Control software and platforms for single or cooperative robots are highly complicated because they coordinate and administer the interaction of a variety of distributed and heterogeneous hardware and software compone...
详细信息
ISBN:
(纸本)9781509007943
Control software and platforms for single or cooperative robots are highly complicated because they coordinate and administer the interaction of a variety of distributed and heterogeneous hardware and software components in a dynamic world. While most of such systems built on some uniform middleware or control system for all distributed nodes which come with restrictions in flexibility on several levels, we aim at a more flexible and open architecture of autonomous components in the style of IoT. In this paper, we introduce a platform independent robotics framework based on an IoT technology and protocols. We compare our architecture with other recent approaches and according to fundamental criteria, we discuss advantages and drawbacks.
We describe the design and implementation of a workbench for molecular biology that allows the easy integration of analysis tools. The software is implemented in Tcl/Tk using the [incr Tcl] extension that provides obj...
详细信息
We describe the design and implementation of a workbench for molecular biology that allows the easy integration of analysis tools. The software is implemented in Tcl/Tk using the [incr Tcl] extension that provides object-oriented programming. The program is called tkGDE and consists of four main parts. The sequence editor allows the user to perform basic editing operations on biomolecule sequences, The graphical annotation editor gives the user a graphical overview of all annotated features of a sequence. The output manager retains information on the results produced by the analysis tools, The bundle control allows several tools to run automatically, passing data from one tool to the next, Tools are integrated into the system by describing their properties in a configuration file, which drastically reduces the time needed for integration. We present results proving that Tcl/Tk has been misjudged to be slow and unsuited for large projects, To achieve sufficient performance we exploited special features of Tcl/Tk, namely idle tasks and the capabilities built into the Tk canvas widget. The system consists of more than 34 000 lines of [incr Tcl] code in 182 classes. The whole development process took about one person-year. Copyright (C) 2000 John Wiley & Sons, Ltd.
In object-oriented programming languages, objects with polymorphic attributes can negatively impact performance and hinder static analysis. These attributes require dynamic dispatch, which is slower than static bindin...
详细信息
ISBN:
(纸本)9798400708688
In object-oriented programming languages, objects with polymorphic attributes can negatively impact performance and hinder static analysis. These attributes require dynamic dispatch, which is slower than static binding, and complicate the analysis process. We propose a novel algorithm for object specialization that addresses this issue by replacing polymorphic attributes with monomorphic ones, resulting in improved performance and simplified static analysis. Our algorithm is a new approach compared to existing function specialization algorithms. We provide a proof of the algorithm’s soundness and correctness, and present an implementation of the algorithm as a software tool. Empirical evaluation shows that our approach achieves significant improvements in performance and simplifies the static analysis process. Our algorithm can be applied to a variety of object-oriented languages such as Java and Python.
Simulations offer an engaging way to learn about decomposition of complex systems. Here I describe a project where the goal is to build a simulation of an ant colony consisting of five different ant behaviors in a 2D ...
详细信息
ISBN:
(纸本)9781450318686
Simulations offer an engaging way to learn about decomposition of complex systems. Here I describe a project where the goal is to build a simulation of an ant colony consisting of five different ant behaviors in a 2D environment. Students design and build their simulations with no code provided except for the required GUI. Design issues include choice of appropriate data structures; traversal issues; and using inheritance to model ant behaviors. Students also learn about emergence, as characterized by the development of organized foraging trails by ants that respond only to their immediate surroundings. The visualization requirement enables students to quickly determine whether or not requirements have been met, and provides a way to rapidly grade a moderately large and complex assignment.
In order to solve the problem of modeling, deduction and measurement of operational concepts, a method of modeling and measurement of operational concepts based on Joint Mission Thread (JMT) and Activity-Based Method ...
详细信息
ISBN:
(数字)9781728161068
ISBN:
(纸本)9781728161075
In order to solve the problem of modeling, deduction and measurement of operational concepts, a method of modeling and measurement of operational concepts based on Joint Mission Thread (JMT) and Activity-Based Method (ABM) is proposed. Combining the actual situation of our country and its own characteristics, according to the characteristics of ABM and JMT, the operational concepts are modeled. Through model deduction based on OPM (object-Process Methodology), the function and logic of the operational concepts are tested. Combining with JMT, the operational concepts are decomposed into indicators to realize the measurability of the operational concepts. This method can provide reference for the normative description, modeling, testing and index decomposition of operational concepts.
In a repetitive transaction object-oriented system, a trade-off for an access control mechanism is accomplished in satisfying both the requirements of user friendliness and system performance. Since access control in ...
详细信息
In a repetitive transaction object-oriented system, a trade-off for an access control mechanism is accomplished in satisfying both the requirements of user friendliness and system performance. Since access control in object-oriented systems is applied to individual methods of individual objects, hence the overhead is extremely large because a check is done on every method invocation. To properly solve the two requirements above, we present a design with the following main features : (1) the whole environment is a central controlled, opened, object-oriented system with discretionary access control, and is trying to satisfy both hierarchical and non-hierarchical control requirements. (2) a rule-based method is provided for user to describe their access control policies (3). After a series of transformation and optimization processes, the access control policies are translated into access control list table with one to one mapping between resource object id's and user id's. (4) finally, because an ACL table is maintained in main memory for each user who repetitively use resource objects in the system, there is only zero or one disk access needed per one access authorization check. A theoretical analysis of the time complexity of this design has been made, and we have implemented it by using high speed workstation, UNIX, C++ and C-ISAM.< >
This paper deals first with the results of training students in computer simulation at the Computer Science Department of the University of Ostrava during the last 15 years. Education and training in computer simulati...
详细信息
ISBN:
(纸本)9789549641387
This paper deals first with the results of training students in computer simulation at the Computer Science Department of the University of Ostrava during the last 15 years. Education and training in computer simulation are based on an obligatory course of SIMULA taking two semesters. The special attention is paid to implementing nested (especially reflective) simulation models of production and logistic systems for enterprises and institutions outside educational system.
Designing and programming require several types of knowledge. Beside conceptual knowledge, procedural knowledge is of importance. Procedural knowledge, however, is often missed in courses about software design and imp...
详细信息
ISBN:
(纸本)9781450348362
Designing and programming require several types of knowledge. Beside conceptual knowledge, procedural knowledge is of importance. Procedural knowledge, however, is often missed in courses about software design and implementation. As a consequence, students can easily be stuck and do not know how to *** software engineering as a complex task, the didactic approach 4C/ID is applicable. This approach prescribes that besides mental models, cognitive strategies should be learned, consisting of overall steps and rules and procedures per step. As an example, a procedure for designing and programming a concurrent program is briefly described. This procedure will scaffffold studentfis learning of concurrency concepts and their application.
Despite the many integration tools proposed for mapping between OWL ontologies and the object-oriented paradigm, developers are still reluctant to incorporate ontologies into their code repositories. In this paper we ...
详细信息
Despite the many integration tools proposed for mapping between OWL ontologies and the object-oriented paradigm, developers are still reluctant to incorporate ontologies into their code repositories. In this paper we survey existing approaches for OWL-to-OOP mapping trying to identify reasons for this shy adoption of ontologies among conventional software developers. We present a classification of the surveyed approaches and tools based on their technical characteristics and their resulting artifacts. We discuss further potential reasons beyond what have been addressed in the literature before finally providing our own reflection and outlook.
This paper presents a methodology for extracting objects from legacy imperative code. The parameter-based object identification (PBOI) methodology is based on the thesis that object attributes manifest themselves as d...
详细信息
ISBN:
(纸本)9780818679612
This paper presents a methodology for extracting objects from legacy imperative code. The parameter-based object identification (PBOI) methodology is based on the thesis that object attributes manifest themselves as data items passed from subprogram to subprogram in the imperative paradigm. A taxonomy of imperative subprograms is presented and the PBOI methodology is defined. Several examples are provided.
暂无评论