917 resultados para Code uses
Resumo:
OctVCE is a cartesian cell CFD code produced especially for numerical simulations of shock and blast wave interactions with complex geometries, in particular, from explosions. Virtual Cell Embedding (VCE) was chosen as its cartesian cell kernel for its simplicity and sufficiency for practical engineering design problems. The code uses a finite-volume formulation of the unsteady Euler equations with a second order explicit Runge-Kutta Godonov (MUSCL) scheme. Gradients are calculated using a least-squares method with a minmod limiter. Flux solvers used are AUSM, AUSMDV and EFM. No fluid-structure coupling or chemical reactions are allowed, but gas models can be perfect gas and JWL or JWLB for the explosive products. This report also describes the code’s ‘octree’ mesh adaptive capability and point-inclusion query procedures for the VCE geometry engine. Finally, some space will also be devoted to describing code parallelization using the shared-memory OpenMP paradigm. The user manual to the code is to be found in the companion report 2007/13.
Resumo:
This dissertation aims at extending the JCircus tool, a translator of formal specifications into code that receives a Circus specification as input, and translates the specification into Java code. Circus is a formal language whose syntax is based on Z s and CSP s syntax. JCircus generated code uses JCSP, which is a Java API that implements CSP primitives. As JCSP does not implement all CSP s primitives, the translation strategy from Circus to Java is not trivial. Some CSP primitives, like parallelism, external choice, communication and multi-synchronization are partially implemented. As an aditional scope, this dissertation will also develop a tool for testing JCSP programs, called JCSPUnit, which will also be included in JCircus new version. The extended version of JCircus will be called JCircus 2.0.
Resumo:
Mucho ofthe towns of Mendoza have been working for years with a methodology built with traditional zoningand code of permitted uses,not permitted or conditional. With these instrument sexpectthe presentation of private enter prisesto assess whether it complies with these regulationsto authorize the works.These agencies have a plan with zoning and code application shave already considered planning. This form of work, shows clearly the lack of actions to drive urban developmentsin the department, initiatives on the issue only limited to astatic situation, waiting for proposal sand external actions,not being able to see the advantagesand /or contribution saccom panying the Land Use Plan. Une of the important elements to considerin the Plan process, is the incorporation of participatory stage allows, consensus and guidanceto policy makers, community in territorial actions. For this way are designed and constructed public works, to address concerns of the population and in some cases,works that will produce community supportat election time. A look at the performance of Cities hall suchas Granada City Council, Churriana de la Vega and Jun, you can observe that the planning can be done other wise, as articulated action from the same organism. In principle determining zoning and uses of spaceis integral to the Land Use Planand that it further comprises the development proposals,the lines of action and prioritization of programs and projects. These local governants, which manage a municipality, working withdy namic planning councilasit implements the proposed urban development, agricultural, commercial and industrialin its territory and build public work saccording to plan. Since 2009,the province has a Law of Zoningand Land Use demanded Municipal Land Management Plans, but three years after the enactmentof the 18 only has aplan.Thisis due to two reasons:the policy makersdo not understand the multiplicity of elements and facets of a plan covering the other,the plans are perceived as a limitation on their actions , a fact not willing to accept. The dissemination of know ledge and the, new ways toaddress the Land Use Planning and management of conflicts generated by the unprecedented growthwith incompatible usesin these cities that the component swhich will requirel and manager stoimplement aplanning Plans. Tusa dinámica risión Fromm te municipalitos in thais contexto de can tal abur innovación and a newway of governing
Resumo:
Mucho ofthe towns of Mendoza have been working for years with a methodology built with traditional zoningand code of permitted uses,not permitted or conditional. With these instrument sexpectthe presentation of private enter prisesto assess whether it complies with these regulationsto authorize the works.These agencies have a plan with zoning and code application shave already considered planning. This form of work, shows clearly the lack of actions to drive urban developmentsin the department, initiatives on the issue only limited to astatic situation, waiting for proposal sand external actions,not being able to see the advantagesand /or contribution saccom panying the Land Use Plan. Une of the important elements to considerin the Plan process, is the incorporation of participatory stage allows, consensus and guidanceto policy makers, community in territorial actions. For this way are designed and constructed public works, to address concerns of the population and in some cases,works that will produce community supportat election time. A look at the performance of Cities hall suchas Granada City Council, Churriana de la Vega and Jun, you can observe that the planning can be done other wise, as articulated action from the same organism. In principle determining zoning and uses of spaceis integral to the Land Use Planand that it further comprises the development proposals,the lines of action and prioritization of programs and projects. These local governants, which manage a municipality, working withdy namic planning councilasit implements the proposed urban development, agricultural, commercial and industrialin its territory and build public work saccording to plan. Since 2009,the province has a Law of Zoningand Land Use demanded Municipal Land Management Plans, but three years after the enactmentof the 18 only has aplan.Thisis due to two reasons:the policy makersdo not understand the multiplicity of elements and facets of a plan covering the other,the plans are perceived as a limitation on their actions , a fact not willing to accept. The dissemination of know ledge and the, new ways toaddress the Land Use Planning and management of conflicts generated by the unprecedented growthwith incompatible usesin these cities that the component swhich will requirel and manager stoimplement aplanning Plans. Tusa dinámica risión Fromm te municipalitos in thais contexto de can tal abur innovación and a newway of governing
Resumo:
Mucho ofthe towns of Mendoza have been working for years with a methodology built with traditional zoningand code of permitted uses,not permitted or conditional. With these instrument sexpectthe presentation of private enter prisesto assess whether it complies with these regulationsto authorize the works.These agencies have a plan with zoning and code application shave already considered planning. This form of work, shows clearly the lack of actions to drive urban developmentsin the department, initiatives on the issue only limited to astatic situation, waiting for proposal sand external actions,not being able to see the advantagesand /or contribution saccom panying the Land Use Plan. Une of the important elements to considerin the Plan process, is the incorporation of participatory stage allows, consensus and guidanceto policy makers, community in territorial actions. For this way are designed and constructed public works, to address concerns of the population and in some cases,works that will produce community supportat election time. A look at the performance of Cities hall suchas Granada City Council, Churriana de la Vega and Jun, you can observe that the planning can be done other wise, as articulated action from the same organism. In principle determining zoning and uses of spaceis integral to the Land Use Planand that it further comprises the development proposals,the lines of action and prioritization of programs and projects. These local governants, which manage a municipality, working withdy namic planning councilasit implements the proposed urban development, agricultural, commercial and industrialin its territory and build public work saccording to plan. Since 2009,the province has a Law of Zoningand Land Use demanded Municipal Land Management Plans, but three years after the enactmentof the 18 only has aplan.Thisis due to two reasons:the policy makersdo not understand the multiplicity of elements and facets of a plan covering the other,the plans are perceived as a limitation on their actions , a fact not willing to accept. The dissemination of know ledge and the, new ways toaddress the Land Use Planning and management of conflicts generated by the unprecedented growthwith incompatible usesin these cities that the component swhich will requirel and manager stoimplement aplanning Plans. Tusa dinámica risión Fromm te municipalitos in thais contexto de can tal abur innovación and a newway of governing
Resumo:
In tethered satellite technology, it is important to estimate how many electrons a spacecraft can collect from its ambient plasma by a bare electrodynamic tether. The analysis is however very difficult because of the small but significant Geo-magnetic field and the spacecraft’s relative motion to both ions and electrons. The object of our work is the development of a numerical method, for this purpose. Particle-In-Cell (PIC) method, for the calculation of electron current to a positive bare tether moving at orbital velocity in the ionosphere, i.e. in a flowing magnetized plasma under Maxwellian collisionless conditions. In a PIC code, a number of particles are distributed in phase space and the computational domain has a grid on which Poisson equation is solved for field quantities. The code uses the quasi-neutrality condition to solve for the local potential at points in the plasma which coincide with the computational outside boundary. The quasi-neutrality condition imposes ne - ni on the boundary. The Poisson equation is solved in such a way that the presheath region can be captured in the computation. Results show that the collected current is higher than the Orbital Motion Limit (OML) theory. The OML current is the upper limit of current collection under steady collisionless unmagnetized conditions. In this work, we focus on the flowing effects of plasma as a possible cause of the current enhancement. A deficit electron density due to the flowing effects has been worked and removed by introducing adiabatic electron trapping into our model.
Resumo:
Analogue and finite element numerical models with frictional and viscous properties are used to model thrust wedge development. Comparison between model types yields valuable information about analogue model evolution, scaling laws and the relative strengths and limitations of the techniques. Both model types show a marked contrast in structural style between ‘frictional-viscous domains’ underlain by a thin viscous layer and purely ‘frictional domains’. Closely spaced thrusts form a narrow and highly asymmetric fold-and-thrust belt in the frictional domain, characterized by in-sequence propagation of forward thrusts. In contrast, the frictional-viscous domain shows a wide and low taper wedge and a thrust belt with a more symmetrical vergence, with both forward and back thrusts. The frictional-viscous domain numerical models show that the viscous layer initially simple shears as deformation propagates along it, while localized deformation resulting in the formation of a pop-up structure occurs in the overlying frictional layers. In both domains, thrust shear zones in the numerical model are generally steeper than the equivalent faults in the analogue model, because the finite element code uses a non-associated plasticity flow law. Nevertheless, the qualitative agreement between analogue and numerical models is encouraging. It shows that the continuum approximation used in numerical models can be used to model frictional materials, such as sand, provided caution is taken to properly scale the experiments, and some of the limitations are taken into account.
Resumo:
One of the major problems that prevents the spread of elections with the possibility of remote voting over electronic networks, also called Internet Voting, is the use of unreliable client platforms, such as the voter's computer and the Internet infrastructure connecting it to the election server. A computer connected to the Internet is exposed to viruses, worms, Trojans, spyware, malware and other threats that can compromise the election's integrity. For instance, it is possible to write a virus that changes the voter's vote to a predetermined vote on election's day. Another possible attack is the creation of a fake election web site where the voter uses a malicious vote program on the web site that manipulates the voter's vote (phishing/pharming attack). Such attacks may not disturb the election protocol, therefore can remain undetected in the eyes of the election auditors. We propose the use of Code Voting to overcome insecurity of the client platform. Code Voting consists in creating a secure communication channel to communicate the voter's vote between the voter and a trusted component attached to the voter's computer. Consequently, no one controlling the voter's computer can change the his/her's vote. The trusted component can then process the vote according to a cryptographic voting protocol to enable cryptographic verification at the server's side.
Resumo:
Eradication of code smells is often pointed out as a way to improve readability, extensibility and design in existing software. However, code smell detection remains time consuming and error-prone, partly due to the inherent subjectivity of the detection processes presently available. In view of mitigating the subjectivity problem, this dissertation presents a tool that automates a technique for the detection and assessment of code smells in Java source code, developed as an Eclipse plugin. The technique is based upon a Binary Logistic Regression model that uses complexity metrics as independent variables and is calibrated by expert‟s knowledge. An overview of the technique is provided, the tool is described and validated by an example case study.
Resumo:
Key management has a fundamental role in secure communications. Designing and testing of key management protocols is tricky. These protocols must work flawlessly despite of any abuse. The main objective of this work was to design and implement a tool that helps to specify the protocol and makes it possible to test the protocol while it is still under development. This tool generates compile-ready java code from a key management protocol model. A modelling method for these protocols, which uses Unified Modeling Language (UML) was also developed. The protocol is modelled, exported as an XMI and read by the code generator tool. The code generator generates java code that is immediately executable with a test software after compilation.
Resumo:
Nous proposons une approche basée sur la formulation interactive des requêtes. Notre approche sert à faciliter des tâches d’analyse et de compréhension du code source. Dans cette approche, l’analyste utilise un ensemble de filtres de base (linguistique, structurel, quantitatif, et filtre d’interactivité) pour définir des requêtes complexes. Ces requêtes sont construites à l’aide d’un processus interactif et itératif, où des filtres de base sont choisis et exécutés, et leurs résultats sont visualisés, changés et combinés en utilisant des opérateurs prédéfinis. Nous avons évalués notre approche par l’implantation des récentes contributions en détection de défauts de conception ainsi que la localisation de fonctionnalités dans le code. Nos résultats montrent que, en plus d’être générique, notre approche aide à la mise en œuvre des solutions existantes implémentées par des outils automatiques.
Resumo:
Traditionnellement, les applications orientées objets légataires intègrent différents aspects fonctionnels. Ces aspects peuvent être dispersés partout dans le code. Il existe différents types d’aspects : • des aspects qui représentent des fonctionnalités métiers ; • des aspects qui répondent à des exigences non fonctionnelles ou à d’autres considérations de conception comme la robustesse, la distribution, la sécurité, etc. Généralement, le code qui représente ces aspects chevauche plusieurs hiérarchies de classes. Plusieurs chercheurs se sont intéressés à la problématique de la modularisation de ces aspects dans le code : programmation orientée sujets, programmation orientée aspects et programmation orientée vues. Toutes ces méthodes proposent des techniques et des outils pour concevoir des applications orientées objets sous forme de composition de fragments de code qui répondent à différents aspects. La séparation des aspects dans le code a des avantages au niveau de la réutilisation et de la maintenance. Ainsi, il est important d’identifier et de localiser ces aspects dans du code légataire orienté objets. Nous nous intéressons particulièrement aux aspects fonctionnels. En supposant que le code qui répond à un aspect fonctionnel ou fonctionnalité exhibe une certaine cohésion fonctionnelle (dépendances entre les éléments), nous proposons d’identifier de telles fonctionnalités à partir du code. L’idée est d’identifier, en l’absence des paradigmes de la programmation par aspects, les techniques qui permettent l’implémentation des différents aspects fonctionnels dans un code objet. Notre approche consiste à : • identifier les techniques utilisées par les développeurs pour intégrer une fonctionnalité en l’absence des techniques orientées aspects • caractériser l’empreinte de ces techniques sur le code • et développer des outils pour identifier ces empreintes. Ainsi, nous présentons deux approches pour l’identification des fonctionnalités existantes dans du code orienté objets. La première identifie différents patrons de conception qui permettent l’intégration de ces fonctionnalités dans le code. La deuxième utilise l’analyse formelle de concepts pour identifier les fonctionnalités récurrentes dans le code. Nous expérimentons nos deux approches sur des systèmes libres orientés objets pour identifier les différentes fonctionnalités dans le code. Les résultats obtenus montrent l’efficacité de nos approches pour identifier les différentes fonctionnalités dans du code légataire orienté objets et permettent de suggérer des cas de refactorisation.
Resumo:
The modern telecommunication industry demands higher capacity networks with high data rate. Orthogonal frequency division multiplexing (OFDM) is a promising technique for high data rate wireless communications at reasonable complexity in wireless channels. OFDM has been adopted for many types of wireless systems like wireless local area networks such as IEEE 802.11a, and digital audio/video broadcasting (DAB/DVB). The proposed research focuses on a concatenated coding scheme that improve the performance of OFDM based wireless communications. It uses a Redundant Residue Number System (RRNS) code as the outer code and a convolutional code as the inner code. The bit error rate (BER) performances of the proposed system under different channel conditions are investigated. These include the effect of additive white Gaussian noise (AWGN), multipath delay spread, peak power clipping and frame start synchronization error. The simulation results show that the proposed RRNS-Convolutional concatenated coding (RCCC) scheme provides significant improvement in the system performance by exploiting the inherent properties of RRNS.
Resumo:
Optical Character Recognition plays an important role in Digital Image Processing and Pattern Recognition. Even though ambient study had been performed on foreign languages like Chinese and Japanese, effort on Indian script is still immature. OCR in Malayalam language is more complex as it is enriched with largest number of characters among all Indian languages. The challenge of recognition of characters is even high in handwritten domain, due to the varying writing style of each individual. In this paper we propose a system for recognition of offline handwritten Malayalam vowels. The proposed method uses Chain code and Image Centroid for the purpose of extracting features and a two layer feed forward network with scaled conjugate gradient for classification
Resumo:
The code STATFLUX, implementing a new and simple statistical procedure for the calculation of transfer coefficients in radionuclide transport to animals and plants, is proposed. The method is based on the general multiple-compartment model, which uses a system of linear equations involving geometrical volume considerations. Flow parameters were estimated by employing two different least-squares procedures: Derivative and Gauss-Marquardt methods, with the available experimental data of radionuclide concentrations as the input functions of time. The solution of the inverse problem, which relates a given set of flow parameter with the time evolution of concentration functions, is achieved via a Monte Carlo Simulation procedure.Program summaryTitle of program: STATFLUXCatalogue identifier: ADYS_v1_0Program summary URL: http://cpc.cs.qub.ac.uk/summaries/ADYS_v1_0Program obtainable from: CPC Program Library, Queen's University of Belfast, N. IrelandLicensing provisions: noneComputer for which the program is designed and others on which it has been tested: Micro-computer with Intel Pentium III, 3.0 GHzInstallation: Laboratory of Linear Accelerator, Department of Experimental Physics, University of São Paulo, BrazilOperating system: Windows 2000 and Windows XPProgramming language used: Fortran-77 as implemented in Microsoft Fortran 4.0. NOTE: Microsoft Fortran includes non-standard features which are used in this program. Standard Fortran compilers such as, g77, f77, ifort and NAG95, are not able to compile the code and therefore it has not been possible for the CPC Program Library to test the program.Memory, required to execute with typical data: 8 Mbytes of RAM memory and 100 MB of Hard disk memoryNo. of bits in a word: 16No. of lines in distributed program, including test data, etc.: 6912No. of bytes in distributed Program, including test data, etc.: 229 541Distribution format: tar.gzNature of the physical problem: the investigation of transport mechanisms for radioactive substances, through environmental pathways, is very important for radiological protection of populations. One such pathway, associated with the food chain, is the grass-animal-man sequence. The distribution of trace elements in humans and laboratory animals has been intensively studied over the past 60 years [R.C. Pendlenton, C.W. Mays, R.D. Lloyd, A.L. Brooks, Differential accumulation of iodine-131 from local fallout in people and milk, Health Phys. 9 (1963) 1253-1262]. In addition, investigations on the incidence of cancer in humans, and a possible causal relationship to radioactive fallout, have been undertaken [E.S. Weiss, M.L. Rallison, W.T. London, W.T. Carlyle Thompson, Thyroid nodularity in southwestern Utah school children exposed to fallout radiation, Amer. J. Public Health 61 (1971) 241-249; M.L. Rallison, B.M. Dobyns, F.R. Keating, J.E. Rall, F.H. Tyler, Thyroid diseases in children, Amer. J. Med. 56 (1974) 457-463; J.L. Lyon, M.R. Klauber, J.W. Gardner, K.S. Udall, Childhood leukemia associated with fallout from nuclear testing, N. Engl. J. Med. 300 (1979) 397-402]. From the pathways of entry of radionuclides in the human (or animal) body, ingestion is the most important because it is closely related to life-long alimentary (or dietary) habits. Those radionuclides which are able to enter the living cells by either metabolic or other processes give rise to localized doses which can be very high. The evaluation of these internally localized doses is of paramount importance for the assessment of radiobiological risks and radiological protection. The time behavior of trace concentration in organs is the principal input for prediction of internal doses after acute or chronic exposure. The General Multiple-Compartment Model (GMCM) is the powerful and more accepted method for biokinetical studies, which allows the calculation of concentration of trace elements in organs as a function of time, when the flow parameters of the model are known. However, few biokinetics data exist in the literature, and the determination of flow and transfer parameters by statistical fitting for each system is an open problem.Restriction on the complexity of the problem: This version of the code works with the constant volume approximation, which is valid for many situations where the biological half-live of a trace is lower than the volume rise time. Another restriction is related to the central flux model. The model considered in the code assumes that exist one central compartment (e.g., blood), that connect the flow with all compartments, and the flow between other compartments is not included.Typical running time: Depends on the choice for calculations. Using the Derivative Method the time is very short (a few minutes) for any number of compartments considered. When the Gauss-Marquardt iterative method is used the calculation time can be approximately 5-6 hours when similar to 15 compartments are considered. (C) 2006 Elsevier B.V. All rights reserved.