of languages: Haskell, Ginger and Aladin. A compiler for the weakly-typed, lazy language Ginger is developed using Java byte-code as its target code. This is used as the inspiration for an implementation of Aladin, a simple functional language which has two novel features: its primitives are designed to be written in any language, and evaluation is controlled by declaring the strictness of all functions. Efficient denotational and operational semantics are given for this machine and an implementation is devel- oped using these semantics. We then show that by using the advantages of Aladin (simplicity and strictness control) we can employ partial evaluation to achieve con- siderable speed-ups in the running times of Aladin programs. xiii Chapter 1 Introduction Functional programming [15, 26, 40, 93] is, as its name suggests, programming with functions, by defining them and applying them to arguments.
Recommended publications
  • Creating a Management System for Customer Information for a Small Business CASE: Botisto
    Creating a management system for customer information for a small business CASE: Botisto Timo Aho Bachelor's Thesis Degree Programme in Business Information Technology 2012 Abstract Business Information Technology Author Year of entry Timo Aho 2006 Title of thesis Number of Creating a management system for customer information for a pages and ap- small business pendices CASE: Botisto 24 + 4 Supervisor Juhani Välimäki The purpose of this thesis project was to find and create a better solution for handling customer information at Botisto. Botisto is Spanish company selling mass customized men’s footwear. Before this thesis project, the customer information was collected manually. This information consisted, for example, of names, preferred shoe sizes and address information. During this project, it was decided that a customer information system will to be cre- ated from scratch. The system was developed with PHP programming language and MySQL database management system using Waterfall development model. The project was successful and the software has been taken into use at the Botisto shop. Keywords Customer, Information, Handling, PHP, MySQL Table of contents 1 Introduction ......................................................................................................... 1 1.1 About Botisto ............................................................................................. 1 1.2 Development goal ...................................................................................... 1 1.2.1 Included in scope...........................................................................
    [Show full text]
  • Chapter 9-11 Informatic Practices
    APTE H R C 9 MORE ON DATABASES AND SQL Learning Objectives After studying this lesson the students will be able to: • Define the terms: (i) Group (Aggregate) functions, Constraints (ii) Cartesian Product, Join, Referential Integrity, Foreign Key. • Write queries using aggregate functions and GROUP BY clause. • Access data from multiple tables • Create tables with PRIMARY KEY and NOT NULL constraints • Add a constraint to a table, remove a constraint from a table, modify a column of a table using ALTER TABLE command. • Delete a table using DROP TABLE. In the previous class, you have learnt some database concepts and SQL commands. You have also learnt how to create databases and tables within databases and how to access data from a table using various clauses of SELECT command. In this chapter you shall learn some more clauses and functions in SQL to access data from a table and how to access data from multiple tables of a database. Puzzle 8 It was Iftar party in Lucknow that Mr. David met Mr. Naqvi. They became friends and exchanged their phone numbers. After a few days, Mr. David rang up and invited Mr. Naqvi for New Year party at his house and gave him his house number as follows: "I live in a long street. Numbered on the side of my house are the houses one, two, three and so on. All the numbers on one side of my house add up to exactly the same as all the 270 MORE ON DATABASES AND SQL numbers on the other side of my house.
    [Show full text]
  • Fisher Scientific™ Channel As Your Trusted Safety Resource to Help Protect Your Most Valuable Assets: Your People, Your Facilities, and the Environment
    SPINE Fisher Scientific Personal Protective Equipment Catalog Dear Valued Customer, Thank you for selecting the Fisher Scientific™ channel as your trusted safety resource to help protect your most valuable assets: your people, your facilities, and the environment. We offer a broad selection of personal protection, facility safety, and response products from industry-leading manufacturers to help ensure that you can properly prepare your facilities, prevent hazards, protect your employees, and respond to accidents. And you can rely on our experience to assist you in maintaining compliance with current OSHA, NFPA, EPA, NIOSH, CSA, and ANSI standards. Whether you’re in the pharmaceutical, industrial, biotechnology, chemical, academic, or another industry, we have products to help you work safely. And if you’re not sure what you need, you can rely on the extensive experience of our Fisher Scientific Safety Specialists — they’re eager to help you find the right product for specific hazards and applications. In addition to helping you stay safe, we also make it as convenient as possible to find and purchase what you need. We continuously enhance fishersci.com based on your feedback, improving product information, providing special offers, and delivering the best digital shopping experience available. And it doesn’t stop there: with a growing network of 16 shipping facilities, we make sure your order is accurately fulfilled and quickly delivered. We’re dedicated to helping you protect what matters most, and as always, we look forward to working with you. With appreciation, Angela N. Hokanson Vice President and General Manager Safety and Production Keep Your People Safe with Our Proven Experience Nathalie L.
    [Show full text]
  • COMPRESSION 17 TECH SHEETS Impressum
    W COMPRESSION 17 TECH SHEETS Impressum FSM Team Filser Sport & Marketing Inh: Matthias Filser Altstädter Straße 12 87527 Sonthofen Tel.: +49 (0) 8321 - 780935-0 Fax: +49 (0) 8321 - 780935-99 www.filsermarketing.de www.2XU.de Hintere Reihe von Links: Oliver Herzig, Sebastian Meurer, Marc Halbauer, Markus Witting, Björn Friedl, Matthias Filser Vordere Reihe von Links: Dieter Eisenlauer, Markus Lang, Lasse Bahnsen, Hans-Jörg Hörmann HERO HERO STORIES MCS MCS GTM TOOLKIT TARGETED MUSCLE SUPPORT SPORT SPECIFIC COMPRESSION FOR PERFORMANCE AND RECOVERY Our Muscle Containment wrap precise areas to further Stamping (MCS) is our reduce muscle oscillation and premium compression damage. This highly advanced technology. The sport specific anatomical mapping provides graduated compression is greater compression power MCS best in class for training and without excessive bulk in a MUSCLE CONTAINMENT recovery; providing the optimal light and highly breathable STAMPING TARGETED balance of compression power, garment. ANATOMICAL MUSCLE flexibility and containment. MAPPING With a revolutionary fabric support system traced over key muscles, tendons and fascia groups with targeted compression technology to M COMPRESSION ELITE MCS RUN VK: 139,90 € MA4411b Your run apparel is as important as your running shoes. The MCS Run Compression range MCS RUN COMPRESSION TIGHTS has been developed with a detailed understanding of the impact running has on the leg. Providing anatomically mapped muscle support for greater performance and recovery. RECOMMENDED ACTIVITIES / RUNNING GARMENT FEATURES FABRIC BENEFITS 01. MCS mapping targeted to quad and calf 01. Lightweight yet powerful PWX fabrics to help reduce strain and soreness to muscles 02. Durable yarns that outlasts the competition a.
    [Show full text]
  • RP2 Num Line Oct12
    MatrixMath Instructional Guide Alan Amundsen Contributors: Sara Munshin, Lida Lim, Amy Murphy MetaFour Productions, a 501 (c)(3) 2189 Fern Dell Place Los Angeles, CA 90068 [email protected] • (323) 465-7347 • MetaFourProductions.org MatrixMath Instructional Guide Numericon Table of Contents I. Ratio and Proportion II. Linear Equations III. Data, Statistics, and Probability IV. Geometry Numericon is a game-like math video series addressing Ratio & Proportion; Linear Equations; Data, Statistics, & Probability; and Geometry. Numericon motivates students to learn and apply math concepts while answering the age-old question, “How does this math apply to real life?” While each episode offers a satisfying beginning and conclusion that can be used as a stand-alone teaching tool, the complete narrative includes character development that underscores values such as teamwork, loyalty, trust, and responsibility to oneself and others. Numericon is a cinematic 26-episode science fiction adventure, filled with action-packed cliffhanger sequences. A highly diverse team of space mercenaries follows the instructions of their captain, the student, to solve increasingly complex standards-based math problems that will ultimately determine the fate of the universe. Each Numericon episode consists of three segments: Challenge – The story begins and the team finds itself in a predicament that must be solved using math. Counselor – Students can check with the counselor. She will offer hints and strategies to help complete the mission. Resolution – Once the student has helped the crew to solve the math problem, the mission is completed and the episode concludes. The crew is one step closer to saving the universe. Supporting the Numericon Video Series – MatrixMath Instructional Guide The purpose of the MatrixMath Instructional Guide is to help teachers assist students in understanding the mathematics behind the problems posed in Numericon video episodes.
    [Show full text]
  • Download Slides
    If NoSQL is your answer, you are probably asking the wrong question. Hi, my name is Lukas Kahwe Smith and I am not a troll @lsmith @lsmith77 SQL For the conference we're looking for someone who can be a part of the 'Databases - short talks' presentations to give a lightning talk about SQL. SQL NoSQL No SQL? Not Only SQL? Time for some pseudo math Given that most relational databases have an SQL interface RDBMS - SQL = NoSQL ? NoSQL + SQL = RDBMS ? Key-Value-Store + Complex Queries = NoSQL ? I am about to blow your mind I have created a database API for unstructured hierarchical documents on top of an RDBMS with an SQL-like interface And I wasn’t even the first person to do it .. Can we agree to stop using the term NoSQL ? Using NewSQL is not any better! Instead talk about RDBMS, Doc-Stores, Key-Value- Stores, Graph-Databases .. There is clearly a growing number of people considering alternatives to RDBMS Actually Key-Value-Stores have been popular for many years already So clearly the current trend is not just about sharding unstructured documents in an elastically scaling cluster Its also not about getting rid of SQL, after all the CAP theorem doesn’t talk about what query languages to use RDBMS - relational model = ? We still love RDBMS for what their good for Storing and retrieving structured relational small to large data sets with high consistency and reliability And yes we also still love SQL Running ad-hoc search queries and schema updates even if we are not rocket scientists http://2012.nosql-matters.org/cgn/slides/#olaf_bachmann And while JSON queries might be easier parsed by computers SQL is definitely easy to parse for humans So what do we really worry about .
    [Show full text]
  • Irie Pascal Programmer's Reference Manual
    Irie Pascal Programmer's Reference Manual Author: Stuart King Page: 1 TABLE OF CONTENTS 1 Introduction 1.1 Preface 1.2 Compliance statement 2 Language Elements 2.1 What are language elements? 2.2 Character literals 2.3 Reserved words 2.4 Separators 2.5 Compiler directives 2.6 Special symbols 2.7 String literals 2.8 Numbers 2.8.1 Integers 2.8.1.1 What are integers? 2.8.1.2 Integers (Decimal notation) 2.8.1.3 Integers (Hexadecimal notation) 2.8.1.4 Integers (Binary notation) 2.8.2 Real numbers 2.8.2.1 What are real numbers? 2.9 Identifiers 2.9.1 What are identifiers? 2.9.2 Built-in identifiers 2.9.3 User defined/declared identifiers 2.9.4 Directives 2.9.4.1 What are directives? 2.9.4.2 The external directive 2.9.4.3 The forward directive 3 Labels 3.1 What are labels? 4 Constants 4.1 What are constants? 4.2 Built-in Constant Identifiers 4.2.1 What are built-in constant identifiers 4.2.2 appendmode 4.2.3 dir_bit 4.2.4 false 4.2.5 feature_calldll - calling DLLs supported? 4.2.6 feature_closedir - closedir supported? 4.2.7 feature_clrscr - clrscr supported? 4.2.8 feature_delay - delay supported? 4.2.9 feature_gotoxy - gotoxy supported? 4.2.10 feature_idispatch - COM/ActiveX objects supported? 4.2.11 feature_intr - intr supported? 4.2.12 feature_keypressed - keypressed supported? 4.2.13 feature_mysql - MySQL databases supported? 4.2.14 feature_odbc - ODBC databases supported? 4.2.15 feature_opendir - opendir supported? 4.2.16 feature_popen - popen supported? 4.2.17 feature_readdir - readdir supported? 4.2.18 feature_readkey - readkey supported?
    [Show full text]
  • Relationship of Footwear Comfort, Selected Size, and Lower Leg Overuse Injuries Among Infantry Soldiers
    Relationship of Footwear Comfort, Selected Size, and Lower Leg Overuse Injuries Among Infantry Soldiers Darja Nesterovica ( [email protected] ) Riga Stradins University: Rigas Stradinas Universitate https://orcid.org/0000-0003-1344-0067 Normunds Vaivads Latvian National Armed Forces Ainars Stepens Riga Stradins University: Rigas Stradinas Universitate Research Keywords: military personnel, footwear comfort, overuse injuries, military boot Posted Date: May 5th, 2021 DOI: https://doi.org/10.21203/rs.3.rs-482273/v1 License: This work is licensed under a Creative Commons Attribution 4.0 International License. Read Full License Page 1/15 Abstract Introduction High rates of musculoskeletal injuries such as plantar fasciitis and stress fractures have been observed among physically active military personnel. During service time, infantry soldiers use issued boots daily that should be a proper t and provide comfort to effectively prevent injuries and decrease lower extremity pain. This study compares the subjective infantry boot size with optimal size and investigates perceived boot comfort for different boot parts among soldiers with and without a history of lower leg, ankle, and foot overuse injury. Materials/Methods During the cross-sectional study, 227 (males, n=213; females, n=14) active-duty infantry soldiers at a mean age of 29.5 years old, and with an average service time of 7.2 years were assessed for a history of overuse injury, footprint length, appropriate shoe size, and footwear comfort. Males with a history of overuse injury (n=32) and non-injured age-matched controls (n=34) were selected for detailed testing and establishing the possible relationship between footwear comfort and lower leg overuse injury.
    [Show full text]
  • Nike Restricted Substances List (RSL) and Sustainable Chemistry Guidance (SCG)
    Nike Restricted Substances List (RSL) and Sustainable Chemistry Guidance (SCG) Corporate Version Date: August 2011 Always verify the RSL version by visiting: http://www.nikeresponsibility.com/rsl THE INFORMATION CONTAINED IN THIS DOCUMENT IS THE CONFIDENTIAL AND PROPRIETARY INFORMATION OF NIKE, INC. REPRODUCTION OR DISTRIBUTION OF THIS INFORMATION, IN WHOLE OR IN PART, WITHOUT PRIOR WRITTEN CONSENT OF NIKE, INC IS STRICTLY PROHIBITED. Copyright © 2007 by NIKE, INC. All rights reserved. Page 1 of 65 Version Date: August 2011 File:Nike_CorporateRSL_August2011.doc Nike RSL and Sustainable Chemistry Guidance Contents Nike Corporate Restricted Substances List…………………………………………………………………………………….…4 Chemical restrictions for every material and every component used on a Nike Apparel, Equipment and/or Footwear finished product. Nike Corporate RSL Implementation Guide..……………………………………………………………..……………………...14 Compliance timeframes, supply agreements, testing definitions, testing requirements by material type, kid’s sizing table, sample selection criteria, test administration, failure resolution, notes for toys, electronics, and food contact products. Sample selection criteria – Textiles …………………………………………………………………………………………………………………….......18 Sample selection criteria – Leathers……………………………………………………………………………………………………………...…….......20 Sample selection criteria – Plastics, thermoplastics, polymers………………………………………………………………………………………......22 Sample selection criteria – Inks, paints, screen print inks, Heat transfers, & similar embellishments…………………………………………….....24
    [Show full text]
  • 15MS2747 Q1 Foot and Ankle
    15MS2747_Q1_foot_and_ankle_Standard Default 12/5/14 2:56 PM Page 1 15MS2747 INFECTION PREVENTION AND PROTECTION SEE SEE SEE PAGE 5 PAGE 5 PAGE 9 EXTRA PROTECTION FOAMING EAR LOOP HAND SANITIZER ANTIBACTERIAL LIQUID HAND SOAP FACE MASKS 18.6-oz Pump Bottle 16-oz Pump Bottle Teal (900-4444) ................................ea $9.79 (900-4438) ................................ea $4.49 (104-8819) .........................50/box $6.09 SEE SEE SEE PAGE 11 PAGE 16 PAGE 25 Protecting People CaviCide® Surface Disinfectant SilvrSTAT® (Rx) Antibacterial CRITERION® EC #13-1024, 24-fl-oz Trigger-Spray Bottle Wound Dressing Gel (112-6787) .......................50/box $5.69 (640-2261) ................................ea $8.19 (685-0183) ..............................1 oz. $19.99 SEE SEE PAGE 19 PAGE 26 NEW! CALL TODAY TO ORDER! Square Toe Post-Op Shoe (122-2534)..............................ea $7.69 LED Exam Lights FOOT & ANKLE MENTION TO ENSURE PROMO PROMOTIONAL CODE NBG PRICING To Order: 1-800-323-5110 8am–9pm (et) To Fax: 1-800-524-4969 24 Hours JOIN OUR COMMUNITY www.henryschein.com/footandankle 15MS2747_Q1_foot_and_ankle_Standard Default 12/5/14 2:56 PM Page 2 TABLE OF CONTENTS Henry Schein Medical is your reliable network Hand Hygiene ..........3—8 Gloves ............2, 10—11 of trusted advisors. Masks & Eyewear ..........9 Personal Protection ......12 Rely on Us for… Sterilizers ....................13 Expert Guidance Instruments..........14—15 Our knowledgeable team of trusted advisors is dedicated to collaborating with you to meet specific goals
    [Show full text]
  • Volume 1, Number 25 December 27, 2003
    Volume 1, Number 25 http://isedj.org/1/25/ December 27, 2003 In this issue: Preparing for the Semantic Web Antonio M. Lopez, Jr Xavier University of Louisiana New Orleans, LA 70125 Abstract: As today’s undergraduates in computer information systems work towards learning those skills needed in the world of e-Commerce (e.g., HTML, Java, XML, etc.), an enhancement to the World Wide Web is being “spun.” The Semantic Web is the envisioned end-state for the movement of the World Wide Web from words, images, and audio understood only by humans to those same things “wrapped in” organizing concepts and relationships understood by both humans and software agents. Since the Semantic Web is a research effort under the auspices of the World Wide Web Consortium, how are faculty members to expose students to the emerging technology that will impact how e-Commerce will be supported in the future? This paper highlights some of the World Wide Web Consortium work done thus far in moving the current Web toward a Semantic Web. It next presents an overview of ontology development, the key enabling technology for the Semantic Web. Finally, it shows how undergraduate researchers, mentored by their faculty members, can develop ontologies that lead naturally into preparing for the Semantic Web. Keywords: World Wide Web, e-Commerce, semantic web, ontology, undergraduate research Recommended Citation: Lopez (2003). Preparing for the Semantic Web. Information Systems Education Journal, 1 (25). http://isedj.org/1/25/. ISSN: 1545-679X. (Also appears in The Proceedings of ISECON 2003: §2521. ISSN: 1542-7382.) This issue is on the Internet at http://isedj.org/1/25/ ISEDJ 1 (25) Information Systems Education Journal 2 The Information Systems Education Journal (ISEDJ) is a peer-reviewed academic journal published by the Education Special Interest Group (EDSIG) of the Association of Information Technology Professionals (AITP, Chicago, Illinois).
    [Show full text]
  • Cleanroom and Controlled Environments 2015-2017
    VWR INTERNATIONAL CLEANROOM AND CONTROLLED ENVIRONMENTS 2015-2017 CLEANROOMS | STERILE ROOMS CONTROLLED ENVIRONMENTS Products and Services Quantus®: the attractive choice for high performance reusable garments With the Quantus® garment range: r ;QWYKNNƂPFUWKVCDNGICTOGPVUHQTCP[CRRNKECVKQPsYJGVJGTKPCENGCPTQQOUVGTKNGTQQOQT controlled production environments r ;QWYKNNDGPGƂVHTQOFGOQPUVTCDN[QWVUVCPFKPIVGEJPKECNCPFHWPEVKQPCNHCDTKEEJCTCEVGTKUVKEU r You will receive comprehensive documentation about the fabric and each piece of garment r All cleanroom classes are covered For further information or a quotation, tailored to your requirements, please contact us! VWR International · basan – the cleanroom division of VWR · vwr.com/basan TABLE OF CONTENTS Introduction ............................................ I MATS AND FLOORING Services .............................................. II-X Adhesive mats ....................................... 174 REUSABLE GARMENTS 2GTOCPGPVOCVUCPFƃQQTKPI ......................... 176 Overalls, face masks and hoods . 2 DETERGENTS AND DISINFECTANTS Shoe and boot covers ................................... 6 Disinfectant surface .................................. 178 Coats and bouffant caps ................................ 7 Under garments ........................................ 8 CLEANING SYSTEMS DISPOSABLE GARMENTS Bucket systems - stainless steel ....................... 182 Bucket systems - plastic ............................... 184 Overalls ............................................... 12 Mop systems ........................................
    [Show full text]