Search results for "Programming"

showing 10 items of 3090 documents

Computer Simulation for the Study of CNC Feed Drives Dynamic Behavior and Accuracy

2007

In the application of CNC feed drives it is desirable to predict the servo performance. By using computer simulation techniques it is possible to construct an accurate model of the servo drive. This simulation procedure makes it possible to anticipate machine design problems and correct them. This paper deals with a model of a feed drive, which consists of a motion control system driven by a DC motor. Both position and velocity feedback loops are present in the structure of the system. By means of MATLAB & Simulink software, simulation diagrams were built in order to test the behaviour of the system. Experimental data are also presented in order to confirm the accuracy of the theoretical mo…

business.industryComputer scienceControl engineeringMotion controlDC motorSoftwarePosition (vector)Servo drivebusinessMATLABcomputerServocomputer.programming_languageMachine controlEUROCON 2007 - The International Conference on "Computer as a Tool"
researchProduct

Co-simulation platform based on systemc for multiprocessor system on chip architecture exploration

2007

Currently multiprocessor embedded systems are the principal vectors of semiconductor industry. Modelling, validating and analyzing a system performances impose the evolution of the traditional simulation techniques. In this paper we define the methodology we used in constructing the STARSoC co-simulation environment. This platform aims to explore at higher levels of abstractions a multiprocessors system on chip architectures. The platform reference design contains several OpenRISC 1200 Instruction Set Simulators (ISSs) wrapped under SystemC, and some basic peripherals within the SystemC simulation framework. Our purpose is to develop a complete design space exploration tool. In order to ass…

business.industryComputer scienceDesign space explorationOpenRISCMPSoCInstruction setComputer architectureSystemCEmbedded systemSystem on a chipbusinesscomputerWishbonecomputer.programming_languageRegister-transfer level2007 Internatonal Conference on Microelectronics
researchProduct

Towards General Purpose Object Detection: Deep Dense Grid Based Object Detection

2020

Object detection is one of the most challenging and very important branch of computer vision. Some of the challenging aspect of a detection network is the fact that an object can appear anywhere in the image, be partially occluded by another object, might appear in crowd or have greatly varying scales. Consequently, we propose a fine grained and equally spaced dense grid cells throughout an input image be responsible of detecting an object. We re-purpose an already existing deep state-of-the-art detector or classifier into deep and dense detector. Our dense object detector uses binary class encoding and hence suitable for very large multi-class object detector. We also propose a more flexib…

business.industryComputer scienceDetector0211 other engineering and technologiesBinary number020101 civil engineering02 engineering and technologyFilter (signal processing)Pascal (programming language)Object (computer science)Object detection0201 civil engineeringEncoding (memory)021105 building & constructionClassifier (linguistics)Computer visionArtificial intelligencebusinesscomputercomputer.programming_language2020 14th International Conference on Innovations in Information Technology (IIT)
researchProduct

Psychological Influence of Double-Bind Situations in Human-Agent Interaction

2007

This paper presents a new approach to integrate artificial intelligence in virtual environments. The system presented deals in a separated way the visualization and intelligence modules, applying in this last case a distributed approach (multi-agent systems) so that scalable applications may be built. Therefore, it is necessary to define agent architectures that allow agents to be integrated in the VW. Thus, a designer is abstracted from the peculiarities of interacting with a virtual environment. There is a first prototype of the framework using JADE as the supporting multi-agent systems platform.

business.industryComputer scienceDistributed computingMulti-agent systemJADE (programming language)Virtual realitycomputer.software_genreVisualizationData visualizationSoftware agentVirtual machineScalabilitybusinesscomputercomputer.programming_language2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT'07)
researchProduct

Evolutionary approach to coverage testing of IEC 61499 function block applications

2015

The paper addresses the problem of coverage testing of industrial automation software represented in the IEC 61499 standard, one of the recent standards for distributed control system design. Contrary to model-based testing (MBT), the paper focuses on implementation coverage, not model coverage. An approach based on evolutionary algorithms is presented which generates coverage test suites for both basic and composite IEC 61499 function blocks. It employs two third-party tools, FBDK and EvoSuite. The evaluation of the approach was performed on a set of control applications for two lab-scale demonstration plants. Results show that the approach is applicable and shows good performance at least…

business.industryComputer scienceEvolutionary algorithmAutomationEvolutionary computationReliability engineeringSet (abstract data type)SoftwareUnified Modeling LanguageBlock (programming)Software engineeringbusinessDistributed control systemcomputercomputer.programming_language2015 IEEE 13th International Conference on Industrial Informatics (INDIN)
researchProduct

AES/FPGA Encryption Module Integration for Satellite Remote Sensing Systems: LST-SW case

2020

Satellite remote sensing embedded systems need to be secure to protect data transmission between satellites and the ground station for any threat can affects the hardware of satellite and interception of data, in addition to unauthorized access to satellite system. This research proposes an approach for a secure integration of FPGA Encryption module based on the iterative looping architecture for remote sensing algorithm and especially for the LST-SW algorithm. The target hardware used in this paper is Virtex-5 XC5VLX50T FPGA from Xilinx. Hardware Description Language was used to design the complete system. The analysis of the proposed designed shows that this implementation can achieved a …

business.industryComputer scienceHardware description languageSatellite systemEncryptionSatellitebusinessField-programmable gate arrayThroughput (business)computerComputer hardwareData transmissionBlock (data storage)computer.programming_language2020 3rd International Conference on Advanced Communication Technologies and Networking (CommNet)
researchProduct

High Level Modeling and Hardware Implementation of Image Processing Algorithms Using XSG

2019

International audience; Design of Systems-on-Chip has become very common especially with the remarkable advances in the field of high-level system modeling. In recent years, Matlab also offers a Simulink interface for the design of hardware systems. From a high-level specification, Matlab provides self-generation of HDL codes and/or FPGA configuration codes while providing other benefits of easy simulation. In addition, a large part of the Systems-on-Chip use at least one image processing algorithm and at the same time border detection is one of the most used algorithms. This paper presents a study and a hardware implementation of various algorithms of borders detection realized under Xilin…

business.industryComputer scienceInterface (computing)[INFO.INFO-GR] Computer Science [cs]/Graphics [cs.GR]020207 software engineeringImage processing02 engineering and technologySystems modelingEdge detection[INFO.INFO-GR]Computer Science [cs]/Graphics [cs.GR]VHDLDigital image processing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingbusinessMATLABField-programmable gate arraycomputerComputer hardwarecomputer.programming_language
researchProduct

An Agents and Artifacts Approach to Distributed Data Mining

2013

This paper proposes a novel Distributed Data Mining (DDM) approach based on the Agents and Artifacts paradigm, as implemented in CArtAgO [9], where artifacts encapsulate data mining tools, inherited from Weka, that agents can use while engaged in collaborative, distributed learning processes. Target hypothesis are currently constrained to decision trees built with J48, but the approach is flexible enough to allow different kinds of learning models. The twofold contribution of this work includes: i) JaCA-DDM: an extensible tool implemented in the agent oriented programming language Jason [2] and CArtAgO [10,9] to experiment DDM agent-based approaches on different, well known training sets. A…

business.industryComputer scienceMulti-agent systemDecision treeCollaborative learningcomputer.software_genreMachine learningC4.5 algorithmData miningArtificial intelligencebusinesscomputerProtocol (object-oriented programming)Agent-oriented programmingCounterexample
researchProduct

A damage identification procedure based on Hilbert transform: Experimental validation

2010

SUMMARY This paper aims at validating the feasibility of an identification procedure, based on the use of the Hilbert transform, by means of experimental tests for shear-type multi-degree-of-freedom systems. Particularly, a three-degree-of-freedom frame will be studied either numerically or experimentally by means of a laboratory scale model built at the laboratory of the Structural, Aerospace and Geotechnical Engineering Department (DISAG) of University of Palermo. Several damage scenarios have been considered to prove the effectiveness of the procedure. Moreover, the experimental tests have been conducted by considering two different input loads: pulse forces, simulated by means of an ins…

business.industryComputer scienceNoise (signal processing)Frame (networking)SIGNAL (programming language)incipient damageBuilding and ConstructionStructural engineeringHilbert transformIdentification (information)symbols.namesakeData acquisitionMechanics of MaterialssymbolsEarthquake shaking tableMinificationHilbert transformSettore ICAR/08 - Scienza Delle CostruzionibusinessAlgorithmanalytical signalCivil and Structural EngineeringStructural Control and Health Monitoring
researchProduct

Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned

2013

In this paper, two practical attacks against ZigBee security are proposed and the latter one is also carried out in our laboratory environment. The attack scenarios are based on utilizing several vulnerabilities found from the main security components of ZigBee technology. The first attack is based on sabotaging the ZigBee End-Device by sending a special signal that makes it wake-up constantly until the battery runs out. The second attack is based on exploiting the key exchange process in ZigBee when using the Standard Security level defined by the ZigBee specification: we also demonstrate with experimental figures that attacks against ZigBee-enabled devices become practical by using our at…

business.industryComputer scienceProcess (engineering)SIGNAL (programming language)Computer securitycomputer.software_genreWireless securitySecurity serviceVulnerability evaluationComputerSystemsOrganization_SPECIAL-PURPOSEANDAPPLICATION-BASEDSYSTEMSbusinesscomputerKey exchangeComputer networkNeuRFon2013 46th Hawaii International Conference on System Sciences
researchProduct