首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
We present a new foreign-function interface for SML/NJ. It is based on the idea of data-level interoperability—the ability of ML programs to inspect as well as manipulate C data structures directly.The core component of this work is an encoding of the almost2 complete C type system in ML types. The encoding makes extensive use of a “folklore” typing trick, taking advantage of ML's polymorphism, its type constructors, its abstraction mechanisms, and even functors. A small low-level component which deals with C struct and union declarations as well as program linkage is hidden from the programmer's eye by a simple program-generator tool that translates C declarations to corresponding ML glue code.  相似文献   

2.
By manipulating the imaginary part of the complex-analytic quadratic equation, we obtain, by iteration, a set that we call the “burning ship” because of its appearance. It is an analogue to the Mandelbrot set (M-set). Its nonanalytic “quasi”-Julia sets yield surprizing graphical shapes.  相似文献   

3.
This comment letter points out that the essence of the “extreme learning machine (ELM)” recently appeared has been proposed earlier by Broomhead and Lowe and Pao , and discussed by other authors. Hence, it is not necessary to introduce a new name “ELM.”   相似文献   

4.
We present an algorithm that modifies the original formulation proposed in Wan and Kothare [Efficient robust constrained model predictive control with a time-varying terminal constraint set, Systems Control Lett. 48 (2003) 375–383]. The modified algorithm can be proved to be robustly stabilizing and preserves all the advantages of the original algorithm, thereby overcoming the limitation pointed out recently by Pluymers et al. [Min–max feedback MPC using a time-varying terminal constraint set and comments on “Efficient robust constrained model predictive control with a time-varying terminal constraint set”, Systems Control Lett. 54 (2005) 1143–1148].  相似文献   

5.
The threat of cyber attacks motivates the need to monitor Internet traffic data for potentially abnormal behavior. Due to the enormous volumes of such data, statistical process monitoring tools, such as those traditionally used on data in the product manufacturing arena, are inadequate. “Exotic” data may indicate a potential attack; detecting such data requires a characterization of “typical” data. We devise some new graphical displays, including a “skyline plot,” that permit ready visual identification of unusual Internet traffic patterns in “streaming” data, and use appropriate statistical measures to help identify potential cyberattacks. These methods are illustrated on a moderate-sized data set (135,605 records) collected at George Mason University.  相似文献   

6.
This paper discusses the use of expert software which directly programs Computer Numerical Control (CNC) milling equipment from engineering style Computer-Aided-Design (CAD) drawings. Currently available software provides only semi-automatic programming based upon strict drawing format, user selected tools and user supplied tool path information. (DPS) derives part feature, tool selection, and tool path from “loosely” specified CAD drawings without direct user control. Other CNC programming methods are error prone and are slow to produce accurate CNC programs. The new technology eliminates programming error and completes processing in seconds rather than hours or days, thus providing for a true Computer Integrated Manufacturing (CIM) environment. DPS is in use on various 2D and 3D milling environments as well as on several types of small or personal computers and CAD systems. Additional systems and environments can be supported. DPS is designed to operate efficiently with AutoDesk, Inc.'s AutoCAD and Hewlett Packard 9000/320 ME-10 (HP-UX) based drawings. An additional implementation is running on SCO XENIX/386.

This paper presents technology and productivity improvements for various classes of DPS systems available today. Examples of actual use, productivity improvements and product dependencies are discussed and illustrated.  相似文献   


7.
In this paper we analyze a fundamental issue which directly impacts the scalability of current theoretical neural network models to applicative embodiments, in both software as well as hardware. This pertains to the inherent and unavoidable concurrent asynchronicity of emerging fine-grained computational ensembles and the consequent chaotic manifestations in the absence of proper conditioning. The latter concern is particularly significant since the computational inertia of neural networks in general and our dynamical learning formalisms manifests itself substantially, only in massively parallel hardward—optical, VLSI or opto-electronic. We introduce a mathematical framework for systematically reconditioning additive-type models and derive a neuro-operator, based on the chaotic relaxation paradigm whose resulting dynamics are neither “concurrently” synchronous nor “sequentially” asynchronous. Necessary and sufficient conditions guaranteeing concurrent asynchronous convergence are established in terms of contracting operators. Lyapunov exponents are also computed to characterize the network dynamics and to ensure that throughput-limiting “emergent computational chaos” behavior in models reconditioned with concurrently asynchronous algorithms was eliminated.  相似文献   

8.
9.
Computer integrated manufacturing (CIM) is creating unexpected problems for a growing number of manufacturing companies. Manufacturers are finding it especially difficult to attract programmers who are both willing and able to develop the highly complex software that integrates existing accounting, sales, production, engineering, and quality control information subsystems. Consequently, many companies abdicate their responsibility for manufacturing information systems and seek third party support ranging from consulting assistance to a total takeover of the company's information resources and operations. Companies that “give away” their internal information system capabilities to third parties will ultimately lose control of their enterprise information, a danger to be avoided. Off-the-shelf software for desktop computers has become sufficiently powerful to help solve a major portion of this serious problem. We hypothesize that manufacturing engineers (and others) can be trained to use packaged software to leverage their company's systems programming capabilities. In effect they would become “paraprogrammers” who would help design, develop, and maintain manufacturing information systems. This new type of professional would not require a computer science or similar educational background, but could be trained to satisfy many specialized programming needs in a manner similar to how paramedics and paralegals are trained and used in the medical and legal professions, respectively. This paper reports on the early stages of research to determine whether or not product design engineers can use a desktop relational database management system and its various command languages to develop a master bill of material information system (BOMIS). The purpose of the research is to evaluate the amount of programming complexity reduction and increased operational effectiveness that can be achieved through paraprogramming by manufacturing engineers.  相似文献   

10.
11.
Aihua Li  Yong Shi  Jing He   《Applied Soft Computing》2008,8(3):1259-1265
Cardholders’ behavior prediction is an important issue in credit card portfolio management. As a promising data mining approach, multiple criteria programming (MCLP) has been successfully applied to classify credit cardholders’ behavior into two groups. In order to better control credit risk for financial institutes, this paper proposes three methods based on MCLP to improve the “Bad” catching accuracy rate. One is called MCLP with unbalanced training set selection, the second is called fuzzy linear programming (FLP) method with moving boundary, and the third is called penalized multi criteria linear programming (PMCLP). The experimental examples demonstrate the promising performance of these methods.  相似文献   

12.
Perceptual Control Theory (PCT) is a general psychological theory based on the tenet, “All behaviour is the control of perception”. Layered Protocol Theory (LPT) can be seen as PCT applied to the special case of communication between cooperating partners, both controlling their own perceptions. PCT and LPT can be applied to the design and analysis of human×machine interfaces, although LPT may be more tractable in many cases. LPT is discussed in the context of the analysis and redesign of the interaction between a pilot and a Control Display Unit (CDU) in an operational helicopter.  相似文献   

13.
Possibilities of a programming environment that integrates the specificity of the different types of parallel computers are presented in the framework of computational structural mechanics. An extension of the development environment of the Finite Element code CASTEM 2000 has been realized to offer the user a global vision on all objects of the parallel application. To facilitate the implementation of parallel applications, this system hides data transfers between processors and allows a direct reuse of modules of the original sequential code. It is an object-based shared virtual memory system which allows a parallelism by data distribution (for non-structured data) or by control distribution; it is therefore well suited to “mechanic” parallelism. To validate this programming environment, domain decomposition techniques well suited to parallel computation have been used.  相似文献   

14.
Over the years, machine tool evolution has allowed faster equipment, using new configurations, to manufacture parts that were almost impossible to machine in the past. Despite this tremendous evolution in machine and control technologies, the metalworking industry is still using the old ISO 6983 G-Codes programming interface to control the motion of these machines. This programming interface is not the most flexible or most appropriate for use by new open-architecture machine controllers and object-oriented high-level machining interfaces such as ISO 14649 (STEP-NC). This work proposes an innovative language, the ‘Base Numerical Control Language (BNCL),’ which is based on a low-level simple instruction set-like approach. The architecture is designed around two concepts: the BNCL virtual machine, which acts as a virtual microprocessor, and the BNCL virtual hardware, which is an abstraction of the machine tool. The language is characterised by its simplicity and flexibility, two qualities that are critical in a market in which the capabilities and performance of machines are constantly improving. The proposed architectural concepts are validated through various computer simulation and physical tests, including performance throughput, trajectory driving, and CNC controller extension capabilities.  相似文献   

15.
This paper presents a new class of algorithms based on Youden designs to detect and restore edges present in an image imbedded by mixture or “salt and pepper” noise. The mixture noise consists of a uncorrelated or correlated noisy background plus uncorrelated impulsive noise. The objective is to restore pixels affected by the impulsive part of the mixture noise. The approach is to consider that these pixels have lost their true value and their estimate is obtained via the normal equation that yields the least sum of square error (LSSE). This procedure is known in the literature as “The Missing Value Approach Problem”. The estimates are introduced into the image data and an ANOVA technique based on Youden design is carried out. We introduce Youden designs which are special Symmetric Balanced Incomplete block (SBIB) designs, the pertinent statistical tests and estimates of the factor effects. We derive the estimate of the missing value for the uncorrelated noise environment as well as for the correlated one. The high level of performance of these algorithms can be evaluated visually via the input/output images and objectively via the input/output signal-to-noise ratio (SNR).  相似文献   

16.
An alternative scheme for the integration of incremental plasticity constitutive equations is presented and discussed. The method is based on a linear inequality theory approach and exploits the idea of the “a posteriori” local linearization of the yield surface. Results of both the flow theory of plasticity and the deformation theory can be obtained with a predetermined maximum violation of both the yield condition and the flow rule. Numerical results are shown, and compared to analytical solutions as well as to the results of other methods for the simple case of the von Mises yield function.  相似文献   

17.
This study considers those questions posed by students during e-mail “tutorials” to elicit information from “guest lecturers” and the use of that information by students in their essays. The “tutorials” were conducted for students in the U.K. by a “guest lecturer” in France. The “guest lecturer” was accredited as a tutor on the module for which the students were enrolled, and participated in the module by the provision of lecture notes prior to the e-mail tutorials. Data for the study, drawn from a comparative education assignment set for undergraduate students enrolled on the module, comprised surveys of students' perceived IT capabilities and attitudes towards IT, analyses of students' questions and analyses of students' essays. The findings of the study indicate (1) that tutees tend to pose questions to elicit information or clarification rather than to elicit the viewpoint or opinions of the “guest lecturer” and (2) that two-thirds of tutees' essays cited information elicited from the “guest lecturer”.  相似文献   

18.
Realization of STEP-NC enabled machining   总被引:5,自引:0,他引:5  
X.W. Xu   《Robotics and Computer》2006,22(2):144-153
A STEP-compliant CNC machine tool that demonstrated a G-code free machining scenario is presented. The aim of this research is to showcase the advantages of, and evaluate, STEP-NC—a new NC data model—by implementing it in a legacy CNC system. The work consists of two parts: retrofitting an existing CNC machine and the development of a STEP-compliant NC Converter called STEPcNC. The CompuCam's motion control system is used for retrofitting the machine, which is programmable using its own motion control language—6K Motion Control language and capable of interfacing with other CAPP/CAM programs through languages such as Visual Basic, Visual C++ and Delphi. STEPcNC can understand and process STEP-NC codes, and interface with the CNC controller through a Human Machine Interface. It makes use of STEP-NC information such as “Workplan”, “Workingstep”, machining strategy, machining features and cutting tools that is present in a STEP-NC file. Hence, the system is truly feature-based. The Application Interpreted Model of STEP-NC has been used.  相似文献   

19.
Induction based fluidics (IBF), a new, simple patented approach for transporting liquids in the micro and the macro world, is discussed. Electric fields are shown to energize liquid/s in a container/s to execute an array of purposes. IBF is shown uniquely to energize N liquids in simple off the shelf devices, inductively. We discuss calibration and other issues, as we demonstrate how simple devices can dispense nanoliters and microliters with high precision and accuracy. Furthermore, we show preliminary single and eight channel data for the Zip Tip™ made by Millipore where the device transports liquids “electrically.” We briefly consider how such new devices, “electric” Zip Tips™, might automate desalting and the placement of digests for MALDI TOF analysis.  相似文献   

20.
We show that the negative feedback interconnection of two causal, stable, linear time-invariant systems, with a “mixed” small gain and passivity property, is guaranteed to be finite-gain stable. This “mixed” small gain and passivity property refers to the characteristic that, at a particular frequency, systems in the feedback interconnection are either both “input and output strictly passive”; or both have “gain less than one”; or are both “input and output strictly passive” and simultaneously both have “gain less than one”. The “mixed” small gain and passivity property is described mathematically using the notion of dissipativity of systems, and finite-gain stability of the interconnection is proven via a stability result for dissipative interconnected systems.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号