Abstract Modelica models often contain functions with algorithmic code. The fraction of algorithmic code is increasing since Modelica, in addition to equation-based modeling, is also used for embedded system control c...
详细信息
Abstract Modelica models often contain functions with algorithmic code. The fraction of algorithmic code is increasing since Modelica, in addition to equation-based modeling, is also used for embedded system control code and symbolic model transformations in compilers using the MetaModelica language extension. Thus, debugging of algorithmic Modelica code is becoming increasingly relevant. Our earlier work in debuggers for the algorithmic subset of Modelica used trace-based techniques which are very portable but turned out to have too much overhead for very large applications. The new debugger is the first Modelica debugger that can operate without trace information. Instead it communicates with a low-level C-language symbolic debugger, the Gnu debugger GDB, to directly extract information from a running executable, set and remove breakpoints, etc. This is made possible by the new bootstrapped OpenModelica compiler which keeps track of a detailed mapping from the high level Modelica code down to the generated C code compiled to machine code. The debugger is operational, supports browsing of both standard Modelica data structures and tree/list data structures, and operates efficiently on large applications such as the OpenModelica compiler with more than 100 000 lines of code.
Networking Technology, undoubtedly, plays a vital role in modern warfare especially in Network Centric Operations (NCOs) and Global Information Grid (GIG) concept. However, the current popular network infrastructure, ...
详细信息
Networking Technology, undoubtedly, plays a vital role in modern warfare especially in Network Centric Operations (NCOs) and Global Information Grid (GIG) concept. However, the current popular network infrastructure, mainly TCP/IP architecture, is in fact unsuitable with advanced military communication especially in tactical operation networks. The key characteristics of military communications are classified as delay/disruption/disconnection tolerant networks (DTNs) which are long and variable delays, high error rates and greatly heterogeneous. As a result a call for new type of network architecture emerges to support such peculiar characteristics of military communication network. This paper reviews the current approaches in network technology of military communication and proposes the conceptual design of Virtualization Network (VN) for military communication to address the limitation of current network infrastructure. The implementation of Military Network Virtualization Environment (MVNE) introduces the crucial two new key features of military tactical network: information classification and movable nodes. These features along with essential research challenges must be analyzed to realize a viable virtualization network for military communications.
An L(0,1)-labelling of a graph G is an assignment of nonnegative integers to the vertices of G such that the difference between the labels assigned to any two adjacent vertices is at least zero and the difference betw...
详细信息
An L(0,1)-labelling of a graph G is an assignment of nonnegative integers to the vertices of G such that the difference between the labels assigned to any two adjacent vertices is at least zero and the difference between the labels assigned to any two vertices which are at distance two is at least one. The span of an L(0,1)-labelling is the maximum label number assigned to any vertex of G. The L(0,1)-labelling number of a graph G, denoted by λ0.1(G) is the least integer k such that G has an L(0,1)-labelling of span k. This labelling has an application to a computer code assignment problem. The task is to assign integer control codes to a network of computer stations with distance restrictions. A cactus graph is a connected graph in which every block is either an edge or a cycle. In this paper, we label the vertices of a cactus graph by L(0,1)-labelling and have shown that, △-1≤λ0.1(G)≤△ for a cactus graph, where △ is the degree of the graph G.
Software composed of artifacts written in multiple (programming) languages is pervasive in today's enterprise, desktop, and mobile applications. Since they form one system, artifacts from different languages refer...
详细信息
Software composed of artifacts written in multiple (programming) languages is pervasive in today's enterprise, desktop, and mobile applications. Since they form one system, artifacts from different languages reference one another, thus creating what we call semantic cross-language links. By their very nature, such links are out of scope of the individual programming language, they are ignored by most language-specific tools and are often only established -- and checked for errors -- at runtime. This is unfortunate since it requires additional testing, leads to brittle code, and lessens maintainability. In this paper, we advocate a generic approach to understanding, analyzing and refactoring cross-language code by explicitly specifying and exploiting semantic links with the aim of giving developers the same amount of control over and confidence in multi-language programs they have for single-language code today.
In order to measure the effectiveness of safety protection systems there are several design parameters. Diagnostic coverage factor is one of the most important parameter which influences all architectures. In this sho...
详细信息
In the work the issues of stable technological modes of operation of main devices of producing polysterol - reactors have been researched as well as modes of stable operation of a chemical reactor have been presented,...
详细信息
This paper presents a performance analysis of omnidirectional vision based Simultaneous Localization and Mapping (SLAM). In omnidirectional vision based SLAM;robots perform vision based SLAM using only monocular omnid...
详细信息
This paper presents design considerations of indoor and outdoor navigation techniques proposed for unmanned vehicles (UV). In this paper, we mainly investigate the use and the advantages of wireless sensor networks (W...
详细信息
This paper presents design considerations of indoor and outdoor navigation techniques proposed for unmanned vehicles (UV). In this paper, we mainly investigate the use and the advantages of wireless sensor networks (WSNs) for indoor navigation, and Global Positioning System (GPS) for outdoor navigation. The system primarily uses laser range finder (LRF) measurements for indoor navigation, and is based on Extended Kalman Filter (EKF). For outdoor navigation the system uses Inertial Navigation System (INS) measurements. At periodical intervals the system integrates the measurements of an absolute sensor to improve estimations. The absolute sensor is a WSN interface for indoor navigation, and a GPS receiver for outdoor navigation. Simulation studies were conducted using Unified System for Automation and Robot Simulation (USARSim) and Player/Stage. The results of USARSim based simulations prove the advantages of integrating GPS measurements. Player/Stage based simulations show the advantages of integrating Received Signal Strength Indicator (RSSI) measurements obtained from WSN interfaces. In addition to the simulation studies, field tests with a custom-built Corobot autonomous robot platform will be realized to prove the effectiveness of the methods.
The method of optimum control of the complex multivariate objects, based on the account of situations during the moment of acceptance of operating decisions is offered. The method allows to reduce the initial problem ...
详细信息
暂无评论