Search results for " Programming"

showing 10 items of 1616 documents

Smart Manufacturing Testbed for the Advancement of Wireless Adoption in the Factory

2020

Wireless communication is a key enabling technology central to the advancement of the goals of the Industry 4.0 smart manufacturing concept. Researchers at the National Institute of Standards and Technology are constructing a testbed to aid in the adoption of wireless technology within the factory workcell and other harsh industrial radio environments. In this paper the authors present a new industrial wireless testbed design that motivates academic research and is relevant to the needs of industry. The testbed is designed to serve as both a demonstration and research platform for the wireless workcell. The work leverages lessons learned from past testbed incarnations that included a dual r…

Computer sciencebusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020208 electrical & electronic engineeringTestbed02 engineering and technologyRadio propagation0202 electrical engineering electronic engineering information engineeringSystems engineeringKey (cryptography)Factory (object-oriented programming)RobotWireless020201 artificial intelligence & image processingWorkcellbusinessRobotic arm
researchProduct

Vertical scratches detection based on edge detection for old film

2010

Automatic detection of image damaged regions is the key to automatic video image inpainting. Vertical scratches are the common damages in the old film. In this paper, a vertical scratches detection algorithm based on edge detection is proposed. The proposed algorithm first uses the operator which has the largest response to the vertical edge in Sobel operator to detect edges, and then uses canny operator to detect edges further. Third, we detect vertical lines in the image through probabilistic Hough transform. Finally, we obtain the true locations of the vertical lines scratches through morphology and width constraints. Many experiments show that our method can detect vertical line scratch…

Computer sciencebusiness.industryComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONInpaintingSobel operatorVertical barEdge detectionImage (mathematics)Operator (computer programming)Canny edge detectorComputer visionArtificial intelligencebusinessImage restorationMathematicsofComputing_DISCRETEMATHEMATICS2010 2nd International Conference on Industrial and Information Systems
researchProduct

Improving estimation of distribution genetic programming with novelty initialization

2021

Estimation of distribution genetic programming (EDA-GP) replaces the standard variation operations of genetic programming (GP) by learning and sampling from a probabilistic model. Unfortunately, many EDA-GP approaches suffer from a rapidly decreasing population diversity which often leads to premature convergence. However, novelty search, an approach that searches for novel solutions to cover sparse areas of the search space, can be used for generating diverse initial populations. In this work, we propose novelty initialization and test this new method on a generalization of the royal tree problem and compare its performance to ramped half-and-half (RHH) using a recent EDA-GP approach. We f…

Computer sciencebusiness.industryGeneralizationNoveltyInitializationStatistical modelGenetic programmingVariation (game tree)Machine learningcomputer.software_genreTree (data structure)Artificial intelligencebusinesscomputerPremature convergenceProceedings of the Genetic and Evolutionary Computation Conference Companion
researchProduct

Adoption of Constrained Application Protocol

2016

Among billions of Internet enabled devices that are expected to surround us in the near future, many will be resource constrained, i.e., will have limited power supply, processing power and memory. To cope with these limitations, the Constrained Application Protocol (CoAP) has been recently introduced as a lightweight alternative to HTTP for connecting the resource limited devices to the Web. Although the new protocol offers solid technical advantages, it remains uncertain whether a successful uptake will follow, as it depends also on its economic feasibility for the involved stakeholders. Therefore, this paper studies the techno-economic feasibility of CoAP using a systematic methodologica…

Computer sciencebusiness.industryPerspective (graphical)Techno economic020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreConstrained Application ProtocolWeb of ThingsRisk analysis (engineering)Software deployment0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingThe InternetLiterature surveybusinesscomputerProtocol (object-oriented programming)International Journal of Innovation in the Digital Economy
researchProduct

Circuit simulators for circuit analysis in graduate engineering courses

2018

Circuit simulators are extensively used as an aid in many courses at the graduate level in many different engineering and applied sciences programs. SPICE (Simulation Program with Integrated Circuits Emphasis) based software programs have been used for long due to their traditional market position. If we focus on circuits analysis and linear systems subjects, the features that are required from a given simulator can be found in student/limited versions of commercial EDA (Electronic Design Automation) suites or in freeware/open source codes. In this contribution, we analyse and compare the most revelant characteristics of a representative set of the software packages that are commonly adopte…

Computer sciencebusiness.industryTeachingEducational systemsIntegrated circuitHigher Educationlaw.invention03 medical and health sciences0302 clinical medicineSoftwareFilter (video)lawLearningTransient (computer programming)Electronic design automation030212 general & internal medicineApplied scienceSoftware engineeringbusiness030217 neurology & neurosurgeryNetwork analysisElectronic circuit
researchProduct

Implementation and Deployment Evaluation of the DMAMAC Protocol for Wireless Sensor Actuator Networks

2016

Abstract The increased application of wireless technologies including Wireless Sensor Actuator Networks (WSAN) in industry has given rise to a plethora of protocol designs. These designs target metrics ranging from energy efficiency to real-time constraints. Protocol design typically starts with a requirements specification, and continues with analytic and model-based simulation analysis. State-of- the-art network simulators provide extensive physical environment emulation, but still have limitations due to model abstractions. Deployment testing on actual hardware is therefore vital in order to validate implementability and usability in the real environment. The contribution of this article…

Computer sciencecomputer.internet_protocolTime division multiple accessWireless Routing Protocol02 engineering and technologyPacket lossWireless sensor networks and applications0202 electrical engineering electronic engineering information engineeringWirelessSuperframeNetwork architecture and designProtocol (object-oriented programming)Communication protocols.General Environmental ScienceEmulationbusiness.industry020206 networking & telecommunicationsKey distribution in wireless sensor networksEmbedded systemInternetwork protocolGeneral Earth and Planetary Sciences020201 artificial intelligence & image processingCommunications protocolbusinesscomputerReverse Address Resolution ProtocolEfficient energy useProcedia Computer Science
researchProduct

Knowledge-based verification of concatenative programming patterns inspired by natural language for resource-constrained embedded devices

2020

We propose a methodology to verify applications developed following programming patterns inspired by natural language that interact with physical environments and run on resource-constrained interconnected devices. Natural language patterns allow for the reduction of intermediate abstraction layers to map physical domain concepts into executable code avoiding the recourse to ontologies, which would need to be shared, kept up to date, and synchronized across a set of devices. Moreover, the computational paradigm we use for effective distributed execution of symbolic code on resource-constrained devices encourages the adoption of such patterns. The methodology is supported by a rule-based sys…

Computer scienceinternet of thing02 engineering and technologycomputer.software_genrelcsh:Chemical technologyBiochemistryOracleArticleAnalytical ChemistryDomain (software engineering)Softwarewireless sensor network0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185Electrical and Electronic Engineeringdistributed programmingwireless sensor networksEmbedded systemInstrumentationAbstraction (linguistics)concatenative languagessymbolic programmingSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniSymbolic programmingProgramming languagebusiness.industryRuntime verification020206 networking & telecommunications020207 software engineeringcomputer.file_formatforthinternet of thingsAtomic and Molecular Physics and Opticsconcatenative languageProgramming patternsembedded systemsExecutablebusinesscomputerNatural language
researchProduct

Evaluating Model-Driven Development Claims with Respect to Quality: A Family of Experiments

2021

[EN] Context: There is a lack of empirical evidence on the differences between model-driven development (MDD), where code is automatically derived from conceptual models, and traditional software development method, where code is manually written. In our previous work, we compared both methods in a baseline experiment concluding that quality of the software developed following MDD was significantly better only for more complex problems (with more function points). Quality was measured through test cases run on a functional system. Objective: This paper reports six replications of the baseline to study the impact of problem complexity on software quality in the context of MDD. Method: We con…

Computer sciencemedia_common.quotation_subjectContext (language use)Sample (statistics)02 engineering and technologySoftwareUnified Modeling LanguageStatisticsValidation0202 electrical engineering electronic engineering information engineeringAutomatic programmingQuality (business)Baseline (configuration management)computer.programming_languagemedia_commonModel driven developmentbusiness.industrySoftware development020207 software engineeringSoftware qualityFunction pointTest caseMethodologiesbusinesscomputerLENGUAJES Y SISTEMAS INFORMATICOSSoftware
researchProduct

An efficient swap algorithm for the lattice Boltzmann method

2007

During the last decade, the lattice-Boltzmann method (LBM) as a valuable tool in computational fluid dynamics has been increasingly acknowledged. The widespread application of LBM is partly due to the simplicity of its coding. The most well-known algorithms for the implementation of the standard lattice-Boltzmann equation (LBE) are the two-lattice and two-step algorithms. However, implementations of the two-lattice or the two-step algorithm suffer from high memory consumption or poor computational performance, respectively. Ultimately, the computing resources available decide which of the two disadvantages is more critical. Here we introduce a new algorithm, called the swap algorithm, for t…

Computer simulationComputer sciencebusiness.industryLattice Boltzmann methodsGeneral Physics and AstronomyComputational fluid dynamicsProgram optimizationNonlinear Sciences::Cellular Automata and Lattice GasesHigh memoryHardware and ArchitecturebusinessAlgorithmImplementationSwap (computer programming)Coding (social sciences)Computer Physics Communications
researchProduct

UML-Based Reliability Modeling of Network Services, a UDP Echo Service Case Study

2009

In the paper, we discuss state space reliability modeling formalism of distributed systems and services compliant with UML metamodel. Behavior of modeled application system we describe in terms of states. Service generation process we represent as a sequence of application system states. State space approach allows us to define dependence between application system components via dependence between components states and states input, output parameters. Reliability of application system component we define for each simply action state. Reliability of a service we express by components reliability in states determined by service generation process. As an example, we analyze reliability of cli…

Connectionless communicationObject-oriented programmingUnified Modeling LanguageData exchangeSoftware deploymentComputer scienceNetwork servicecomputerSoftware qualitycomputer.programming_languageReliability engineeringData modeling2009 Fourth International Conference on Dependability of Computer Systems
researchProduct