In mobile cloud computing(MCC) systems,both the mobile access network and the cloud computing network are heterogeneous,implying the diverse configurations of hardware,software,architecture,resource,etc.In such hetero...In mobile cloud computing(MCC) systems,both the mobile access network and the cloud computing network are heterogeneous,implying the diverse configurations of hardware,software,architecture,resource,etc.In such heterogeneous mobile cloud(HMC) networks,both radio and cloud resources could become the system bottleneck,thus designing the schemes that separately and independently manage the resources may severely hinder the system performance.In this paper,we aim to design the network as the integration of the mobile access part and the cloud computing part,utilizing the inherent heterogeneity to meet the diverse quality of service(QoS)requirements of tenants.Furthermore,we propose a novel cross-network radio and cloud resource management scheme for HMC networks,which is QoS-aware,with the objective of maximizing the tenant revenue while satisfying the QoS requirements.The proposed scheme is formulated as a restless bandits problem,whose "indexability" feature guarantees the low complexity with scalable and distributed characteristics.Extensive simulation results are presented to demonstrate the significant performance improvement of the proposed scheme compared to the existing ones.展开更多
To better evaluate the quality of software architecture,a metrics suite is proposed to measure the coupling of software architecture models,in which CBC is used to measure the coupling between components,CBCC is used ...To better evaluate the quality of software architecture,a metrics suite is proposed to measure the coupling of software architecture models,in which CBC is used to measure the coupling between components,CBCC is used to measure the coupling of transferring message between components,CBCCT is used to measure the coupling of software architecture,WCBCC is used to measure the coupling of transferring message with weight between components,and WCBCCT is used to measure the coupling of message transmission with weight in the whole software architecture. The proposed algorithm for the coupling metrics is applied to the design of serve software architecture. Analysis of an example validates the feasibility of this metrics suite.展开更多
Before the task of autonomous underwater vehicle(AUV) was implemented actually,its semi-physical simulation system of pipeline tracking had been designed.This semi-physical simulation system was used to test the softw...Before the task of autonomous underwater vehicle(AUV) was implemented actually,its semi-physical simulation system of pipeline tracking had been designed.This semi-physical simulation system was used to test the software logic,hardware architecture,data interface and reliability of the control system.To implement this system,the whole system plan,including interface computer and the methods of pipeline tracking,was described.Compared to numerical simulation,the semi-physical simulation was used to test the real software and hardware more veritably.In the semi-physical simulation system,tracking experiments of both straight lines and polygonal lines were carried out,considering the influence of ocean current and the situation of buried pipeline.The experimental results indicate that the AUV can do pipeline tracking task,when angles of pipeline are 15°,30°,45° and 60°.In the ocean current of 2 knots,AUV could track buried pipeline.展开更多
In this paper, the TAS-I (Thales Alenia Space-Italy) Test Bench for Robotics and Autonomy (TBRA) is presented. It is based on a flexible and modular software architecture (Framework Engine), in which each functi...In this paper, the TAS-I (Thales Alenia Space-Italy) Test Bench for Robotics and Autonomy (TBRA) is presented. It is based on a flexible and modular software architecture (Framework Engine), in which each functional module (representing the GNC subsystems) implements a key functionality of the GNC (Guidance Navigation and Control). Modules communicate by means of standardised interfaces designed for exchange of necessary information among the modules composing the entire system. This approach permits the interchange-ability of each subsystem without affecting the overall functionalities of the GNC system. In this paper, the TBRA system, together with the implemented functional modules will be described. Tests results will be reported and future development will be discussed.展开更多
Barriers to medication adherence among patients have been shown to have significant impact on service quality and cost in the healthcare system. To minimize this impact, many in the healthcare industry are highly inte...Barriers to medication adherence among patients have been shown to have significant impact on service quality and cost in the healthcare system. To minimize this impact, many in the healthcare industry are highly interested in supporting prescription adherence among patients. They believe that information technology in general, and mobile technology in particular, can help in developing medical practices that can be highly conducive to high rates of prescription adherence by enhancing communication between patients and healthcare providers. To this end, a number of pharmacy management benefit companies plan to adopt SMS (Short Message Service) communication to reach their customers given the wider acceptance of SMS messaging among mobile phone users. However, most of these pharmacies are reluctant to purchase service agreements from SMS aggregators without a complete understanding of user, service and business requirements related to SMS messaging. Hence, many are in dire needs for prototypes of SMS servers that can help them define and refine these requirements before committing to costly agreements with SMS aggregators. This paper describes such a prototype for a pharmacy benefit management company located in the southeast of the United States.展开更多
This paper lbcuses on the main characteristics of a tree-shaped timber structural system or simply tree-shaped. One of them is the complexity of its steel connections, responsible for the joint of bar elements, compou...This paper lbcuses on the main characteristics of a tree-shaped timber structural system or simply tree-shaped. One of them is the complexity of its steel connections, responsible for the joint of bar elements, compounding a complex structural system, which requires the application of the CYPECAD software version 2007 to solve the calculations problems. Its efficiency was confirmed by a variety of laboratory tests carried out with the whole structure. The tree-shaped is a timber structure that can be used in a large number of destinations, including residences, malls, sheds, hangars, etc.. Originally, it was conceived based on the well-known masterpiece "Sagrada Familia", whose author was Architect Antoni Gaudi I Cornet (1852-1926) in Barcelona/Spain. It was designed at the end of 19th century and its construction is still not finished. Gaudi inverted the logical order of the gothic concepts, i.e., light weights below and heavy weights above. Based on this concept, he always had in mind the figure of a tree in nature. The tree-shaped follows the same idea, using timber pieces connected by steel plates. Theoretical and numerical analyses have shown its efficiency and lightness for use in timber structures.展开更多
Software today often consists of a large number of components offering and requiring services. Such components should be deployed into embedded, pervasive environments, and several deployment architectures are typical...Software today often consists of a large number of components offering and requiring services. Such components should be deployed into embedded, pervasive environments, and several deployment architectures are typically possible. These deployment architectures can have significant impacts on system reliability. However, existing reliability estimation approaches are typically limited to certain classes or exclusively concentrate on software reliability, neglecting the influence of hardware resources, software deployment and architectural styles. The selection of an appropriate architectural style has a significant impact on system reliability of the target system. Therefore, we propose a novel software architecture (SA) based reliability estimation model incorporating software deployment and architectural style. On the basis of two architectural styles, we design influence factors and present a new approach to calculate system reliability. Experimental results show that influence factors provide an accurate and simple method of reflecting architectural styles and software deployment on system reliability. It is important for considering the influence of other architectural styles on system reliability in large scale deployment environment.展开更多
The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a seriou...The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a serious challenge to system security integrations and system controls. Also, the need for diversified services and flexible extensions of network security asks for more considerations and contribu?tions from the perspective of software engineering in the process of designing and constructing security systems. Based on the essence of the virtualization technique and the idea of software-defined networks, we in this paper propose a novel software-defi ned security architecture for systems. By abstracting the traditional security facilities and techniques, the proposed security architecture provides a new, simple, effective, and programmable framework in which security operations and security controls can be decoupled, and thereby reduces the software module sizes, decreases the intensity of software deve?lopments, and improves the security extensibility of systems.展开更多
The spiral assembly steel structure, a newly developed retaining wall for the rapid excavation of small-sized foundation pits in unsaturated soil, is presented. This new type of retaining structure is prefabricated in...The spiral assembly steel structure, a newly developed retaining wall for the rapid excavation of small-sized foundation pits in unsaturated soil, is presented. This new type of retaining structure is prefabricated in the factory and is assembled on site in the excavation of a pit. This retaining structure is composed of several prefabricated steel structural units, in which the adjacent steel structural units are joined with connectors. Each steel structural unit has one steel pipe in the radial direction and is welded to a single piece of steel plate. After full installation in situ, the retaining structure becomes a cylindrical steel structure. With the protection afforded by this new type of retaining structure, excavation work can be completed within 24 h to a depth up to 5 m. In order to verify the reliability and effectiveness of this new retaining structure, field construction tests were conducted in Beijing, China. The test construction was monitored. The monitoring program included measuring stress in the structure, lateral earth pressure, and lateral deformation of the surrounding soil. The monitoring data from the field test were compared with the theoretical results. The results show that the proposed new structure is reliable and effective.展开更多
A parallel architecture for efficient hardware implementation of Rivest Shamir Adleman(RSA) cryptography is proposed.Residue number system(RNS) is introduced to realize high parallelism,thus all the elements under the...A parallel architecture for efficient hardware implementation of Rivest Shamir Adleman(RSA) cryptography is proposed.Residue number system(RNS) is introduced to realize high parallelism,thus all the elements under the same base are independent of each other and can be computed in parallel.Moreover,a simple and fast base transformation is used to achieve RNS Montgomery modular multiplication algorithm,which facilitates hardware implementation.Based on transport triggered architecture(TTA),the proposed architecture is designed to evaluate the performance and feasibility of the algorithm.With these optimizations,a decryption rate of 106 kbps can be achieved for 1 024-b RSA at the frequency of 100 MHz.展开更多
In this research article, we analyze the multimedia data mining and classification algorithm based on database optimization techniques. Of high performance application requirements of various kinds are springing up co...In this research article, we analyze the multimedia data mining and classification algorithm based on database optimization techniques. Of high performance application requirements of various kinds are springing up constantly makes parallel computer system structure is valued by more and more common but the corresponding software system development lags far behind the development of the hardware system, it is more obvious in the field of database technology application. Multimedia mining is different from the low level of computer multimedia processing technology and the former focuses on the extracted from huge multimedia collection mode which focused on specific features of understanding or extraction from a single multimedia objects. Our research provides new paradigm for the methodology which will be meaningful and necessary.展开更多
With progression of the digital age, the complexity of software continues to grow. AS a result, methods to quantitatively assess characteristics of software have attracted significant atten- tion. These efforts have l...With progression of the digital age, the complexity of software continues to grow. AS a result, methods to quantitatively assess characteristics of software have attracted significant atten- tion. These efforts have led to a large number of new measures such as coupling metrics, many of which seek to consider the impact of correlations between components and failures on ap- plication reliability. However, most of these approaches set the coupling parameters arbitrarily by making assumptions instead of utilizing experimental data and therefore may not accurately capture actual coupling between components of software applica- tion. Since the coupling matrix is often set arbitrarily, the existing approaches to assess software reliability considering component correlation fail to reflect the real degree of interaction and rela- tionships among software components. This paper presents an efficient approach to assess the software reliability considering Correlated component failures, incorporating software architec- ture while considering actual internal coupling of software with an efficient approach based on multivariate Bernoulli (MVB) distribu- tion. The unified framework for software Coupling measurement is' informed by a comprehensive survey of frameworks for object- oriented and procedure-oriented software. This framework enables the extraction of more accurate coupling among cornponents. The effectiveness of this method is illustrated through an exPerimental study bylapplying it to a real-time software application.展开更多
The three-dimensional discontinuous deformation analysis(3D-DDA) is a promising numerical method for both static and dynamic analyses of rock systems. Lacking mature software, its popularity is far behind its ability....The three-dimensional discontinuous deformation analysis(3D-DDA) is a promising numerical method for both static and dynamic analyses of rock systems. Lacking mature software, its popularity is far behind its ability. To address this problem, this paper presents a new software architecture from a software engineering viewpoint. Based on 3D-DDA characteristics, the implementation of the proposed architecture has the following merits. Firstly, the software architecture separates data, computing, visualization, and signal control into individual modules. Secondly, data storage and parallel access are fully considered for different conditions. Thirdly, an open computing framework is provided which supports most numerical computing methods; common tools for equation solving and parallel computing are provided for further development. Fourthly, efficient visualization functions are provided by integrating a variety of visualization algorithms. A user-friendly graphical user interface is designed to improve the user experience. Finally, through a set of examples, the software is verified against both analytical solutions and the original code by Dr. Shi Gen Hua.展开更多
Automatic protocol mining is a promising approach for inferring accurate and complete API protocols. However, just as with any data-mining technique, this approach requires sufficient training data(object usage scena...Automatic protocol mining is a promising approach for inferring accurate and complete API protocols. However, just as with any data-mining technique, this approach requires sufficient training data(object usage scenarios). Existing approaches resolve the problem by analyzing more programs, which may cause significant runtime overhead. In this paper, we propose an inheritance-based oversampling approach for object usage scenarios(OUSs). Our technique is based on the inheritance relationship in object-oriented programs. Given an object-oriented program p, generally, the OUSs that can be collected from a run of p are not more than the objects used during the run. With our technique, a maximum of n times more OUSs can be achieved, where n is the average number of super-classes of all general OUSs. To investigate the effect of our technique, we implement it in our previous prototype tool, ISpec Miner, and use the tool to mine protocols from several real-world programs. Experimental results show that our technique can collect 1.95 times more OUSs than general approaches. Additionally, accurate and complete API protocols are more likely to be achieved. Furthermore, our technique can mine API protocols for classes never even used in programs, which are valuable for validating software architectures, program documentation, and understanding. Although our technique will introduce some runtime overhead, it is trivial and acceptable.展开更多
Spike neural networks are inspired by animal brains,and outperform traditional neural networks on complicated tasks.However,spike neural networks are usually used on a large scale,and they cannot be computed on commer...Spike neural networks are inspired by animal brains,and outperform traditional neural networks on complicated tasks.However,spike neural networks are usually used on a large scale,and they cannot be computed on commercial,off-the-shelf computers.A parallel architecture is proposed and developed for discrete-event simulations of spike neural networks.Furthermore,mechanisms for both parallelism degree estimation and dynamic load balance are emphasized with theoretical and computational analysis.Simulation results show the effectiveness of the proposed parallelized spike neural network system and its corresponding support components.展开更多
基金supported in part by the National Natural Science Foundation of China under Grant 61101113,61372089 and 61201198 the Beijing Natural Science Foundation under Grant 4132007,4132015 and 4132019 the Research Fund for the Doctoral Program of Higher Education of China under Grant 20111103120017
文摘In mobile cloud computing(MCC) systems,both the mobile access network and the cloud computing network are heterogeneous,implying the diverse configurations of hardware,software,architecture,resource,etc.In such heterogeneous mobile cloud(HMC) networks,both radio and cloud resources could become the system bottleneck,thus designing the schemes that separately and independently manage the resources may severely hinder the system performance.In this paper,we aim to design the network as the integration of the mobile access part and the cloud computing part,utilizing the inherent heterogeneity to meet the diverse quality of service(QoS)requirements of tenants.Furthermore,we propose a novel cross-network radio and cloud resource management scheme for HMC networks,which is QoS-aware,with the objective of maximizing the tenant revenue while satisfying the QoS requirements.The proposed scheme is formulated as a restless bandits problem,whose "indexability" feature guarantees the low complexity with scalable and distributed characteristics.Extensive simulation results are presented to demonstrate the significant performance improvement of the proposed scheme compared to the existing ones.
基金Sponsored by the Science and Technology Department Term of Education of Heilongjiang Province(Grant No. 10541098)
文摘To better evaluate the quality of software architecture,a metrics suite is proposed to measure the coupling of software architecture models,in which CBC is used to measure the coupling between components,CBCC is used to measure the coupling of transferring message between components,CBCCT is used to measure the coupling of software architecture,WCBCC is used to measure the coupling of transferring message with weight between components,and WCBCCT is used to measure the coupling of message transmission with weight in the whole software architecture. The proposed algorithm for the coupling metrics is applied to the design of serve software architecture. Analysis of an example validates the feasibility of this metrics suite.
基金Projects(50909025,51179035) supported by the National Natural Science Foundation of ChinaProject(HEUCFZ1003) supported by the Fundamental Research Funds for Central Universities of China
文摘Before the task of autonomous underwater vehicle(AUV) was implemented actually,its semi-physical simulation system of pipeline tracking had been designed.This semi-physical simulation system was used to test the software logic,hardware architecture,data interface and reliability of the control system.To implement this system,the whole system plan,including interface computer and the methods of pipeline tracking,was described.Compared to numerical simulation,the semi-physical simulation was used to test the real software and hardware more veritably.In the semi-physical simulation system,tracking experiments of both straight lines and polygonal lines were carried out,considering the influence of ocean current and the situation of buried pipeline.The experimental results indicate that the AUV can do pipeline tracking task,when angles of pipeline are 15°,30°,45° and 60°.In the ocean current of 2 knots,AUV could track buried pipeline.
文摘In this paper, the TAS-I (Thales Alenia Space-Italy) Test Bench for Robotics and Autonomy (TBRA) is presented. It is based on a flexible and modular software architecture (Framework Engine), in which each functional module (representing the GNC subsystems) implements a key functionality of the GNC (Guidance Navigation and Control). Modules communicate by means of standardised interfaces designed for exchange of necessary information among the modules composing the entire system. This approach permits the interchange-ability of each subsystem without affecting the overall functionalities of the GNC system. In this paper, the TBRA system, together with the implemented functional modules will be described. Tests results will be reported and future development will be discussed.
文摘Barriers to medication adherence among patients have been shown to have significant impact on service quality and cost in the healthcare system. To minimize this impact, many in the healthcare industry are highly interested in supporting prescription adherence among patients. They believe that information technology in general, and mobile technology in particular, can help in developing medical practices that can be highly conducive to high rates of prescription adherence by enhancing communication between patients and healthcare providers. To this end, a number of pharmacy management benefit companies plan to adopt SMS (Short Message Service) communication to reach their customers given the wider acceptance of SMS messaging among mobile phone users. However, most of these pharmacies are reluctant to purchase service agreements from SMS aggregators without a complete understanding of user, service and business requirements related to SMS messaging. Hence, many are in dire needs for prototypes of SMS servers that can help them define and refine these requirements before committing to costly agreements with SMS aggregators. This paper describes such a prototype for a pharmacy benefit management company located in the southeast of the United States.
文摘This paper lbcuses on the main characteristics of a tree-shaped timber structural system or simply tree-shaped. One of them is the complexity of its steel connections, responsible for the joint of bar elements, compounding a complex structural system, which requires the application of the CYPECAD software version 2007 to solve the calculations problems. Its efficiency was confirmed by a variety of laboratory tests carried out with the whole structure. The tree-shaped is a timber structure that can be used in a large number of destinations, including residences, malls, sheds, hangars, etc.. Originally, it was conceived based on the well-known masterpiece "Sagrada Familia", whose author was Architect Antoni Gaudi I Cornet (1852-1926) in Barcelona/Spain. It was designed at the end of 19th century and its construction is still not finished. Gaudi inverted the logical order of the gothic concepts, i.e., light weights below and heavy weights above. Based on this concept, he always had in mind the figure of a tree in nature. The tree-shaped follows the same idea, using timber pieces connected by steel plates. Theoretical and numerical analyses have shown its efficiency and lightness for use in timber structures.
文摘Software today often consists of a large number of components offering and requiring services. Such components should be deployed into embedded, pervasive environments, and several deployment architectures are typically possible. These deployment architectures can have significant impacts on system reliability. However, existing reliability estimation approaches are typically limited to certain classes or exclusively concentrate on software reliability, neglecting the influence of hardware resources, software deployment and architectural styles. The selection of an appropriate architectural style has a significant impact on system reliability of the target system. Therefore, we propose a novel software architecture (SA) based reliability estimation model incorporating software deployment and architectural style. On the basis of two architectural styles, we design influence factors and present a new approach to calculate system reliability. Experimental results show that influence factors provide an accurate and simple method of reflecting architectural styles and software deployment on system reliability. It is important for considering the influence of other architectural styles on system reliability in large scale deployment environment.
基金supported in part by the following grants:National Science Foundation of China(Grant No.61272400)Chongqing Innovative Team Fund for College Development Project(Grant No.KJTD201310)+3 种基金Chongqing Youth Innovative Talent Project(Grant No.cstc2013kjrc-qnrc40004)Science and Technology Research Program of the Chongqing Municipal Education Committee(Grant No.KJ1500425)Foundation of CQUPT(Grant No.WF201403)Chongqing Graduate Research and Innovation Project(Grant No.CYS14146)
文摘The fact that the security facilities within a system are closely coupled and the security facilities between systems are unconnected results in an isolated protection structure for systems, and gives rise to a serious challenge to system security integrations and system controls. Also, the need for diversified services and flexible extensions of network security asks for more considerations and contribu?tions from the perspective of software engineering in the process of designing and constructing security systems. Based on the essence of the virtualization technique and the idea of software-defined networks, we in this paper propose a novel software-defi ned security architecture for systems. By abstracting the traditional security facilities and techniques, the proposed security architecture provides a new, simple, effective, and programmable framework in which security operations and security controls can be decoupled, and thereby reduces the software module sizes, decreases the intensity of software deve?lopments, and improves the security extensibility of systems.
基金Project(41202220)supported by the National Natural Science Foundation of ChinaProject(20120022120003)supported by the Research Fund for the Doctoral Program of Higher Education,China+1 种基金Project(2652012065)supported by the Fundamental Research Funds for the Central Universities of ChinaProject(2013006)supported by the Research Fund for Key Laboratory on Deep Geo Drilling Technology,Ministry of Land and Resources,China
文摘The spiral assembly steel structure, a newly developed retaining wall for the rapid excavation of small-sized foundation pits in unsaturated soil, is presented. This new type of retaining structure is prefabricated in the factory and is assembled on site in the excavation of a pit. This retaining structure is composed of several prefabricated steel structural units, in which the adjacent steel structural units are joined with connectors. Each steel structural unit has one steel pipe in the radial direction and is welded to a single piece of steel plate. After full installation in situ, the retaining structure becomes a cylindrical steel structure. With the protection afforded by this new type of retaining structure, excavation work can be completed within 24 h to a depth up to 5 m. In order to verify the reliability and effectiveness of this new retaining structure, field construction tests were conducted in Beijing, China. The test construction was monitored. The monitoring program included measuring stress in the structure, lateral earth pressure, and lateral deformation of the surrounding soil. The monitoring data from the field test were compared with the theoretical results. The results show that the proposed new structure is reliable and effective.
基金Supported by the Natural Science Foundation of Tianjin (No. 11JCZDJC15800)the National Natural Science Foundation of China(No. 61003306)
文摘A parallel architecture for efficient hardware implementation of Rivest Shamir Adleman(RSA) cryptography is proposed.Residue number system(RNS) is introduced to realize high parallelism,thus all the elements under the same base are independent of each other and can be computed in parallel.Moreover,a simple and fast base transformation is used to achieve RNS Montgomery modular multiplication algorithm,which facilitates hardware implementation.Based on transport triggered architecture(TTA),the proposed architecture is designed to evaluate the performance and feasibility of the algorithm.With these optimizations,a decryption rate of 106 kbps can be achieved for 1 024-b RSA at the frequency of 100 MHz.
文摘In this research article, we analyze the multimedia data mining and classification algorithm based on database optimization techniques. Of high performance application requirements of various kinds are springing up constantly makes parallel computer system structure is valued by more and more common but the corresponding software system development lags far behind the development of the hardware system, it is more obvious in the field of database technology application. Multimedia mining is different from the low level of computer multimedia processing technology and the former focuses on the extracted from huge multimedia collection mode which focused on specific features of understanding or extraction from a single multimedia objects. Our research provides new paradigm for the methodology which will be meaningful and necessary.
基金supported by the National Aerospace Science Foundation of China(20140751008)
文摘With progression of the digital age, the complexity of software continues to grow. AS a result, methods to quantitatively assess characteristics of software have attracted significant atten- tion. These efforts have led to a large number of new measures such as coupling metrics, many of which seek to consider the impact of correlations between components and failures on ap- plication reliability. However, most of these approaches set the coupling parameters arbitrarily by making assumptions instead of utilizing experimental data and therefore may not accurately capture actual coupling between components of software applica- tion. Since the coupling matrix is often set arbitrarily, the existing approaches to assess software reliability considering component correlation fail to reflect the real degree of interaction and rela- tionships among software components. This paper presents an efficient approach to assess the software reliability considering Correlated component failures, incorporating software architec- ture while considering actual internal coupling of software with an efficient approach based on multivariate Bernoulli (MVB) distribu- tion. The unified framework for software Coupling measurement is' informed by a comprehensive survey of frameworks for object- oriented and procedure-oriented software. This framework enables the extraction of more accurate coupling among cornponents. The effectiveness of this method is illustrated through an exPerimental study bylapplying it to a real-time software application.
基金supported by the National Natural Science Foundation of China(Grant No.61471338)the Knowledge Innovation Program of the Chinese Academy of Sciences,Youth Innovation Promotion Association CAS,President Fund of UCASCRSRI Open Research Program(Grant No.CKWV2015217/KY)
文摘The three-dimensional discontinuous deformation analysis(3D-DDA) is a promising numerical method for both static and dynamic analyses of rock systems. Lacking mature software, its popularity is far behind its ability. To address this problem, this paper presents a new software architecture from a software engineering viewpoint. Based on 3D-DDA characteristics, the implementation of the proposed architecture has the following merits. Firstly, the software architecture separates data, computing, visualization, and signal control into individual modules. Secondly, data storage and parallel access are fully considered for different conditions. Thirdly, an open computing framework is provided which supports most numerical computing methods; common tools for equation solving and parallel computing are provided for further development. Fourthly, efficient visualization functions are provided by integrating a variety of visualization algorithms. A user-friendly graphical user interface is designed to improve the user experience. Finally, through a set of examples, the software is verified against both analytical solutions and the original code by Dr. Shi Gen Hua.
基金supported by the Scientific Research Project of the Education Department of Hubei Province,China(No.Q20181508)the Youths Science Foundation of Wuhan Institute of Technology(No.k201622)+5 种基金the Surveying and Mapping Geographic Information Public Welfare Scientific Research Special Industry(No.201412014)the Educational Commission of Hubei Province,China(No.Q20151504)the National Natural Science Foundation of China(Nos.41501505,61502355,61502355,and 61502354)the China Postdoctoral Science Foundation(No.2015M581887)the Key Program of Higher Education Institutions of Henan Province,China(No.17A520040)and the Natural Science Foundation of Henan Province,China(No.162300410177)
文摘Automatic protocol mining is a promising approach for inferring accurate and complete API protocols. However, just as with any data-mining technique, this approach requires sufficient training data(object usage scenarios). Existing approaches resolve the problem by analyzing more programs, which may cause significant runtime overhead. In this paper, we propose an inheritance-based oversampling approach for object usage scenarios(OUSs). Our technique is based on the inheritance relationship in object-oriented programs. Given an object-oriented program p, generally, the OUSs that can be collected from a run of p are not more than the objects used during the run. With our technique, a maximum of n times more OUSs can be achieved, where n is the average number of super-classes of all general OUSs. To investigate the effect of our technique, we implement it in our previous prototype tool, ISpec Miner, and use the tool to mine protocols from several real-world programs. Experimental results show that our technique can collect 1.95 times more OUSs than general approaches. Additionally, accurate and complete API protocols are more likely to be achieved. Furthermore, our technique can mine API protocols for classes never even used in programs, which are valuable for validating software architectures, program documentation, and understanding. Although our technique will introduce some runtime overhead, it is trivial and acceptable.
基金supported by the National Natural Science Foundation of China (Grant Nos. 61003082,60921062,61005077)
文摘Spike neural networks are inspired by animal brains,and outperform traditional neural networks on complicated tasks.However,spike neural networks are usually used on a large scale,and they cannot be computed on commercial,off-the-shelf computers.A parallel architecture is proposed and developed for discrete-event simulations of spike neural networks.Furthermore,mechanisms for both parallelism degree estimation and dynamic load balance are emphasized with theoretical and computational analysis.Simulation results show the effectiveness of the proposed parallelized spike neural network system and its corresponding support components.