Introducing a fast and accurate method to estimate the seismic demand and capacity of first-mode-dominated multidegree-of-freedom systems in regions ranging from near-elastic to global collapse. this is made possible ...
详细信息
Introducing a fast and accurate method to estimate the seismic demand and capacity of first-mode-dominated multidegree-of-freedom systems in regions ranging from near-elastic to global collapse. this is made possible by exploiting the connection between the static pushover (SPO) and the incremental dynamic analysis (IDA). While the computer-intensive IDA would require several nonlinear dynamic analyses under multiple suitably scaled ground motion records, the simpler SPO helps approximate the multidegree-of-freedom system with a single-degree-of-freedom oscillator whose backbone matches the structure's SPO curve far beyond its peak. Similar methodologies exist but they usually employ oscillators with a bilinear backbone. In contrast, the empirical equations implemented in the static pushover 2 incremental dynamic analysis (SPO2IDA) software allow the use of a complex quadrilinear backbone shape. thus, the entire summarized IDA curves of the resulting system are effortlessly generated, enabling an engineer-user to obtain accurate estimates of seismic demands and capacities for limit-states such as immediate occupancy or global dynamic instability. Using three multistory buildings as case studies, the methodology is favorably compared to the full IDA.
this paper describes a teaching supporting tool (called Portfolio-Tutor), which is based on the principles of ITS (Intelligent Tutoring systems), Electronic Portfolio (e-portfolio) and Agents. the teaching supporting ...
详细信息
It is desirable to integrate formal verification techniques applicable to different languages. We present *** 2.0, a new tool of the CADP verification toolbox which combines several features. First, *** 2.0 allows to ...
详细信息
ISBN:
(纸本)3540304924
It is desirable to integrate formal verification techniques applicable to different languages. We present *** 2.0, a new tool of the CADP verification toolbox which combines several features. First, *** 2.0 allows to describe concurrent systems as a composition of finite state machines, using either synchronization vectors, or parallel composition, hiding, renaming, and cut operators from several process algebras (Ccs, Csp, LOTOS, E-LOTOS, mu CRL). Second, together with other tools Of CADP, *** 2.0 allows state space generation and on-the-fly exploration. third, *** 2.0 implements on-the-fly partial order reductions to avoid the generation of irrelevant interleavings of independent transitions. Fourth, *** 2.0 allows to export models towards other tools using interchange formats such as automata networks and Petri nets. Finally, we show some practical applications and measure the efficiency of *** 2.0 on several benchmarks.
the automatic meter reading (AMR) system has become a necessity for most utilities because of deregulation, free customer choice and open market competition. A trend towards replacing the electromechanical meters with...
详细信息
the automatic meter reading (AMR) system has become a necessity for most utilities because of deregulation, free customer choice and open market competition. A trend towards replacing the electromechanical meters with new designs, that can transmit their reading without any human intervention is in progress. In spite of developing new systems, this paper describes methodology that can modify existing electromechanical disc-type energy meters to AMR. Visual Basic (VB) programming language is used to interface our prototype design with personal computer at company's end. All the programming of microcontroller is done using Keil software. One such designed hardware unit can convert sixteen different meters data to AMR.
Withthe scaling of technology, transient errors caused by external particle strikes have become a critical challenge for microprocessor design. As embedded processors are widely used in reliability-sensitive environm...
详细信息
ISBN:
(纸本)1595930914
Withthe scaling of technology, transient errors caused by external particle strikes have become a critical challenge for microprocessor design. As embedded processors are widely used in reliability-sensitive environments, it becomes increasingly important to develop cost-effective techniques to improve the processor reliability against soft errors. this paper focuses on studying the register file immunity against soft errors since modern processors typically employ a large number of registers, which are accessed very frequently. As a result, soft errors occurred in registers can easily propagate to functional units or the memory system, leading to silent data error (SDC) or system crash. To develop cost-effective techniques to fight soft errors for embedded processors, the first step is to understand the register file susceptibility to soft errors and its impact on the system reliability accurately. Toward this goal, this paper proposes the concept of register vulnerability factor (RVF) to characterize the probability that register transient errors can escape the register file and thus potentially impact the system reliability. Built upon the RVF concept, we then propose two cost-effective compiler-guided techniques to improve the register file reliability by lowering the RVF value. Our experiments indicate that on average, the RVF can be reduced to 9.1% and 9.5% by the hyperblock-based instruction re-scheduling and the reliability-oriented register assignment respectively, which can potentially lower the reliability cost significantly while protecting register files against transient errors. Copyright 2005 ACM.
systems constructed from diverse software products are often difficult to assemble and deploy correctly, particularly as the products evolve and the underlying platform changes over time. Many of these problems arise ...
详细信息
ISBN:
(纸本)3540245480
systems constructed from diverse software products are often difficult to assemble and deploy correctly, particularly as the products evolve and the underlying platform changes over time. Many of these problems arise because of the many assumptions and dependencies, often implicit, that software products make about the context in which they are deployed. this paper describes an approach to managing the dependencies between the software elements of a system during assembly and deployment. A formal model of dependencies is developed, and it is shown how the model can be applied during the deployment process to verify the correct assembly of a system. the approach is designed to allow system developers, assemblers, and deployers to be part of the user group that collectively manages the dependencies that exist within an assembly.
this paper describes a product line use case modeling approach tailored towards organizations developing and maintaining extremely long lived software intensive systems. We refer to the approach as the PLUSS approach,...
详细信息
ISBN:
(纸本)3540289364
this paper describes a product line use case modeling approach tailored towards organizations developing and maintaining extremely long lived software intensive systems. We refer to the approach as the PLUSS approach, Product Line Use case modeling for systems and softwareengineering. An industrial case study is presented where PLUSS is applied and evaluated in the target domain. Based on the case study data we draw the conclusion that PLUSS performs better than modeling according to the styles and guidelines specified by the IBM-Rational Unified Process (RUP) in the current industrial context.
Accurate failure diagnosis is crucial in modern complex systems where failures may lead to disastrous consequences. Unfortunately, designing the ideal diagnostic system that meets the increasing requirements of modern...
详细信息
ISBN:
(纸本)9781604234558
Accurate failure diagnosis is crucial in modern complex systems where failures may lead to disastrous consequences. Unfortunately, designing the ideal diagnostic system that meets the increasing requirements of modern systems is not a trivial task, and new tools and techniques are constantly emerging. this paper describes the development of SIGMA, a multi-agent system (MAS) architecture for monitoring and diagnosis in supervisory systems, from its inception to its prototype implementation. the aim is to employ the developed architecture as an infrastructure for the development of real-world supervisory applications.
In this paper, we present a theoretical protocol for autonomic distribution of services in a P2P environment, as well as the results of its simulated implementation. Our objective is to demonstrate that it is possible...
详细信息
Agent Oriented softwareengineering and security patterns have been proposed as suitable paradigms for the development of secure information systems. However, so far, the proposed solutions are focused on one of these...
详细信息
ISBN:
(纸本)3540293892
Agent Oriented softwareengineering and security patterns have been proposed as suitable paradigms for the development of secure information systems. However, so far, the proposed solutions are focused on one of these paradigms. In this paper we propose an agent oriented security pattern language and we discuss how it can be used together withthe Tropos methodology to develop secure information systems. We also present a formalisation of our pattern language using Formal Tropos. this allows us to gain a deeper understanding of the patterns and their relationships, and thus to assess the completeness of the language.
暂无评论