This paper presents an automated code generation and validation, verification approach to convert model based developments into IEC 61131-3 conform function blocks. IEC 61131-3 programming languages are supported by P...
This paper presents an automated code generation and validation, verification approach to convert model based developments into IEC 61131-3 conform function blocks. IEC 61131-3 programming languages are supported by PLC manufacturers and software environment developers and provide the possibility that novel and intelligent algorithms can be directly operated on industrial accepted systems. Railway and transportation also receive drastic changes from purely hardware based systems to microcontroller + software driven systems. However, the conversion has to follow certain steps to ensure that the adaptation is done correctly and functionality is not alternated, added or deleted. Concepts suggested by different international standards such as the IEC 61508 can help to derive a tool chain to verify the generated code.
Phishing is a type of cyber-attack aiming to steal people's confidential information using a bait. Smishing is a form of phishing that is carried out via SMS messages sent to mobile phones. Attackers intend to ste...
详细信息
We present the results of a community detection analysis of the Wikipedia graph. Distinct communities in Wikipedia contain semantically closely related articles. The central topic of a community can be identified usin...
详细信息
ISBN:
(纸本)9781605584874
We present the results of a community detection analysis of the Wikipedia graph. Distinct communities in Wikipedia contain semantically closely related articles. The central topic of a community can be identified using PageRank. Extracted communities can be organized hierarchically similar to manually created Wikipedia category structure. Copyright is held by the author/owner(s).
In this paper, a method of high order IIR filter design is proposed in which the coefficients in the canonical binary number system representation are searched by the simulated annealing algorithm. The high-quality II...
详细信息
We consider a population based Particle Swarm Optimization (PSO) algorithm and a few modifications to increase quality of optimization. Several strategies are investigated to exchange data between processors in parall...
详细信息
Breakthrough-quality scientific discoveries in the new millennium (such as those expected in computation biology and others), along with optimal engineering designs, have created a demand for High-End Computing (HEC) ...
详细信息
ISBN:
(纸本)0769523129
Breakthrough-quality scientific discoveries in the new millennium (such as those expected in computation biology and others), along with optimal engineering designs, have created a demand for High-End Computing (HEC) systems with sustained performance requirements at a petaflop scale and beyond. Despite the very pessimistic (if not negative) views on parallel computing systems that have prevailed in 1990s, there seems to be no other viable alternatives for such HEC systems. In this talk, we present a fresh look at the problems facing the design of petascale parallel computing systems. We review several fundamental issues that such HEC parallel computing systems must resolve. These issues include: execution models that support dynamic and adaptive multithreading, fine-grain synchronization, and global name-space and memory consistency. Related issues in parallel programming, dynamic compilation models, and system software design will also be discussed. Present solutions and future direction will be discussed based on (1) application demand (e.g. computation biology and others), (2) the recent trend as demonstrated by the HTMT, HPCS, and the Blue-Gene Cyclops (e.g. Cyclops-64) architectures, and (3) a historical perspective on influential models such as dataflow, along with concepts learned from these models.
The application of computational intelligence in condition-based maintenance and diagnosis plays a leading role in the technology development of intelligent manufacturing systems. Case-Based Reasoning (CBR) is mostly ...
详细信息
Despite the availability of video-on-demand (VoD) services in a number of cities around the world, the large-scale deployment of VoD services has not been widely explored due to economic constraints. The high complexi...
详细信息
Convergence of the emerging IP Multimedia Subsystem (IMS) includes unlicensed, nondedicated and nondeterministic, hence uncontrollable, computer access networks for IP multimedia services. It enables provision of reso...
详细信息
With the fast development of highly integrated distributed systems (cluster systems), especially those encapsulated within a single platform [28, 9], designers have to face interesting memory hierarchy design choices ...
详细信息
ISBN:
(纸本)9781450314398
With the fast development of highly integrated distributed systems (cluster systems), especially those encapsulated within a single platform [28, 9], designers have to face interesting memory hierarchy design choices that attempt to avoid disk storage swapping. Disk swapping activities slow down application execution drastically. Leveraging remote free memory through Memory Collaboration has demonstrated its cost-effectiveness compared to overprovisioning for peak load requirements. Recent studies propose several ways on accessing the under-utilized remote memory in static system configurations, without detailed exploration on the dynamic memory collaboration. Dynamic collaboration is an important aspect given the run-time memory usage fluctuations in clustered systems. In this paper, we propose an Autonomous Collaborative Memory system (ACMS) that manages memory resources dynamically at run time, to optimize performance, and provide QoS measures for nodes engaging in the system. We implement a prototype realizing the proposed ACMS, experiment with a wide range of real-world applications, and show up to 3x performance speedup compared to a non collaborative memory system, without perceivable performance impact on nodes that provide memory. Based on our experiments, we conduct detailed analysis on the remote memory access overhead and provide insights for future optimizations. Copyright 2012 ACM.
暂无评论