Maintainability, extendibility and reusability of components in the design of robot control architectures is a major challenge. Parallel kinematic robots feature a wide variety of structures and applications. They are...
详细信息
This paper presents a novel method on coloring the grayscale images. For this purpose, a combination of artificial neural networks and some image processing algorithms was developed to transfer colors from a user-sele...
详细信息
This paper presents a novel method on coloring the grayscale images. For this purpose, a combination of artificial neural networks and some image processing algorithms was developed to transfer colors from a user-selected source image to a target grayscale image. According to the results of this combining method, a survey where volunteers were asked to rate the plausibility of the colorings generated automatically was performed for individual images. In most cases automatically-colored images were rated either as totally or mostly acceptable.
The SecureMDD approach aims to generate both, a formal specification for verification and executable code, from UML diagrams. The UML models define the static as well as dynamic components of the system under developm...
详细信息
ISBN:
(纸本)9781424437252
The SecureMDD approach aims to generate both, a formal specification for verification and executable code, from UML diagrams. The UML models define the static as well as dynamic components of the system under development. This model-driven approach is focused on security-critical applications that are based on cryptographic protocols, especially Java Card applications. In this paper we describe the generation of the formal specification from the UML model which is then used as input for our interactive verification system KIV. The formal specification is based on abstract state machines and algebraic specifications. It allows to formulate and to prove application-specific security properties.
Partial Differential Equations (PDE) are the heart of most simulations in many scientific fields, from Fluid Mechanics to Astrophysics. One the most popular mathematical schemes to solve a PDE is Finite Difference (FD...
详细信息
Partial Differential Equations (PDE) are the heart of most simulations in many scientific fields, from Fluid Mechanics to Astrophysics. One the most popular mathematical schemes to solve a PDE is Finite Difference (FD). In this work we map a PDE-FD algorithm called Reverse Time Migration to a GPU using CUDA. This seismic imaging (Geophysics) algorithm is widely used in the oil industry. GPUs are natural contenders in the aftermath of the clock race, in particular for High-performance Computing (HPC). Due to GPU characteristics, the parallelism paradigm shifts from the classical threads plus SIMD to Single Program Multiple Data (SPMD). The NVIDIA GTX 280 implementation outperforms homogeneous CPUs up to 9x (Intel Harpertown E5420) and up to 14x (IBM PPC 970). These preliminary results confirm that GPUs are a real option for HPC, from performance to programmability.
In this paper, we propose an On-Demand Content Delivery Grid system that supplements the traditional content delivery network to deal with problems such as the huge influx of network traffic in a short period of time ...
详细信息
ISBN:
(纸本)9780980326727
In this paper, we propose an On-Demand Content Delivery Grid system that supplements the traditional content delivery network to deal with problems such as the huge influx of network traffic in a short period of time and the high cost in renting a fixed number of servers. We present its system architecture and describe its implementation in details. An experimental high-definition movie streaming site was setup using our content delivery grid system to demonstrate its capabilities with performance analysis.
As memory transactions have been proposed as a language-level replacement for locks, there is growing need for well-defined semantics. In contrast to database transactions, transaction memory (TM) semantics are compli...
详细信息
ISBN:
(纸本)9781595939739
As memory transactions have been proposed as a language-level replacement for locks, there is growing need for well-defined semantics. In contrast to database transactions, transaction memory (TM) semantics are complicated by the fact that programs may access the same memory locations both inside and outside transactions. Strongly atomic semantics, where non-transactional accesses are treated as implicit single-operation transactions, remain difficult to provide without specialized hardware support or significant performance overhead. As an alternative, many in the community have informally proposed that a single global lock semantics [18, 10], where transaction semantics are mapped to those of regions protected by a single global lock, provide an intuitive and efficiently implementable model for programmers. In this paper, we explore the implementation and performance implications of single global lock semantics in a weakly atomic STM from the perspective of Java, and we discuss why even recent STM implementations fall short of these semantics. We describe a new weakly atomic Java STM implementation that provides single global lock semantics while permitting concurrent execution, but we show that this comes at a significant performance cost. We also propose and implement various alternative semantics that loosen single lock requirements while still providing strong guarantees. We compare our new implementations to previous ones, including a strongly atomic STM. [24] Copyright 2008 ACM.
This paper presents dynamic behaviors of autonomous solid oxide fuel cells (SOFC) with AC bus control. Both voltage and frequency control are utilized to achieve load-sharing of the studied SOFC feeding isolated loads...
详细信息
This paper presents dynamic behaviors of autonomous solid oxide fuel cells (SOFC) with AC bus control. Both voltage and frequency control are utilized to achieve load-sharing of the studied SOFC feeding isolated loads. A DC-to-DC converter is connected to the output terminals of the studied SOFC for stabilizing output voltage and current fluctuations under different loading conditions. The PWM inverter connected to the output terminals of the DC-to-DC converter is operated under voltage-controlled mode to regulate the voltage profile across the connected loads. It can be concluded from the simulation results that the proposed voltage and frequency droop controllers of the PWM inverter may operate satisfactory under stand-alone mode.
This paper is dealing with redundant optoelectronic data transmission with special respect to laser channels. The concept of the generalized erasure channel (GEC) is used to determine the probability of undetected err...
详细信息
This paper is dealing with redundant optoelectronic data transmission with special respect to laser channels. The concept of the generalized erasure channel (GEC) is used to determine the probability of undetected error for some binary symmetric and non-symmetric channels protected by appropriate codes. In detail, communication via different binary symmetric channels (BSCs), generalized erasure channels and symmetrized binary non symmetric channels (BNSCs) is investigated. Simple upper bounds are given, relating the new formulas to that one of the BSC Finally the results in connection with an inequality for proper codes are applied to multi wavelength optical transmission through channels generated by semiconductor lasers.
Developing security-critical applications is very difficult and the past has shown that many applications turned out to be erroneous after years of usage. For this reason it is desirable to have a sound methodology fo...
详细信息
computer science and engineering communities have been exploring a variety of activities and techniques to attract and retain more students, especially women and minorities, to computer science and computer engineerin...
详细信息
computer science and engineering communities have been exploring a variety of activities and techniques to attract and retain more students, especially women and minorities, to computer science and computerengineering degree programs1. This paper briefly describes the efforts and results of a plan for actively recruiting young women into undergraduate computerengineering and computer science programs hosted by the University of North Texas (UNT). It also describes a series of activities aimed at improving the retention rate of students already in our programs, particularly during the freshman year. Such recruitment and retention efforts are critical to the country's efforts to increase the number of engineering professionals, and are a priority for the computer Science and engineering (CSE) department at UNT. We initially designed a three-part plan to achieve our recruitment and retention goals: Sponsorship of portable and mobile summer computerengineering robotics camps for middle and high-school women students, coordinating with the regional Girl Scouts councils and other organizations to help with the recruitment;Creation of an Ambassador program using young women currently enrolled in the upper division of current computer science and computerengineering programs as a form of outreach to area high schools and junior colleges;and Expansion of our successful undergraduate mentoring program by using the Ambassador cohort mentioned above as mentors for incoming freshman and first-year transfer women entering our programs. This paper will focus primarily on the summer camp program and present an analysis of the results we have seen to date after 2 years of camp activities. Results from student surveys and parent surveys will be presented. The paper concludes with recommended changes and improvements in the program, as well as a discussion of adaptations that would create programs suitable for implementation at other institutions as well as programs aimed at a dif
暂无评论