We introduce the notion of strongly distributed multi-agent systems and present a uniform approach to incremental automatedreasoning on them. the approach is based on systematic use of two logical reduction technique...
详细信息
Withthe development of in-vehicle network (IVN) technology, the real-time performance and reliability of vehicle Ethernet become very important. Time-sensitive network (TSN) has become a new technical solution for ve...
详细信息
ISBN:
(数字)9798350361445
ISBN:
(纸本)9798350361452
Withthe development of in-vehicle network (IVN) technology, the real-time performance and reliability of vehicle Ethernet become very important. Time-sensitive network (TSN) has become a new technical solution for vehicle Ethernet because of its high accuracy of data transmission. To solve the problem of low scheduling efficiency and poor real-time transmission in traffic scheduling in TSN, the optimization of traffic scheduling time is studied in the network from the aspect of scheduling algorithm. Firstly, the time slot scheduling model of time-sensitive flows is established. then, a hybrid scheduling strategy considering traffic routing and traffic scheduling optimization is designed. In the routing strategy, the ant colony algorithm is designed to optimize the traffic transmission path. In the scheduling strategy, a time planning model is established and the global scheduling schedule is optimized by mixed integer programming algorithm. Finally, the traffic scheduling simulation and gated scheduling experiment verify that the proposed scheduling optimization algorithm can significantly improve the efficiency and real-time performance of traffic scheduling in vehicle TSN.
Computational thinking (CT) is a thought process which utilize computer science concepts to solve problem in the real life. One of the methods to develop CT among the Children is by using visual programming to create ...
详细信息
A Binary Integer Linear Programing (BILP) model was used to find the Fuzzy Critical Path (FCP) of a fuzzy project network, when the lengths of all activities are represented as Octagonal Fuzzy Numbers (OFN). Although ...
详细信息
In this paper, we explore strategies for automated parallelization and reconfiguration across heterogeneous multi-core processor, based on a programming paradigm and an associated model of computation designed for eff...
详细信息
An example is given of a software algorithm that implements its specification in linear time temporal logic (LTL), but not in branching time temporal logic (CTL). In LTL, a prophecy of future behaviour is needed to pr...
详细信息
An example is given of a software algorithm that implements its specification in linear time temporal logic (LTL), but not in branching time temporal logic (CTL). In LTL, a prophecy of future behaviour is needed to prove the simulation. Eternity variables are used for this purpose. the final phase of the proof is a refinement mapping in which two threads exchange roles. the example is a software implementation of trylock in a variation of the fast mutual exclusion algorithm of Lamport (1987). It has been used fruitfully for the construction of software algorithms for high performance mutual exclusion. (C) 2021 the Author(s). Published by Elsevier B.V.
Deploying and training deep neural networks on mobile devices is a challenging task as machine learning applications increasingly require real-time data processing and on-device training capabilities. the ARM micropro...
详细信息
ISBN:
(数字)9798331531836
ISBN:
(纸本)9798331531843
Deploying and training deep neural networks on mobile devices is a challenging task as machine learning applications increasingly require real-time data processing and on-device training capabilities. the ARM microprocessor architecture for mobile devices and embedded systems offers attractive platforms for edge machine learning. there are various machine learning libraries optimized for resource-constrained environments. this paper discusses the TensorFlow Lite library, the process of running and training machine learning models directly on ARM devices using TensorFlow Lite. It discusses the technical implementation, challenges, and optimizations required to achieve efficient training and running of neural network models using mobile devices withthe Aurora operating system as an example. Finally, an example of implementing and training a neural network model on the Aurora OS in the C++ programming language without using additional libraries is given as an alternative to the TensorFlow Lite library.
Our world is increasingly shaped by Artificial Intelligence systems, from search engines over automated hiring algorithms to self-driving cars. Being also used in high-stake decisions, their impact on the life of indi...
详细信息
the protection system on a three-phase induction motor is designed so that the motor can be used for a longer period of time and avoid damage. Disturbances such as overloads and high temperatures that occur can interf...
the protection system on a three-phase induction motor is designed so that the motor can be used for a longer period of time and avoid damage. Disturbances such as overloads and high temperatures that occur can interfere withthe performance of the induction motor and shorten its use time. therefore, a protection system for the induction motor is needed. the method used in this paper is the design of a simulation of an overload and high temperature protection system on a three-phase induction motor with a Zelio smart relay using Zeliosoft 2.0 software by making a Ladder diagram as well as the simulation. To protect the three-phase induction motor, additional components are used, namely the thermal Overload Relay (TOR) for overload protection and the Temperature Controller for high temperatures. the maximum limit of current to be protected by TOR is 1.6 A, and the maximum temperature limit to be protected by the Temperature Controller is 50 °C. Both components are integrated by the Zelio smart relay. In the process stage of the program itself, the TOR and Temperature Controller will send a trip signal to the Zelio smart relay when there is more load interference and a high temperature. the Zelio smart relay will then secure the motor from interference by stopping the power to the motor.
Despite enduring criticisms spanning several decades, jump statements such as goto, break, continue, and return remain prevalent in imperative programming languages, including but not limited to C++, Java, and Python....
详细信息
ISBN:
(纸本)9798400708688
Despite enduring criticisms spanning several decades, jump statements such as goto, break, continue, and return remain prevalent in imperative programming languages, including but not limited to C++, Java, and Python. the academic community has yet to reach a consensus regarding whether the refactoring of source code in these languages to eliminate such statements can indeed enhance code readability. Nevertheless, it is evident that automated program analysis would derive substantial benefits from this refactoring, given that structured code analysis is more straightforward than analyzing code that exhibits capricious alterations in its control flow. While algorithms tailored for this refactoring process have been proposed for certain imperative languages, we introduce a congruent algorithm, specifically designed for a dataflow programming language. It’s important to note that although dataflow languages lack jump statements, they might incorporate jump-objects (in object-oriented contexts) or jump-functions (within functional paradigms). Our algorithm has been instantiated as a command-line tool tailored for refactoring EO, an object-oriented dataflow language. Preliminary tests with several EO programs have validated the tool’s efficacy. Leveraging φ -calculas, we provide a formal proof underscoring the validity of every transformation encompassed within our algorithm.
暂无评论