Python is a powerful high-level open source programming language that is available for multiple platforms. It supports object-oriented programming and has recently become a serious alternative to low-level compiled la...
详细信息
Python is a powerful high-level open source programming language that is available for multiple platforms. It supports object-oriented programming and has recently become a serious alternative to low-level compiled languages such as C++. It is easy to learn and use, and is recognized for very fast development times, which makes it suitable for rapid software prototyping as well as teaching purposes. We motivate the use of Python and its free extension modules for high performance stand-alone applications in econometrics and statistics, and as a tool for gluing different applications together. (It is in this sense that Python forms a "unified" environment for statistical research.) We give details on the core language features, which will enable a user to immediately begin work, and then provide practical examples of advanced uses of Python. Finally, we compare the run-time performance of extended Python against a number of commonly-used statistical packages and programming environments.
Confusion between ICT and computer science has lead to an underestimation of the latter in the schools' curricula. Students are involved to use computers rather than to create and produce. Many efforts are done to...
详细信息
ISBN:
(纸本)9781467316781;9781467316798
Confusion between ICT and computer science has lead to an underestimation of the latter in the schools' curricula. Students are involved to use computers rather than to create and produce. Many efforts are done toward inserting computer science in the schools' curricula;However, Computer science should be treated at an equal level with other sciences. The concepts are not more complex than other sciences. Psychologists and pedagogists prove that students are able to learn different concepts according to their intellectual age when these concepts are brought to them with an appropriate methodology.
This paper presents the design of a load management device for the load management of a distribution network in presence of Electric Vehicles (EV). With a projected EV penetration of up to 50% by 2050, the life expect...
详细信息
ISBN:
(纸本)9781467320801;9781467320818
This paper presents the design of a load management device for the load management of a distribution network in presence of Electric Vehicles (EV). With a projected EV penetration of up to 50% by 2050, the life expectancy of already overloaded utility transformers and other network assets needs to be investigated to accommodate large penetration of EV loads. This research work has been done in collaboration with the local utility London Hydro, to create a device that is capable of handling heavy residential loads, and providing network control of loads, such as, EVs to increase better network asset management. Two Atmel microcontroller based hardware boards are used. One hardware board is used to get load information from the utility transformer whereas the other is used to control the EV loads and household appliances. Based on the load information from the transformer, one microcontroller sends control signal to the other controller running on customer premises to switch ON/OFF the EV load or any other appliances thus controlling the load on the network. The main purpose of this device is to automatically reallocate loads in an attempt to prevent damage to overhead residential transformers due to overloading and also offers the capability of reducing consumer energy use. This device when installed in a utility network will reduce cost to the home owner, and will increase network sustainability.
This article looks at the development of the C language from its inception to the present day. The salient features of the language, which are of importance both historically as well as from the point of view of the i...
详细信息
This article looks at the development of the C language from its inception to the present day. The salient features of the language, which are of importance both historically as well as from the point of view of the industry, are brought out. Also, the impact of C as a cross-platform developmental language is highlighted.
This article introduces AUX (AUditory syntaX), a scripting syntax specifically designed to describe auditory signals and processing, to the members of the behavioral research community. The syntax is based on descript...
详细信息
This article introduces AUX (AUditory syntaX), a scripting syntax specifically designed to describe auditory signals and processing, to the members of the behavioral research community. The syntax is based on descriptive function names and intuitive operators suitable for researchers and students without substantial training in programming, who wish to generate and examine sound signals using a written script. In this article, the essence of AUX is discussed and practical examples of AUX scripts specifying various signals are illustrated. Additionally, two accompanying Windows-based programs and development libraries are described. AUX Viewer is a program that generates, visualizes, and plays sounds specified in AUX. AUX Viewer can also be used for class demonstrations or presentations. Another program, Psycon, allows a wide range of sound signals to be used as stimuli in common psychophysical testing paradigms, such as the adaptive procedure, the method of constant stimuli, and the method of adjustment. AUX Library is also provided, so that researchers can develop their own programs utilizing AUX. The philosophical basis of AUX is to separate signal generation from the user interface needed for experiments. AUX scripts are portable and reusable;they can be shared by other researchers, regardless of differences in actual AUX-based programs, and reused for future experiments. In short, the use of AUX can be potentially beneficial to all members of the research community-both those with programming backgrounds and those without.
Teaching cryptography usually requires students to have a comprehensive understanding of algebra, number theory as well as good knowledge in basic computer science. Particularly public-key cryptography is often a chal...
详细信息
ISBN:
(纸本)9781467324274
Teaching cryptography usually requires students to have a comprehensive understanding of algebra, number theory as well as good knowledge in basic computer science. Particularly public-key cryptography is often a challenge to teach and understand without detailed examples and the possibility to implement an algorithm to really see how it works. However, most of the arithmetic appearing in cryptography is not directly supported by the common programming languages, and usually buried within complicated libraries. Software tools that natively support cryptographic operations are rare and most teaching in this area must be done with general purpose software like computer algebra systems. In this work, we report on a newly developed software system called SUNSET, which provides a programming language that natively supports operations within finite fields, rings and modulo groups. It has been explicitly designed for usage within classrooms and for rapid prototyping of cryptographic protocols. Contrary to many computer algebra systems and conventional programming languages, it does not require reference to external libraries or add-on packages, and lets a student implement a cryptographic algorithm in a way almost as it is printed in the papers.
The purpose of this thesis is to propose the plagiarism detection approach aiming at C++ programs for student's assignments. The proposed approach combines three detection methods including structural analysis, va...
详细信息
ISBN:
(纸本)9780769547633;9781467321389
The purpose of this thesis is to propose the plagiarism detection approach aiming at C++ programs for student's assignments. The proposed approach combines three detection methods including structural analysis, variable analysis, and text analysis to construct a CPD (C++ Plagiarism Detection) system. For proving the effectiveness of the proposed approach, the CPD system was compared with other existing systems including one proprietary software and some academic researches. The experimental result showed the CPD system can detect more kinds of plagiarism patterns than other existing systems. Moreover, the combining approach was also compared with every single method. Also, the result proved the proposed approach was strongly avoiding many weaknesses which are inherently possessed in every single method. Finally, object-oriented analysis is presented by a case study.
In object-oriented programming (OOP) languages, the ability to encapsulate software concerns of the dominant decomposition in objects is the key to reaching high modularity and loss of complexity in large scale design...
详细信息
In object-oriented programming (OOP) languages, the ability to encapsulate software concerns of the dominant decomposition in objects is the key to reaching high modularity and loss of complexity in large scale designs. However, distributed-memory parallelism tends to break modularity, encapsulation, and functional independence of objects, since parallel computations cannot be encapsulated in individual objects, which reside in a single address space. For reconciling object-orientation and distributed-memory parallelism, this work introduces OOPP (Object-Oriented Parallel programming), a style of OOP where objects are distributed by default. As an extension of C++, a widespread language in HPC, the PObC++ language has been designed and protoyped, incorporating the ideas of OOPP
In recent years, much research has been devoted to the refinement of IPv6;on the other hand, few have investigated the confusing unification of interrupts and Internet QoS. In this position paper, it demonstrates the ...
详细信息
ISBN:
(纸本)9780878492183
In recent years, much research has been devoted to the refinement of IPv6;on the other hand, few have investigated the confusing unification of interrupts and Internet QoS. In this position paper, it demonstrates the emulation of interrupts. In order to overcome this quagmire, a novel system is presented for the intuitive unification of expert systems and massive multiplayer online role-playing games. It is concluded that erasure coding can be verified to make heterogeneous, interposable, and event-driven, which is proved to be applicable.
Wireless sensor networks have opened opportunities for new applications and attracted users from domains beyond computer system design. Sensor network design is challenging. It is generally an ad hoc process carried o...
详细信息
Wireless sensor networks have opened opportunities for new applications and attracted users from domains beyond computer system design. Sensor network design is challenging. It is generally an ad hoc process carried out by embedded system experts. In this dissertation, we argue that human efforts necessary to the design of sensor networks can be reduced with the help of high-level specification languages, compilers, and synthesis tools. We designed and implemented a framework to simplify and automate the design of a class of sensor network applications. Our results show that a sensor network novice given only a few pages of instructions, can successfully specify sensing applications within 30 minutes, compared with hours or days required by prior approaches. Within approximately 30 minutes, our modeling and design exploration techniques translate these specifications into implementations, automatically selecting from among 405,790 designs. Moreover, our memory management and compiler-assisted techniques make difficult-to-implement optimizations available to novice programmers, enabling better tolerance of sensor faults and making 39% more usable memory available than would otherwise be the case. We propose a design process that decouples specification from implementation. Application designers specify abstract functionality and design requirements. Compiler and synthesis tools automatically determine implementation details, optimizing design parameter optimization and generating code. First, we develop a design process in which programming novices (e.g., application experts) use high-level, specification languages designed for particular classes of applications. We focus on the class most commonly encountered in sensor network deployment publications. Second, we develop two compiler and runtime techniques to relieve application experts from explicitly dealing with sensor faults and limited memory, two common sources of sensor network design complexity. The first tec
暂无评论