Self-healing spatio-temporal data streaming systems enable error detection and data correction based on error signatures. Error signatures are mathematical function patterns with constraints and are used to identify a...
详细信息
ISBN:
(纸本)9781479948970
Self-healing spatio-temporal data streaming systems enable error detection and data correction based on error signatures. Error signatures are mathematical function patterns with constraints and are used to identify and categorize errors in redundant spatio-temporal data streams. In this paper, we apply these methods to real data from a private Cessna flight and from the Air France AF447 accident in June 2009. For the private Cessna flight, three error scenarios are simulated: pitot tube failure, GPS failure, and simultaneous pitot tube and GPS failures. The error detection accuracy is approximately 93% and the response time to correct data is at most 5 seconds. For the AF447 flight, 162 seconds of available flight data including the pitot tubes failure is collected from the accident report. The pitot tube failure of the AF447 flight is successfully detected and corrected after 5 seconds from the beginning of the failure. Overall error mode detection accuracy reaches 96.31%. Furthermore, our simulations show that the system never corrects data incorrectly, i.e., all inaccurate mode detections produce either unknown or unrecoverable errors.
Production compilers implement optimizing transformation rules for built-in types. What justifies applying these optimizing rules is the axioms that hold for built-in types and the built-in operations supported by the...
详细信息
Production compilers implement optimizing transformation rules for built-in types. What justifies applying these optimizing rules is the axioms that hold for built-in types and the built-in operations supported by these types. Similar axioms also hold for user-defined types and the operations defined on them, and therefore justify a set of optimization rules that may apply to user-defined types. Production com- pilers, however, do not attempt to construct and apply these optimization rules to user-defined types. Built-in types together the axioms that apply to them are instances of more general algebraic structures. So are user-defined types and their associated axioms. We use the technique of generic programming, a programming paradigm to design efficient, reusable software libraries, to identify the commonality of classes of types, whether built-in or user-defined, convey the semantics of the classes of types to compilers, design scalable and effective program analysis for them, and eventually apply optimizing rules to the operations on them. In generic programming, algorithms and data structures are defined in terms of such algebraic structures. The same definitions are reused for many types, both built-in and user-defined. This dissertation applies generic programming to compiler analyses and transformations. Analyses and transformations are specified for general algebraic structures, and they apply to all types, both built-in and primitive types.
Although robot has been around for many years, the programming language for robot control is still hard for ordinary persons. To promote robot into live of ordinary persons, an easier control language is one of necess...
详细信息
ISBN:
(纸本)9783037858745
Although robot has been around for many years, the programming language for robot control is still hard for ordinary persons. To promote robot into live of ordinary persons, an easier control language is one of necessity. We need a control language that can be programmed in any words and not limited to English. Forth is one of computer language that can define new commands in any printable characters on keyboard. This study explored eforth, one of kind of Forth, build on ATMEGA328P chip which is used on the world wide popular Ardunino UNO board is called 328eForth system. A 328eForth system has been developed that can be used to control hardware peripherals using Traditional Chinese command. It has simple programming rules, compact system size, and is an open source control language which used in robotic and mechatronic control and education for public.
People program in many different programming languages in the multi-core era, but how does each programming language affect application scalability with transactional memory? As commercial implementations of Hardware ...
详细信息
ISBN:
(纸本)9781479905539
People program in many different programming languages in the multi-core era, but how does each programming language affect application scalability with transactional memory? As commercial implementations of Hardware Transactional Memory (HTM) enter the market, the HTM support in two major programming languages, C and Java, is of critical importance to the industry. We studied the scalability of the same transactional memory applications written in C and Java, using the STAMP benchmarks. We performed our HTM experiments on an IBM mainframe zEnterprise EC12. We found that in 4 of the 10 STAMP benchmarks Java was more scalable than C. The biggest factor in this higher scalability was the efficient thread-local memory allocator in our Java VM. In two of the STAMP benchmarks C was more scalable because in C padding can be inserted efficiently among frequently updated fields to avoid false sharing. We also found Java VM services could cause severe aborts. By fixing or avoiding these problems, we confirmed that C and Java had similar HTM scalability for the STAMP benchmarks.
C languageprogramming is a specialized basic course of students who major in Computer and others at vocational colleges,which has great impacts on the study of many related follow-up ***,we not only explore but also ...
详细信息
C languageprogramming is a specialized basic course of students who major in Computer and others at vocational colleges,which has great impacts on the study of many related follow-up ***,we not only explore but also carry out teaching methods of C languageprogramming at vocational *** various teaching methods and ways mainly represented by the project teaching method have been utilized,favorable teaching effects are obtained in practical teaching.
The ever-growing number of cores in embedded chips emphasizes more than ever the complexity inherent to parallel pro- gramming. To solve these programmability issues, there is a renewed interest in the dataflow paradi...
详细信息
The ever-growing number of cores in embedded chips emphasizes more than ever the complexity inherent to parallel pro- gramming. To solve these programmability issues, there is a renewed interest in the dataflow paradigm. In this context, we present a compilation toolchain for the ΣC language, which allows the hierarchical construction of stream applications and automatic mapping of this application to an embedded manycore target. As a demonstration of this toolchain, we present an implementation of a H.264 encoder and evaluate its performance on Kalray's embedded manycore MPPA chip.
In the recent past, intragenic microRNAs (miRNAs) have gained significant attention. Due to the unique linkage to their host gene’s transcription, these miRNAs offer more information than intergenic miRNAs as they as...
详细信息
In the recent past, intragenic microRNAs (miRNAs) have gained significant attention. Due to the unique linkage to their host gene’s transcription, these miRNAs offer more information than intergenic miRNAs as they associate with some of their hosts’ properties. However, genome wide analysis of intronic miRNA data can be very challenging, especially if it relies on Web-based tools only. We therefore describe in this chapter how to set a database and how to link the different publicly available information resources on miRNAs and host genes. We also provide an example of a simple, but useful analysis technique. The basic structures and ideas suggested in this chapter can easily be extended to integrating other data and be applied to different analysis techniques. less
Particle tracking is of key importance for quantitative analysis of intracellular dynamic processes from time-lapse microscopy image data. Because manually detecting and following large numbers of individual particles...
详细信息
Particle tracking is of key importance for quantitative analysis of intracellular dynamic processes from time-lapse microscopy image data. Because manually detecting and following large numbers of individual particles is not feasible, automated computational methods have been developed for these tasks by many groups. Aiming to perform an objective comparison of methods, we gathered the community and organized an open competition in which participating teams applied their own methods independently to a commonly defined data set including diverse scenarios. Performance was assessed using commonly defined measures. Although no single method performed best across all scenarios, the results revealed clear differences between the various approaches, leading to notable practical conclusions for users and developers. less
In high-throughput sequencing experiments, the number of reads mapping to a genomic region, also known as the “coverage” or “coverage depth,” is often used as a proxy for the abundance of the underlying genomic re...
详细信息
In high-throughput sequencing experiments, the number of reads mapping to a genomic region, also known as the “coverage” or “coverage depth,” is often used as a proxy for the abundance of the underlying genomic region in the sample. The abundance, in turn, can be used for many purposes including calling SNPs, estimating the allele frequency in a pool of individuals, identifying copy number variations, and identifying differentially expressed shRNAs in shRNA-seq experiments. In this chapter we describe the fundamentals of statistical modeling of coverage depth and discuss the problems of estimation and inference in the relevant experimental scenarios. less
Assessment of gene function oftentimes requires mutant populations that can be screened by forward or reverse genetic analysis. The situation becomes more complicated in polyploidy or paleopolyploid genomes that have ...
详细信息
Assessment of gene function oftentimes requires mutant populations that can be screened by forward or reverse genetic analysis. The situation becomes more complicated in polyploidy or paleopolyploid genomes that have two or more copies for most genes. Here we describe a method for engineering zinc-finger nucleases (ZFNs) for the purpose of creating targeted mutations in the paleopolyploid soybean genome. ZFNs are recombinant proteins composed of an engineered zinc-finger array fused to a nonspecific cleavage domain. When engineered to recognize a specific nucleotide sequence, the cleavage domain will generate highly mutagenic DNA double-strand breaks frequently resulting in insertions and deletions at the target locus. Depending on the number of target sites present within the genome, this method has the capacity to target either single- or multi-copy gene families. In this chapter, we describe an inexpensive, rapid, and user-friendly approach for ZFN assembly and application in soybean based on the previously described context-dependent assembly method. less
暂无评论