Search results for "Source code"
showing 10 items of 61 documents
Computational modeling in cognitive science: a manifesto for change.
2012
Computational modeling has long been one of the traditional pillars of cognitive science. Unfortunately, the computer models of cognition being developed today have not kept up with the enormous changes that have taken place in computer technology and, especially, in human-computer interfaces. For all intents and purposes, modeling is still done today as it was 25, or even 35, years ago. Everyone still programs in his or her own favorite programming language, source code is rarely made available, accessibility of models to non-programming researchers is essentially non-existent, and even for other modelers, the profusion of source code in a multitude of programming languages, written witho…
Implementing some Evolutionary Computing Methods for Determining the Optimal Parameters in the Turning Process
2015
In this paper, we comparatively present two heuristics search methods – Simulated Annealing and Weighted Sum Genetic Algorithm, in order to find optimal cutting parameters in turning operation. We consider five different constraints aiming to achieve minimum total cost of machining. We developed a customizable software application in Microsoft Visual Studio with C# source code, flexible and extensible that implements the optimization methods. The experiments are based on real data gathered from S.C. “Compa” S.A Sibiu, a company that manufactures automotive components and targets improving of product quality and reducing cost and production time. The obtained results show that, although the …
Imaginary time propagation code for large-scale two-dimensional eigenvalue problems in magnetic fields
2013
We present a code for solving the single-particle, time-independent Schr\"odinger equation in two dimensions. Our program utilizes the imaginary time propagation (ITP) algorithm, and it includes the most recent developments in the ITP method: the arbitrary order operator factorization and the exact inclusion of a (possibly very strong) magnetic field. Our program is able to solve thousands of eigenstates of a two-dimensional quantum system in reasonable time with commonly available hardware. The main motivation behind our work is to allow the study of highly excited states and energy spectra of two-dimensional quantum dots and billiard systems with a single versatile code, e.g., in quantum …
BANΔIT: B’‐factor Analysis for Drug Design and Structural Biology
2020
The analysis of B‐factor profiles from X‐ray protein structures can be utilized for structure‐based drug design since protein mobility changes have been associated with the quality of protein‐ligand interactions. With the BANΔIT (B’‐factor analysis and ΔB’ interpretation toolkit), we have developed a JavaScript‐based browser application that provides a graphical user interface for the normalization and analysis of B’‐factor profiles. To emphasize the usability for rational drug design applications, we have analyzed a selection of crystallographic protein‐ligand complexes and have given exemplary conclusions for further drug optimization including the development of a B’‐factor‐supported pha…
Unified Parallel C++
2018
Abstract Although MPI is commonly used for parallel programming on distributed-memory systems, Partitioned Global Address Space (PGAS) approaches are gaining attention for programming modern multi-core CPU clusters. They feature a hybrid memory abstraction: distributed memory is viewed as a shared memory that is partitioned among nodes in order to simplify programming. In this chapter you will learn about Unified Parallel C++ (UPC++), a library-based extension of C++ that gathers the advantages of both PGAS and Object Oriented paradigms. The examples included in this chapter will help you to understand the main features of PGAS languages and how they can simplify the task of programming par…
Patterns Reuse in the PASSI methodology
2003
Design patterns already proved successful in lowering the development time and number of errors of object-oriented software; now, they are, candidate to play a similar role in the MAS (multi-agent system) context. In this work we describe our experiences in the identification, production and application of patterns for agents. Some patterns are described together with the classification criteria and documentation approach we adopt. Upon them, we base a pattern reuse process that can be considered one of the distinguishing elements of the design methodology (PASSI) we use to develop MAS. Patterns can be applied to an existing agent or used to produce a new one with the support of a specific …
On the search for 50 GeV neutrinos
2000
Using the computer code CompHEP we estimate the number of events and the background, at LEP II and TESLA, for the reaction $e^+ e^- \to N\bar{N}\gamma$, where $N$ is a hypothetical Dirac neutrino with mass of the order of 50 GeV.
The Computer Code for Calculations of the Positron Distribution in a Layered Stack Systems
2014
In this paper we present experimental and theoretical studies of the implantation pro le of positrons emitted fromNa radionuclide into layered sample. The measured pro le for the nonsymmetrical, around the positron emitter, stack of aluminium and silver foils was measured using the depth scanning of implantation pro le technique. For the description of the obtained results two theoretical approaches were applied. The rst one was the Monte Carlo simulation using the GEANT4 tool kit. The generated pro le does not reproduce accurately the experimental pro le. We proposed the multiple scattering model based on the fact that a positron due to backscattering can travel as an energetic particle se…
A Rayleigh-Ritz approach for postbuckling analysis of variable angle tow composite stiffened panels
2018
Abstract A Rayleigh-Ritz solution approach for generally restrained multilayered variable angle tow stiffened plates in postbuckling regime is presented. The plate model is based on the first order shear deformation theory and accounts for geometrical nonlinearity through the von Karman’s assumptions. Stiffened plates are modelled as assembly of plate-like elements and penalty techniques are used to join the elements in the assembled structure and to apply the kinematical boundary conditions. General symmetric and unsymmetric stacking sequences are considered and Legendre orthogonal polynomials are employed to build the trial functions. A computer code was developed to implement the propose…
ASLA: reverse engineering approach for software license information retrieval
2006
Software maintenance and reuse require identification of the applied software licenses. The information needs of maintainers and reusers can be supported by reverse engineering tools at different information retrieval levels. The paper presents a reverse engineering approach called ASLA for retrieving license information typically used in OSS. User needs, system architecture, tool features, and tool evaluation are presented. The implemented tool features include support for identifying source file dependencies and licenses in source files. The tool is evaluated against another tool for license information extraction. ASLA supports the same programming languages as GCC. License identificatio…