We choose Unified Modeling Language (UML) as the foundation to model the proposed solution of the Multi Software Product Lines (MPL) interoperability challenge. The proposed pseudo-code is modeled as an extension of t...
详细信息
ISBN:
(纸本)9781450364645
We choose Unified Modeling Language (UML) as the foundation to model the proposed solution of the Multi Software Product Lines (MPL) interoperability challenge. The proposed pseudo-code is modeled as an extension of the UML meta-model to support MPL. The model serves to provide a standard representation of MPL and an intuitive transformation to an Object-Oriented programming (OOP) language. Some extension to the UML that yet to have intuitive translation into common OO language are augmented with a mechanism using a build automation system. This mechanism provides manual transformation that gives us some hints whether the proposed solution fulfilled the evaluation criteria. The given challenge case has been written in our proposed pseudo-code, modeled in our UML extension, and translated into Java source code and Gradle build scripts. By invoking Gradle tasks, we can simulate product generation that creates products as Java objects.
An overview of main results concerning THz detection related to plasma nonlinearities in nanometer field effect transistors is presented. In particular nonlinearity and dynamic range of these detectors are discussed. ...
详细信息
ISBN:
(纸本)9788394942113
An overview of main results concerning THz detection related to plasma nonlinearities in nanometer field effect transistors is presented. In particular nonlinearity and dynamic range of these detectors are discussed. As the main result, we will show some of the first real-world applications of the FET THz detectors: demonstrators of the imager developed for fast postal security and industrial nondestructive quality control.
The correctness of the compiler is a necessary requirement for the correct operation of the software compiled by it. Therefore, the most important stage in the development of the compiler is verification. Recent wides...
详细信息
The correctness of the compiler is a necessary requirement for the correct operation of the software compiled by it. Therefore, the most important stage in the development of the compiler is verification. Recent widespread of multi-core processors and graphics core integrated to CPU emphasized the problem of the transition from single-threaded to multi-threaded computing and re-usage of graphics core for general purpose heterogeneous parallel computations in particular. In this paper, we are presenting an approach to automate test creation for the verification of the compiler with OpenMP support, based on a generator that uses grammars to generate syntactically correct executable tests.
The present paper describes a pipeline digital architecture of a fuzzy rule base grayscale image contrast enhancement system. The proposed system uses a zero order Takagi-Sugeno fuzzy model, adapted to avoid the divis...
详细信息
ISBN:
(纸本)9781538644447
The present paper describes a pipeline digital architecture of a fuzzy rule base grayscale image contrast enhancement system. The proposed system uses a zero order Takagi-Sugeno fuzzy model, adapted to avoid the division operation in the deffuzification block and also to reduce the computational requirements for the fuzzification block. The digital architecture is optimized to benefit from the advantages provided by the Xilinx DSP48E2 slice in terms of speed andlogic resource consumption. The design has been synthesized and tested on a Xilinx FPGA device and the reported results confirm its viability to be embedded in real time application systems. Also, the functionality of the proposed system was tested on a set of low contrast images, illustrating heavy traffic conditions.
We consider an extension of two-variable, first-order logic with counting quantifiers and arbitrarily many unary and binary predicates, in which one distinguished predicate is interpreted as the mother-daughter relati...
详细信息
First-order interpolation properties are notoriously hard to determine, even for logics where propositional interpolation is more or less obvious. One of the most prominent examples is first-order Gödel logic. Ly...
详细信息
We define a shallow embedding of logical proof-irrelevant Pure Type Systems (piPTSs) into minimal first-order logic. In logical piPTSs a distinguished sort∗p of propositions is assumed. Given a context Γ and a Γ-pro...
详细信息
The existing ultra-short-term wind power prediction methods do not fully consider the influence of wind speed frequency components and wind turbine states. This leads the prediction accuracy is difficult to improve. A...
详细信息
ISBN:
(纸本)9781728133997
The existing ultra-short-term wind power prediction methods do not fully consider the influence of wind speed frequency components and wind turbine states. This leads the prediction accuracy is difficult to improve. An ultrashort-term wind power prediction method is proposed. This method is based on long short-term memory (LSTM) network with wind speed components and wind turbines states. Based on the filtering characteristics of LSTM, the wind speed components with different resolutions are screened automatically. These components were generated by wavelet packet decomposition (WPD) and ensemble empirical mode decomposition (EEMD). The forecasting results show that wind speed components and wind turbines states be used as the network input. The prediction accuracy can be improved. The error index will be smaller when wind turbine states was considered. Considering yaw error and rotor speed of wind turbine states, the mean absolute percentage error at the 5 s time interval is 2.72%.
The cascading failure is accompanied by a sustained reduction in the topological connectivity of the network until the network is disconnected. From the perspective of the contingency analysis, the number of topologic...
详细信息
ISBN:
(纸本)9781728133997
The cascading failure is accompanied by a sustained reduction in the topological connectivity of the network until the network is disconnected. From the perspective of the contingency analysis, the number of topological change trajectories of a cascading failure process is large, and the enumeration representation is cumbersome. In order to make full use of all the information of the topology variation trajectory space effectively and simply, the method of probability analysis is worth considering. First, this paper defines the probabilistic connectivity matrix of the network to describe the connectivity characteristics of the variation trajectory space. Second, the variation-connectivity sequence is defined according to the N-k connectivity expectation and the network disconnection probability. This sequence formulates the topological connectivity of the variable power network. Third, this paper gives a method to judge the strength of the variation of power network connectivity. Fourth, this paper defines the variation-connectivity sequence of the main grid. The results of the studies on several power network cases show that the variation-connectivity sequence can well describe the connectivity of the variable power network, and help to reveal the topological evolution characteristic of the power network in the cascading failure process.
Change is inevitable for software systems to deal with the evolving environment surrounding them, and applying changes requires careful design and implementation not to break existing functionalities. Evolution in sof...
详细信息
ISBN:
(纸本)9781450364645
Change is inevitable for software systems to deal with the evolving environment surrounding them, and applying changes requires careful design and implementation not to break existing functionalities. Evolution in software product lines (SPLs) is more complex compared to evolution for individual products: a change applied to a single feature might affect all the products in the whole product family. In this paper we present an approach for change impact analysis in delta-oriented programming (DOP), an existing language aimed at supporting SPLs. We propose the CIAHelper tool to identify dependencies within a DOP program, by analyzing the semantics of both the code artifacts and variability models to construct a directed dependency graph. We also consider how the source code history could be used to enhance the recall of detecting the affected artifacts given a change proposal. We evaluate our approach by means of five case studies on two different DOP SPLs.
暂无评论