In large projects parallelization of existing programs or refactoring of source code is time consuming as well as error-prone and would benefit from tool support. However, existing automatic transformation systems are...
详细信息
In large projects parallelization of existing programs or refactoring of source code is time consuming as well as error-prone and would benefit from tool support. However, existing automatic transformation systems are not extensively used because they either require tedious definitions of source code transformations or they lack general adaptability. In our approach, a programmer changes code inside a project, resulting in before and after source code versions. The difference (the generated transformation) is stored in a database. When presented with some arbitrary code, our tool mines the database to determine which of the generalized transformations possibly apply. Our system is different from a pure compiler based (semantics preserving) approach as we only suggest code modifications. Our contribution is a set of generalizing annotations that we have found by analyzing recurring patterns in open source projects. We show the usability of our system and the annotations by finding matches and applying generated transformations in real-world applications.
An L(0,1)-labelling of a graph G is an assignment of nonnegative integers to the vertices of G such that the difference between the labels assigned to any two adjacent vertices is at least zero and the difference betw...
详细信息
An L(0,1)-labelling of a graph G is an assignment of nonnegative integers to the vertices of G such that the difference between the labels assigned to any two adjacent vertices is at least zero and the difference between the labels assigned to any two vertices which are at distance two is at least one. The span of an L(0,1)-labelling is the maximum label number assigned to any vertex of G. The L(0,1)-labelling number of a graph G, denoted by λ0.1(G) is the least integer k such that G has an L(0,1)-labelling of span k. This labelling has an application to a computer code assignment problem. The task is to assign integer control codes to a network of computer stations with distance restrictions. A cactus graph is a connected graph in which every block is either an edge or a cycle. In this paper, we label the vertices of a cactus graph by L(0,1)-labelling and have shown that, △-1≤λ0.1(G)≤△ for a cactus graph, where △ is the degree of the graph G.
Wait states in parallel applications can be identified by scanning event traces for characteristic patterns. In our earlier work we defined such inefficiency patterns for MPI-2 one-sided communication, although still ...
详细信息
Abstract Modelica models often contain functions with algorithmic code. The fraction of algorithmic code is increasing since Modelica, in addition to equation-based modeling, is also used for embedded system control c...
详细信息
Abstract Modelica models often contain functions with algorithmic code. The fraction of algorithmic code is increasing since Modelica, in addition to equation-based modeling, is also used for embedded system control code and symbolic model transformations in compilers using the MetaModelica language extension. Thus, debugging of algorithmic Modelica code is becoming increasingly relevant. Our earlier work in debuggers for the algorithmic subset of Modelica used trace-based techniques which are very portable but turned out to have too much overhead for very large applications. The new debugger is the first Modelica debugger that can operate without trace information. Instead it communicates with a low-level C-language symbolic debugger, the Gnu debugger GDB, to directly extract information from a running executable, set and remove breakpoints, etc. This is made possible by the new bootstrapped OpenModelica compiler which keeps track of a detailed mapping from the high level Modelica code down to the generated C code compiled to machine code. The debugger is operational, supports browsing of both standard Modelica data structures and tree/list data structures, and operates efficiently on large applications such as the OpenModelica compiler with more than 100 000 lines of code.
This paper presents design considerations of indoor and outdoor navigation techniques proposed for unmanned vehicles (UV). In this paper, we mainly investigate the use and the advantages of wireless sensor networks (W...
详细信息
This paper presents design considerations of indoor and outdoor navigation techniques proposed for unmanned vehicles (UV). In this paper, we mainly investigate the use and the advantages of wireless sensor networks (WSNs) for indoor navigation, and Global Positioning System (GPS) for outdoor navigation. The system primarily uses laser range finder (LRF) measurements for indoor navigation, and is based on Extended Kalman Filter (EKF). For outdoor navigation the system uses Inertial Navigation System (INS) measurements. At periodical intervals the system integrates the measurements of an absolute sensor to improve estimations. The absolute sensor is a WSN interface for indoor navigation, and a GPS receiver for outdoor navigation. Simulation studies were conducted using Unified System for Automation and Robot Simulation (USARSim) and Player/Stage. The results of USARSim based simulations prove the advantages of integrating GPS measurements. Player/Stage based simulations show the advantages of integrating Received Signal Strength Indicator (RSSI) measurements obtained from WSN interfaces. In addition to the simulation studies, field tests with a custom-built Corobot autonomous robot platform will be realized to prove the effectiveness of the methods.
This paper presents a novel approach of using unmanned aerial vehicles (UA Vs) to establish a communication infrastructure in case of disasters. Due to the collapse of buildings, power systems, and antennas, the colla...
详细信息
This paper presents a novel approach of using unmanned aerial vehicles (UA Vs) to establish a communication infrastructure in case of disasters. Due to the collapse of buildings, power systems, and antennas, the collapse of communication infrastructure is the usual effect of disasters. In this study, we propose an emergency communications system established by unmanned aerial vehicles (UA Vs). The system is a post-disaster solution; hence, it can be used anywhere required. In this study, first we briefly explain the details of the system in three aspects: end-to-end communication, localization and navigation, and coordination Then, we evaluate the efficiency of the localization and navigation subsystem. Our simulation studies with Air Robot quadrotor helicopters in Unified System for Automation and Robot Simulation (USARSim) simulation environment show that UAV-aided communications system can be used in case of disasters to establish an emergency communications infrastructure in terms of localization and navigation.
Wireless networked mobile robots pursuing a common objective are envisioned to be an efficient solution for many military, industrial, commercial, and environmental applications. This paper presents the design conside...
详细信息
Wireless networked mobile robots pursuing a common objective are envisioned to be an efficient solution for many military, industrial, commercial, and environmental applications. This paper presents the design considerations of an autonomous intruder detection system based on wireless networked robots. Specifically, three critical aspects of these systems, such as coordination and task allocation, communication, and map-based intruder detection, have been investigated and a multi-sensor fusion mechanism has been presented. Performance results show that the fusion of redundant information from different sensors can increase the accuracy of a system and reduce overall uncertainty in intruder detection applications.
When some suppliers offer trade credit periods and price discounts to retailers in order to increase the demand of their products, retailers have to face different types of discount offers and credits within which the...
When some suppliers offer trade credit periods and price discounts to retailers in order to increase the demand of their products, retailers have to face different types of discount offers and credits within which they have to take a decision which is the best offer for them to make more profit. The retailers try to buy perfect-quality items at a reasonable price, and also they try to invest returns obtained by selling those items in such a manner that their business is not hampered. In this point of view, we consider an economic order quantity (EOQ) model for various types of time-dependent demand when delay in payment and price discount are permitted by suppliers to retailers. The models of various demand patterns are discussed analytically. Some numerical examples and graphical representations are considered to illustrate the model.
This paper presents a mobile robot aided self deploying wireless sensor network aiming to detect radiation leaks and to measure radiation levels, and explains design considerations to prolong network life. Special att...
详细信息
This paper presents a mobile robot aided self deploying wireless sensor network aiming to detect radiation leaks and to measure radiation levels, and explains design considerations to prolong network life. Special attention is given to the factors which are important for the specific requirements of radiation leak detection. Wireless sensor networks (WSNs) provide numerous benefits to applications with low duty cycle, such as environmental monitoring, event detection, etc. However, the realization of these potential benefits directly depends on energy efficient and reliable communication and coordination capabilities of the deployed system. In this study, challenges of WSNs, deployment strategies using mobile robots, and energy harvesting techniques to maximize lifetime of WSNs are discussed. Also, a comparison of two different exploration strategies is shown with the results of our own application developed in C#. Main contributions of this study are discussions on mobile robot aided WSN deployment strategies and energy harvesting techniques to maximize WSN lifetime.
In order to measure the effectiveness of safety protection systems there are several design parameters. Diagnostic coverage factor is one of the most important parameter which influences all architectures. In this sho...
详细信息
暂无评论